URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-t...
Submission: On May 30 via automatic, source hackernews

Summary

This website contacted 94 IPs in 8 countries across 64 domains to perform 247 HTTP transactions. The main IP is 50.31.169.131, located in Melrose Park, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 50.31.169.131 23352 (SERVERCEN...)
16 205.234.175.175 30081 (CACHENETW...)
2 2.18.232.23 16625 (AKAMAI-AS)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
1 2.18.234.190 16625 (AKAMAI-AS)
1 52.4.39.251 14618 (AMAZON-AES)
2 13.35.254.41 16509 (AMAZON-02)
1 151.101.0.239 54113 (FASTLY)
1 3 35.190.59.101 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
2 99.86.1.198 16509 (AMAZON-02)
2 13.35.253.40 16509 (AMAZON-02)
5 2.18.234.21 16625 (AKAMAI-AS)
1 52.30.183.205 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 13.35.253.62 16509 (AMAZON-02)
4 52.7.45.119 14618 (AMAZON-AES)
1 34.226.174.86 14618 (AMAZON-AES)
1 3 108.128.62.29 16509 (AMAZON-02)
1 8 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.198 27281 (QUANTCAST)
1 46.228.164.13 56396 (TURN)
6 2a03:2880:f02... 32934 (FACEBOOK)
1 151.101.36.157 54113 (FASTLY)
1 13.35.253.109 16509 (AMAZON-02)
1 35.190.92.63 15169 (GOOGLE)
1 52.33.26.96 16509 (AMAZON-02)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 52.3.171.116 14618 (AMAZON-AES)
1 13.35.253.111 16509 (AMAZON-02)
2 52.239.137.4 8075 (MICROSOFT...)
1 2 23.43.115.95 20940 (AKAMAI-ASN1)
2 4 35.227.248.159 15169 (GOOGLE)
1 2a00:1450:401... 15169 (GOOGLE)
1 34.236.116.189 14618 (AMAZON-AES)
2 2a00:1450:400... 15169 (GOOGLE)
4 172.217.18.2 15169 (GOOGLE)
1 35.190.40.172 15169 (GOOGLE)
9 52.2.117.76 14618 (AMAZON-AES)
1 104.244.42.5 13414 (TWITTER)
2 2606:4700::68... 13335 (CLOUDFLAR...)
7 2.18.232.28 16625 (AKAMAI-AS)
1 2a00:1450:400... 15169 (GOOGLE)
2 99.86.3.46 16509 (AMAZON-02)
2 54.209.166.125 14618 (AMAZON-AES)
12 34.235.240.97 14618 (AMAZON-AES)
1 178.250.2.130 44788 (ASN-CRITE...)
1 2 52.17.231.199 16509 (AMAZON-02)
1 13.35.253.23 16509 (AMAZON-02)
1 34.95.92.78 15169 (GOOGLE)
1 34.249.86.253 16509 (AMAZON-02)
2 63.140.41.50 15224 (OMNITURE)
1 1 66.117.28.86 15224 (OMNITURE)
1 2600:9000:20b... 16509 (AMAZON-02)
1 64.74.236.51 22075 (AS-OUTBRAIN)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 52.206.32.35 14618 (AMAZON-AES)
2 35.186.226.184 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 35.201.67.47 15169 (GOOGLE)
18 13.35.254.32 16509 (AMAZON-02)
1 151.101.2.2 54113 (FASTLY)
2 2a03:2880:f12... 32934 (FACEBOOK)
1 205.185.208.52 20446 (HIGHWINDS3)
1 52.41.173.154 16509 (AMAZON-02)
2 2 37.252.173.22 29990 (ASN-APPNEXUS)
3 34.215.123.63 16509 (AMAZON-02)
2 2 185.64.189.110 62713 (AS-PUBMATIC)
4 35.160.176.109 16509 (AMAZON-02)
1 1 193.0.160.129 54312 (ROCKETFUEL)
1 1 172.217.18.162 15169 (GOOGLE)
1 13.35.253.95 16509 (AMAZON-02)
3 2a00:1450:400... 15169 (GOOGLE)
2 13.35.254.94 16509 (AMAZON-02)
7 54.165.0.24 14618 (AMAZON-AES)
8 20 152.195.39.114 15133 (EDGECAST)
1 40.89.141.103 8075 (MICROSOFT...)
2 52.94.218.7 16509 (AMAZON-02)
1 70.42.32.51 22075 (AS-OUTBRAIN)
3 2a00:1450:400... 15169 (GOOGLE)
1 52.89.80.23 16509 (AMAZON-02)
1 34.209.133.92 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
2 2.18.235.40 16625 (AKAMAI-AS)
4 104.17.192.78 13335 (CLOUDFLAR...)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 13.35.254.131 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
1 13.35.254.113 16509 (AMAZON-02)
5 13.35.253.82 16509 (AMAZON-02)
1 3.93.90.146 14618 (AMAZON-AES)
1 13.35.254.194 16509 (AMAZON-02)
1 172.217.22.2 15169 (GOOGLE)
2 178.250.0.165 44788 (ASN-CRITE...)
1 104.75.174.31 16625 (AKAMAI-AS)
1 3.92.219.53 14618 (AMAZON-AES)
247 94
Apex Domain
Subdomains
Transfer
36 condenastdigital.com
pixel.condenastdigital.com
4d.condenastdigital.com
infinityid.condenastdigital.com
capture.condenastdigital.com
22 KB
30 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
1 MB
20 advertising.com
adserver-us.adtech.advertising.com
5 KB
16 arstechnica.net
cdn.arstechnica.net
783 KB
11 ad.gt
a.ad.gt
p.ad.gt
ids.ad.gt
pixels.ad.gt
22 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
57 KB
8 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
cm.g.doubleclick.net
pubads.g.doubleclick.net
98 KB
8 google-analytics.com
www.google-analytics.com
21 KB
7 skimresources.com
s.skimresources.com
r.skimresources.com
p.skimresources.com
t.skimresources.com
16 KB
6 facebook.net
connect.facebook.net
142 KB
5 google.com
ampcid.google.com
adservice.google.com
www.google.com
1 KB
5 cnevids.com
api.cnevids.com
player.cnevids.com
60 KB
4 polarcdn-pentos.com
polarcdn-pentos.com
790 B
4 casalemedia.com
as-sec.casalemedia.com
3 KB
4 googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
63 KB
4 google.de
adservice.google.de
ampcid.google.de
www.google.de
744 B
4 tapad.com
pixel.tapad.com
1 KB
4 demdex.net
dpm.demdex.net
condenast.demdex.net
4 KB
4 amazon-adsystem.com
c.amazon-adsystem.com
aax.amazon-adsystem.com
24 KB
3 moatads.com
z.moatads.com
px.moatads.com
177 KB
3 googleapis.com
imasdk.googleapis.com
128 KB
3 polarcdn-terrax.com
polarcdn-terrax.com
13 KB
3 parsely.com
srv-2019-05-30-22.config.parsely.com
srv-2019-05-30-22.pixel.parsely.com
1 KB
3 medtargetsystem.com
www.medtargetsystem.com
50 KB
3 bounceexchange.com
tag.bounceexchange.com
assets.bounceexchange.com
88 KB
3 googletagservices.com
www.googletagservices.com
66 KB
3 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
44 KB
3 arstechnica.com
arstechnica.com
sstats.arstechnica.com
14 KB
2 criteo.com
bidder.criteo.com
426 B
2 plrsrvcs.com
bw-prod.plrsrvcs.com
2 KB
2 pubmatic.com
image2.pubmatic.com
995 B
2 adnxs.com
secure.adnxs.com
2 KB
2 facebook.com
www.facebook.com
251 B
2 snapchat.com
tr.snapchat.com
2 adsrvr.org
match.adsrvr.org
980 B
2 scorecardresearch.com
sb.scorecardresearch.com
1 KB
2 windows.net
optanon.blob.core.windows.net
25 KB
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
123 KB
2 adobedtm.com
assets.adobedtm.com
42 KB
1 2mdn.net
s0.2mdn.net
10 KB
1 polarcdn.com
static.polarcdn.com
115 KB
1 onetrust.com
geolocation.onetrust.com
195 B
1 rfihub.com
p.rfihub.com
890 B
1 jquery.com
code.jquery.com
30 KB
1 quantcount.com
rules.quantcount.com
2 KB
1 everesttech.net
cm.everesttech.net
527 B
1 rlcdn.com
api.rlcdn.com
74 B
1 rkdms.com
mid.rkdms.com
1 criteo.net
static.criteo.net
25 KB
1 t.co
t.co
166 B
1 consensu.org
api.skimlinks.mgr.consensu.org
636 B
1 sc-static.net
sc-static.net
5 KB
1 licdn.com
snap.licdn.com
5 KB
1 sail-horizon.com
ak.sail-horizon.com
42 KB
1 ads-twitter.com
static.ads-twitter.com
2 KB
1 turn.com
d.turn.com
698 B
1 quantserve.com
secure.quantserve.com
6 KB
1 arsdev.net
cdn.accelerator.arsdev.net
296 B
1 zqtk.net
segment-data.zqtk.net
940 B
1 indexww.com
js-sec.indexww.com
40 KB
1 googletagmanager.com
www.googletagmanager.com
62 KB
0 linkedin.com Failed
px.ads.linkedin.com Failed
0 twitter.com Failed
analytics.twitter.com Failed
0 rubiconproject.com Failed
fastlane.rubiconproject.com Failed
247 64
Domain Requested by
28 capture.condenastdigital.com arstechnica.com
20 adserver-us.adtech.advertising.com 8 redirects arstechnica.com
19 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
16 cdn.arstechnica.net arstechnica.com
cdn.arstechnica.net
8 www.google-analytics.com 1 redirects www.googletagmanager.com
www.google-analytics.com
arstechnica.com
7 ids.ad.gt arstechnica.com
6 images.outbrainimg.com arstechnica.com
6 connect.facebook.net arstechnica.com
connect.facebook.net
d2c8v52ll5s99u.cloudfront.net
5 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
4 polarcdn-pentos.com static.polarcdn.com
4 as-sec.casalemedia.com js-sec.indexww.com
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
4 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
4 pixel.tapad.com 2 redirects arstechnica.com
4 4d.condenastdigital.com cdn.arstechnica.net
pixel.condenastdigital.com
3 tpc.googlesyndication.com securepubads.g.doubleclick.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 polarcdn-terrax.com cdn.mediavoice.com
static.polarcdn.com
arstechnica.com
3 www.medtargetsystem.com arstechnica.com
www.medtargetsystem.com
3 dpm.demdex.net 1 redirects arstechnica.com
3 infinityid.condenastdigital.com cdn.arstechnica.net
pixel.condenastdigital.com
d2c8v52ll5s99u.cloudfront.net
3 player.cnevids.com cdn.arstechnica.net
player.cnevids.com
3 www.googletagservices.com cdn.arstechnica.net
securepubads.g.doubleclick.net
3 r.skimresources.com 1 redirects arstechnica.com
2 bidder.criteo.com static.criteo.net
2 srv-2019-05-30-22.pixel.parsely.com arstechnica.com
2 bw-prod.plrsrvcs.com static.polarcdn.com
arstechnica.com
2 z.moatads.com securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
2 aax.amazon-adsystem.com c.amazon-adsystem.com
2 image2.pubmatic.com 2 redirects
2 secure.adnxs.com 2 redirects
2 p.ad.gt a.ad.gt
arstechnica.com
2 www.facebook.com arstechnica.com
connect.facebook.net
2 tr.snapchat.com sc-static.net
2 www.google.de arstechnica.com
2 www.google.com 2 redirects
2 stats.g.doubleclick.net 2 redirects
2 sstats.arstechnica.com arstechnica.com
2 match.adsrvr.org 1 redirects js-sec.indexww.com
2 assets.bounceexchange.com tag.bounceexchange.com
assets.bounceexchange.com
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 sb.scorecardresearch.com 1 redirects arstechnica.com
www.googletagmanager.com
2 optanon.blob.core.windows.net www.googletagmanager.com
optanon.blob.core.windows.net
2 c.amazon-adsystem.com cdn.arstechnica.net
c.amazon-adsystem.com
2 p.skimresources.com arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 assets.adobedtm.com arstechnica.com
assets.adobedtm.com
1 px.moatads.com arstechnica.com
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 s0.2mdn.net imasdk.googleapis.com
1 static.polarcdn.com securepubads.g.doubleclick.net
1 pixels.ad.gt p.ad.gt
1 mcdp-nydc1.outbrain.com widgets.outbrain.com
1 geolocation.onetrust.com code.jquery.com
1 cm.g.doubleclick.net 1 redirects
1 p.rfihub.com 1 redirects
1 code.jquery.com optanon.blob.core.windows.net
1 odb.outbrain.com widgets.outbrain.com
1 t.skimresources.com s.skimresources.com
1 pagead2.googlesyndication.com securepubads.g.doubleclick.net
1 log.outbrainimg.com widgets.outbrain.com
1 rules.quantcount.com secure.quantserve.com
1 cm.everesttech.net 1 redirects
1 condenast.demdex.net arstechnica.com
1 api.rlcdn.com js-sec.indexww.com
1 mid.rkdms.com js-sec.indexww.com
1 static.criteo.net js-sec.indexww.com
1 ampcid.google.de www.google-analytics.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 t.co arstechnica.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 adservice.google.de www.googletagservices.com
1 srv-2019-05-30-22.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 ampcid.google.com www.google-analytics.com
1 sc-static.net arstechnica.com
1 snap.licdn.com arstechnica.com
1 a.ad.gt www.googletagmanager.com
1 tag.bounceexchange.com arstechnica.com
1 ak.sail-horizon.com www.googletagmanager.com
1 static.ads-twitter.com www.googletagmanager.com
1 d.turn.com arstechnica.com
1 secure.quantserve.com www.googletagmanager.com
1 cdn.accelerator.arsdev.net cdn.arstechnica.net
1 cdn.mediavoice.com cdn.arstechnica.net
1 segment-data.zqtk.net cdn.arstechnica.net
1 js-sec.indexww.com cdn.arstechnica.net
1 pixel.condenastdigital.com cdn.arstechnica.net
1 widgets.outbrain.com cdn.arstechnica.net
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 arstechnica.com
0 px.ads.linkedin.com Failed snap.licdn.com
0 analytics.twitter.com Failed static.ads-twitter.com
0 fastlane.rubiconproject.com Failed js-sec.indexww.com
247 96
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign Organization Validation CA - SHA256 - G2
2018-09-14 -
2019-09-29
a year crt.sh
assets.adobedtm.com
DigiCert SHA2 High Assurance Server CA
2019-03-04 -
2020-03-11
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cnevids.com
Trusted Secure Certificate Authority 5
2017-01-10 -
2020-01-10
3 years crt.sh
*.cloudfront.net
DigiCert Global CA G2
2018-10-08 -
2019-10-09
a year crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-03-28 -
2019-09-07
5 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
c.amazon-adsystem.com
Amazon
2018-12-18 -
2019-11-21
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-05-08 -
2020-03-09
10 months crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-25 -
2019-12-11
a year crt.sh
*.accelerator.arsdev.net
Amazon
2018-08-14 -
2019-09-14
a year crt.sh
*.conde.io
Amazon
2019-04-24 -
2020-05-24
a year crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2018-10-16 -
2019-10-21
a year crt.sh
*.turn.com
DigiCert SHA2 Secure Server CA
2019-01-25 -
2020-03-31
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-04-22 -
2019-07-21
3 months crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2018-08-16 -
2019-08-21
a year crt.sh
ak.sail-horizon.com
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
tag.bounceexchange.com
Thawte RSA CA 2018
2018-08-13 -
2020-08-12
2 years crt.sh
*.ad.gt
Amazon
2018-08-03 -
2019-09-03
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
medtargetsystem.com
Amazon
2018-11-23 -
2019-12-23
a year crt.sh
sc-static.net
DigiCert SHA2 Secure Server CA
2019-03-11 -
2021-03-15
2 years crt.sh
*.blob.core.windows.net
Microsoft IT TLS CA 5
2019-05-01 -
2021-05-01
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.tapad.com
DigiCert SHA2 Secure Server CA
2018-01-17 -
2019-11-02
2 years crt.sh
*.google.com
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
*.config.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2018-08-15 -
2019-10-23
a year crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-03-07 -
2020-03-07
a year crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-04-05 -
2019-10-12
6 months crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.bounceexchange.com
Amazon
2018-08-21 -
2019-09-21
a year crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-03-26 -
2020-03-30
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.rkdms.com
Entrust Certification Authority - L1K
2017-10-09 -
2020-10-30
3 years crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-04-24 -
2020-04-23
a year crt.sh
sstats.arstechnica.com
DigiCert SHA2 High Assurance Server CA
2019-03-03 -
2020-06-05
a year crt.sh
www.google.de
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
tr.snapchat.com
DigiCert SHA2 Secure Server CA
2019-02-19 -
2021-02-23
2 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-01 -
2019-09-07
5 months crt.sh
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh
*.googleapis.com
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2017-06-08 -
2020-06-19
3 years crt.sh
aax-eu.amazon-adsystem.com
Amazon
2018-12-12 -
2019-12-10
a year crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
ssl962736.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-19 -
2019-12-11
a year crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
ssl887612.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-03-21 -
2019-09-27
6 months crt.sh
ssl880796.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-02-20 -
2019-08-29
6 months crt.sh
*.doubleclick.net
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
*.pixel.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
*.criteo.com
DigiCert SHA2 Secure Server CA
2018-11-05 -
2020-01-03
a year crt.sh

This page contains 12 frames:

Primary Page: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Frame ID: F871C27E446C4B725B00F1287BEDF35B
Requests: 211 HTTP requests in this frame

Frame: https://condenast.demdex.net/dest5.html?d_nsid=0
Frame ID: F97B0CD60B83B051A68114746F48EF8F
Requests: 1 HTTP requests in this frame

Frame: https://tr.snapchat.com/cm/i
Frame ID: 122A8F3A185A0915B42632F9331E0BAC
Requests: 1 HTTP requests in this frame

Frame: https://tr.snapchat.com/p
Frame ID: AEC11E5FD519E60E6A4183965509D08E
Requests: 1 HTTP requests in this frame

Frame: https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com&_sid=1fefb666-d75d-485c-9588-30360abd6297&_vid=d1dd8f3a-c8f5-4a15-873b-9e69d36cbf55&_ak=119-556-B0E9F642&_flash=false&_th=1559254268|1559254268|1
Frame ID: 1B0652FF2B20FAAA1700D3535105DD38
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: A51273AC1721109CD8D19C8AAA2D9D46
Requests: 29 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 3DE6518DF0CE08C916B4B1DC06107A55
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-33/html/container.html
Frame ID: 666E19BDB961EBDE3DFD59ECAEFBD60B
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-33/html/container.html
Frame ID: 5EA83D474A4E9D742D632458687CBCAB
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssobs2Qgoj4E3-KTA0UweoYge-XXE5IPBC8cgWVghVgfqKkemt4ZmMEr_uvzArkpkQIj3DkrFGWX1MszmlWPSpwj2sl2LOCNHuduSrAjJDmeMJ353WSK9YmrMTTzvF4-qNHsn8JaKADVL_10jR5wXxYr5L1MyIF5RuxNM86yce2BuvCyyeWlyng0egNJwh9KYubIGn9pxqVFgAZgqb9kdtHoWUpff_anSLGxMjK4DZ3IJ6UInRY2Jv9KJGDHtlOvwceXjVuujkYBIP2SAJKHFXLdhqXedcAcA2VyzhHZA&sig=Cg0ArKJSzOEl8ZOVa-F0EAE&urlfix=1&adurl=
Frame ID: D886C8B68862719345CDD1AD49CDB63C
Requests: 12 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.309.0_en.html
Frame ID: 57A1AC6A0B5ED6C5EF239EDDF9E8091E
Requests: 1 HTTP requests in this frame

Frame: https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Frame ID: 84D64CE78E99F73667E5FD8EF481289C
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^bouncex$/i

Overall confidence: 100%
Detected patterns
  • env /^criteo/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i
  • env /^google_tag_manager$/i

Overall confidence: 100%
Detected patterns
  • env /^moment$/i

Overall confidence: 100%
Detected patterns
  • env /^(?:OutbrainPermaLink|OB_releaseVer)$/i

Overall confidence: 100%
Detected patterns
  • env /^PARSELY$/i

Overall confidence: 100%
Detected patterns
  • env /^quantserve$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

247
Requests

94 %
HTTPS

22 %
IPv6

64
Domains

96
Subdomains

94
IPs

8
Countries

3524 kB
Transfer

8819 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 32
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DC5CQYX519CQX0AAH0QGK7RQ&persistence=1&checksum=28e2d18873c56933ab72f2cb3b89d6a0a125fc2c9795355438e6a7f5ac0cc265
Request Chain 59
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1559254268844&ns_c=UTF-8&c8=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1559254268844&ns_c=UTF-8&c8=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&c9=
Request Chain 60
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=ADB&partner_device_id=undefined HTTP 302
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
Request Chain 61
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=648&partner_device_id=undefined HTTP 302
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
Request Chain 91
  • https://cm.everesttech.net/cm/dd?d_uuid=18203107120512565512498730219423746359 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XPBU-QAAFDVYbhN_
Request Chain 95
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j76&tid=UA-31997-1&cid=1322214306.1559254269&jid=423938719&gjid=160072815&_gid=111453486.1559254269&_u=aGBAgUAjAAQC~&z=239747133 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1322214306.1559254269&jid=423938719&_v=j76&z=239747133 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1322214306.1559254269&jid=423938719&_v=j76&z=239747133&slf_rd=1&random=1700751280
Request Chain 130
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=af10e257-1250-4264-a52d-58400d0fa1f5&adnxs_id=$UID HTTP 302
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3Daf10e257-1250-4264-a52d-58400d0fa1f5%26adnxs_id%3D%24UID HTTP 302
  • https://ids.ad.gt/api/v1/match?id=af10e257-1250-4264-a52d-58400d0fa1f5&adnxs_id=8081147992830129603
Request Chain 131
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=af10e257-1250-4264-a52d-58400d0fa1f5 HTTP 302
  • https://ids.ad.gt/api/v1/t_match?tdid=523c6aed-cccb-4898-8423-3172bbca8824&id=af10e257-1250-4264-a52d-58400d0fa1f5
Request Chain 132
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Daf10e257-1250-4264-a52d-58400d0fa1f5 HTTP 302
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Daf10e257-1250-4264-a52d-58400d0fa1f5 HTTP 302
  • https://ids.ad.gt/api/v1/pbm_match?pbm=92558141-8764-4171-8DDA-6543189FCC44&id=af10e257-1250-4264-a52d-58400d0fa1f5
Request Chain 133
  • https://dpm.demdex.net/ibs:dpid=348447&dpuuid=af10e257-1250-4264-a52d-58400d0fa1f5&redir=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fadb_match%3Fadb%3D%24%7BDD_UUID%7D%26id%3Daf10e257-1250-4264-a52d-58400d0fa1f5 HTTP 302
  • https://ids.ad.gt/api/v1/adb_match?adb=18203107120512565512498730219423746359&id=af10e257-1250-4264-a52d-58400d0fa1f5
Request Chain 134
  • https://p.rfihub.com/cm?pub=38725&userid=af10e257-1250-4264-a52d-58400d0fa1f5&in=1&forward=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fszm_match%3Fszm%3D{userid}%26id%3Daf10e257-1250-4264-a52d-58400d0fa1f5 HTTP 302
  • https://ids.ad.gt/api/v1/szm_match?szm=1871316016295311026&id=af10e257-1250-4264-a52d-58400d0fa1f5
Request Chain 135
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=af10e257-1250-4264-a52d-58400d0fa1f5 HTTP 302
  • https://ids.ad.gt/api/v1/g_match?id=af10e257-1250-4264-a52d-58400d0fa1f5&google_gid=CAESEBUkLvjii_6fGPh4MsGTCD0&google_cver=1&google_ula=450542624,0
Request Chain 149
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
Request Chain 150
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
Request Chain 156
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
Request Chain 157
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
Request Chain 199
  • https://www.google-analytics.com/r/collect?v=1&_v=j76&a=1901699954&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&ul=en-us&de=UTF-8&dt=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGDAAUI7AAQC~&jid=1327594066&gjid=18530472&cid=1322214306.1559254269&tid=UA-87198801-1&_gid=111453486.1559254269&_r=1&cd1=af10e257-1250-4264-a52d-58400d0fa1f5&cd2=LU6O0M&cd4=arstechnica.com&cd5=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cd6=Passive%20Tagger&cd7=df9f3690e4a7230cb52fa27315030b55&cd9=1090350&cd3=57&z=1111171531 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=1322214306.1559254269&jid=1327594066&_gid=111453486.1559254269&gjid=18530472&_v=j76&z=1111171531 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1322214306.1559254269&jid=1327594066&_v=j76&z=1111171531 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1322214306.1559254269&jid=1327594066&_v=j76&z=1111171531&slf_rd=1&random=2401049036
Request Chain 211
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Ad708dd48-8327-11e9-8154-12795fd23bd8;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
Request Chain 212
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Ad708e356-8327-11e9-86a0-124c2db8624e;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
Request Chain 213
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Ad708fc60-8327-11e9-9d8f-12d220623a1c;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
Request Chain 214
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Ad709771c-8327-11e9-a8f6-12783854d8e0;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ

247 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
39 KB
13 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Melrose Park, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
209799de192e39960a90b48e1a42d43dbbffb3f94fccc0b43c92861e25c8b6d3
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
nginx
date
Thu, 30 May 2019 22:11:08 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web207
content-encoding
gzip
main-ee8a517068.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
333 KB
69 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
d1f040ddc24ced05d36b446b766130c82f3d7f189fed492757d32562407ece6d

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
70595
x-cf-tsc
1558043150
x-cf2
H
last-modified
Thu, 16 May 2019 21:43:58 GMT
server
CFS 0215
x-cff
B
etag
W/"5cddd99e-53529"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
redirected-site-800x493.jpg
cdn.arstechnica.net/wp-content/uploads/2019/05/
33 KB
33 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2019/05/redirected-site-800x493.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
8dfbd001505c2735e7549657378581b8505208ab49a9c869dd45826235fdb775

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1559170751:cacheN.fra2-01:H
status
200
content-length
33608
x-cf-tsc
1559171270
x-cf2
H
last-modified
Wed, 29 May 2019 22:39:22 GMT
server
CFS 0215
x-cff
B
etag
"5cef0a1a-8348"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
133
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
main-7e49d3e8aa.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
648 KB
211 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-7e49d3e8aa.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
8e20e4fc68fc89ebbb0721768b47112e03d8c9ff1a97100978572973d261bd12

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1559226284:cacheN.fra2-01:H
status
200
content-length
215659
x-cf-tsc
1559226285
x-cf2
H
last-modified
Wed, 29 May 2019 23:04:33 GMT
server
CFS 0215
x-cff
B
etag
W/"5cef1001-a1f68"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
ars-3b01442aaa.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
3 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-3b01442aaa.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
64d2d3dc68f59fec33141b38317ceb57a980c650041004016ebeddb7dc609a28

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1554153455:cacheN.fra2-01:H
status
200
content-length
1589
x-cf-tsc
1559171162
x-cf2
H
last-modified
Wed, 29 May 2019 23:04:33 GMT
server
CFS 0215
x-cff
B
etag
W/"5cef1001-de9"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
74 KB
23 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.23 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-23.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
27ee41d3fd05096e2e40507d7d1b6edfb71423aaaea35cfe24d0be18b6eeb006

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
last-modified
Wed, 15 May 2019 19:02:35 GMT
server
Apache
etag
"262b5b65e9b10aa157d4be8da094be2d:1557946955"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
23282
expires
Thu, 30 May 2019 23:11:08 GMT
100098X1555750.skimlinks.js
s.skimresources.com/js/
38 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ed388c5bf638b1283d1519da95677454a4ea674a4e1170b1c9cbbec7f579e596

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
last-modified
Wed, 29 May 2019 11:09:42 GMT
server
AmazonS3
x-amz-request-id
C1F9AE00A8F6A9AF
etag
"1bec64b22204580fa48deb33f1dd60fe"
x-hw
1559254268.cds032.lo4.hn,1559254268.cds058.lo4.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
14631
x-amz-id-2
nwTQkZMLQlPgo9jQXpgSOs+4tfe6Ht6pPiU99caR1MNW1TeopJ0oixihiidHAGH5C+zjipVkUqU=
services.min.js
cdn.arstechnica.net/cns/
149 KB
43 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/services.min.js?1559253600
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
e0bc825bf1ad06e19cb2114d44803ff3df13e383b8a39642c9f6009c5ab8b51a

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-cf3
M
x-amz-request-id
1EB5CDB0259A3E47
x-cf1
14961:fA.fra2:co:1558709036:cacheN.fra2-01:H
status
200
content-length
43886
x-amz-id-2
QGo/rjL8e0EJGsFxym1U7bH7DzsmNtebTlCahmQAa9ExGmidRAxLq/ypI9fknzOaD4hpfQFSz28=
x-served-by
cache-mdw17354-MDW
cf4ttl
120.500
x-cf2
H
last-modified
Fri, 24 May 2019 13:33:37 GMT
server
CFS 0215
x-timer
S1558709038.079927,VS0,VE1
x-cff
B
etag
"b42d29b976c50697d31a99e68c52dbb1"
vary
Accept-Encoding
x-amz-version-id
NgJ4oLz9_lgNOaPsfmCn3nfB3PHYwli3
access-control-allow-origin
*
expires
Thu, 25 Jul 2019 22:11:08 GMT
cache-control
max-age=4838400
cf4age
1
accept-ranges
bytes
content-type
text/javascript
x-cf-tsc
1558709038
x-cache-hits
1
gtm.js
www.googletagmanager.com/
254 KB
62 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
d9e60320a4d0456df977fe79f2e6e9e8afb50bd15237eaf2b9711cfb2a967f93
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
br
last-modified
Thu, 30 May 2019 16:41:01 GMT
server
Google Tag Manager (scaffolding)
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
63673
x-xss-protection
0
expires
Thu, 30 May 2019 22:11:08 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
Dang.jpg
cdn.arstechnica.net/wp-content/uploads/2018/10/
90 KB
91 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2018/10/Dang.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
d6f350f62fc19bfd7091e3841649be70e806fb94c00a1f777dbed2ea8ecc9daa

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
92486
x-cf-tsc
1559069774
x-cf2
H
last-modified
Mon, 08 Oct 2018 19:35:22 GMT
server
CFS 0215
x-cff
B
etag
"5bbbb17a-16946"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
44505
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
4809
x-cf-tsc
1557512129
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
25592
x-cf-tsc
1557512136
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24264
x-cf-tsc
1557512136
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24212
x-cf-tsc
1557512136
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22872
x-cf-tsc
1557512136
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18972
x-cf-tsc
1557512136
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18824
x-cf-tsc
1557512136
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
19516
x-cf-tsc
1557512136
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22104
x-cf-tsc
1557512136
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
49843
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
outbrain.js
widgets.outbrain.com/
96 KB
34 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1559254268636
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-7e49d3e8aa.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
0453d60edbea9e4df7740b1f6c9c08530a3744b0635630b0d18fcb8529093525

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:08 GMT
Content-Encoding
gzip
Last-Modified
Thu, 30 May 2019 07:30:35 GMT
Server
Apache
ETag
"661a124326e72a32e7de807f3f165c7c:1559201435"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
34733
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-7e49d3e8aa.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.4.39.251 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-39-251.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
00dc23ee3d91668211435b6494c0203ec87733b52e69e678987c2a4d7dea93f9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
650
X-XSS-Protection
1; mode=block
X-Request-Id
b815de0f-3910-473f-9c44-f64fad7f001f
X-Runtime
0.002102
X-Backend-Node
10.110.44.187
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"96b590bfaec033e856a6b19bfb328e73"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.41 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-41.fra6.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Thu, 30 May 2019 00:50:13 GMT
Content-Encoding
gzip
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
Age
76851
ETag
W/"53191693-19c1"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 94faae20b0f122c4555025f52a2fd745.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
Connection
keep-alive
X-Amz-Cf-Id
IrYByVGGZ2umRdB04ugBnSiJSJkIdrwf0NZhBK0vmDoY7NcX2n3paA==
Expires
Fri, 31 May 2019 00:50:13 GMT
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.239 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e53759cbefbca7ac3585c5a7586b03a20b664142fa2bb668ba1d11213c97f423

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:08 GMT
Content-Encoding
gzip
Age
276107
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
3, 19462
Connection
keep-alive
Content-Length
13219
x-amz-id-2
xd1+yeEFTU9q2brJ2F7DjIW+4XlI5g+WcyXrwk3x6llRKqsAjUEQ2JZsBiTSzr75ABhMkGX0ZR8=
X-Served-By
cache-iad2141-IAD, cache-hhn1523-HHN
Last-Modified
Mon, 28 Jan 2019 17:44:57 GMT
Server
AmazonS3
X-Timer
S1559254269.825937,VS0,VE0
ETag
"4beefaddd4ac53cdf6e84d0d370b0aa1"
Vary
Accept-Encoding
x-amz-request-id
3CF8D054D39F1709
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Mon, 28 Jan 2019 23:44:56 GMT
s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
67 KB
19 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.23 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-23.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
de4de18224e2109f2f8ff4ce9a40cb51c6a36724b2df68e8bd6080b8ee3a02d0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
last-modified
Wed, 15 May 2019 19:02:35 GMT
server
Apache
etag
"06a88b0424fa26cefa8da4fc4967b294:1557946955"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
19132
expires
Thu, 30 May 2019 23:11:08 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DC5CQYX519CQX0AAH0QGK7RQ&persistence=1&checksum=28e2d18873c56933ab72f2cb3b89d6a0a125fc2c9795355438e6a7f5ac0cc265
0
-1 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DC5CQYX519CQX0AAH0QGK7RQ&persistence=1&checksum=28e2d18873c56933ab72f2cb3b89d6a0a125fc2c9795355438e6a7f5ac0cc265
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Origin
null
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
location
//r.skimresources.com/api/?xguid=01DC5CQYX519CQX0AAH0QGK7RQ&persistence=1&checksum=28e2d18873c56933ab72f2cb3b89d6a0a125fc2c9795355438e6a7f5ac0cc265
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
307
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193

Redirect headers

date
Thu, 30 May 2019 22:11:08 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DC5CQYX519CQX0AAH0QGK7RQ&persistence=1&checksum=28e2d18873c56933ab72f2cb3b89d6a0a125fc2c9795355438e6a7f5ac0cc265
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
px.gif
p.skimresources.com/
43 B
471 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=5.686583792509524
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
status
200
x-guploader-uploadid
AEnB2Uq2SkO-UJH76ShsCgTW0jREnuUl9c1CszWGo-RGyYpxnNlQ0xNDBH8xsUpm2pnuIY-ldfudGj9pXBYfEWR4Eo9N7jCTlQ
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1559254268.cds032.lo4.hn,1559254268.cds101.lo4.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=5.686583792509524
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
status
200
x-guploader-uploadid
AEnB2Uq2SkO-UJH76ShsCgTW0jREnuUl9c1CszWGo-RGyYpxnNlQ0xNDBH8xsUpm2pnuIY-ldfudGj9pXBYfEWR4Eo9N7jCTlQ
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1559254268.cds032.lo4.hn,1559254268.cds101.lo4.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
yubikey-promo-2x-a2b77428d4.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
153 KB
153 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/yubikey-promo-2x-a2b77428d4.png
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-7e49d3e8aa.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f984105fa8d01eee607c197a2b918604aa4c0d608f1cbf8a0f15f6502d2318d

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-ee8a517068.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fA.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
156233
x-cf-tsc
1557512143
x-cf2
H
last-modified
Wed, 08 May 2019 20:08:33 GMT
server
CFS 0215
x-cff
B
etag
"5cd33741-26249"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 25 Jul 2019 22:11:08 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ded8aafe08adcc23835de89f62fbee0b98184f32296c7679ab5b5a358f044f63

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
gpt.js
www.googletagservices.com/tag/js/
31 KB
10 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
3e1db5676b80df5037677c4e83ac3383602e39934db7b57afcdfa79f91bbed7a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"182 / 611 of 1000 / last-modified: 1559232341"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10462
x-xss-protection
0
expires
Thu, 30 May 2019 22:11:08 GMT
apstag.js
c.amazon-adsystem.com/aax2/
68 KB
20 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.1.198 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-86-1-198.fra6.r.cloudfront.net
Software
Server /
Resource Hash
2bcbed8ade63c6e0da313465ab20b2e2e5e5e020609551b4916431d121f46c5f

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 18:13:14 GMT
Content-Encoding
gzip
Server
Server
Age
14273
ETag
fd23b0793c72e73c94f81e99274c36bd
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 87b272b7d9b97f38da15c91c833c3292.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
X-Amz-Cf-Id
GFMc3B2U2JDtBhACVEcEph030jxwg1e2qtpYLgofy-B1zRWfHBRwbQ==
arstechnica.js
player.cnevids.com/interlude/
109 KB
28 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.40 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-40.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
3399bc757b58a542d4d8aba842551e5c6390957cb970f2fcfd220986f4d58f95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:10:24 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
44
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
X-XSS-Protection
1; mode=block
X-Request-Id
e9233be3-ce4a-4635-a223-ce044d0ee5f7
X-Runtime
0.015738
X-Backend-Node
10.110.29.24
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"8233745b6dc105b9e66cf5d01d53e0bd"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 d5fb859c39a16d7f218b4c7fb1528ad6.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
u1HCJNzq_4Ua7DfrkpoMhWIR1BeEcxApKvtlWgWr-FJ_8Nhw7wamlA==
htw-condenast.js
js-sec.indexww.com/ht/
178 KB
40 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/htw-condenast.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
308afb26a01030505c4cfb14c244cc71d7817e54915313361c36d18c67ad83e5

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:08 GMT
Content-Encoding
gzip
Last-Modified
Thu, 30 May 2019 21:25:06 GMT
Server
Apache
ETag
"902fdc-2c97f-58a21882a7e5f"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=1065
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
40057
Expires
Thu, 30 May 2019 22:28:53 GMT
conde-nast
segment-data.zqtk.net/
669 B
940 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.183.205 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-30-183-205.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
3723f097b901da6a53718e41e4cc5357805cf5b203aa44e65ae36dcad533498a

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:08 GMT
Last-Modified
Wed, 29 May 2019 23:05:47 GMT
Server
nginx/1.10.3 (Ubuntu)
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Content-Length
669
Expires
Fri, 31 May 2019 23:05:47 GMT
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
cf-cache-status
HIT
status
200
content-type
text/javascript
content-length
2018
via
1.1 varnish
server
cloudflare
cache-control
max-age=21600
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1288165578 1288029802
x-country
DE
cf-ipcountry
DE
accept-ranges
bytes
cf-ray
4df40acc89a197de-FRA
https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F
cdn.accelerator.arsdev.net/h/
12 B
296 B
Script
General
Full URL
https://cdn.accelerator.arsdev.net/h/https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F?callback=arsData
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.62 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-62.fra6.r.cloudfront.net
Software
nginx/1.4.6 (Ubuntu) / PHP/5.5.9-1ubuntu4.9
Resource Hash
18c4dfbdcbf664e92468c3a09814db7f114f9b393613e2cb077d81565d496f8d

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:13:51 GMT
via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
server
nginx/1.4.6 (Ubuntu)
x-powered-by
PHP/5.5.9-1ubuntu4.9
x-cache
Miss from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=300, public
x-amz-cf-id
d9cr5XdS_BLfonkZEofD903eAhAv8oN685x-sOSfbqZRfnDPHp6Wkg==
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.7.45.119 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-7-45-119.compute-1.amazonaws.com
Software
/
Resource Hash
255459e1a8064659aafc676ac6460bc9f108f5cf1e6f06ccc1ef1ecc0a96f439

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1559254268798
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.226.174.86 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-226-174-86.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
f1e43a9695ecf8bb817ce53516579b7a17d7aa82aef2bc0bdb244488fb89ff00

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
id
dpm.demdex.net/
5 KB
2 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1559254268831
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.128.62.29 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-128-62-29.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
4037f6cac585a7787da0ec8a405a026768a110309702c00eaf1d8ca76fa491ca

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v029-0473ec989.edge-irl1.demdex.com 5.53.0.20190510073505 4ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
BNEQ9+g0TVc=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
1514
Expires
Thu, 01 Jan 1970 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8f88cb7a1cd4134f5d616b9fca90b9069fa16c162b7ae66ba1b500c490b41dd2
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 21 May 2019 23:53:44 GMT
server
Golfe2
age
2315
date
Thu, 30 May 2019 21:32:33 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
17595
expires
Thu, 30 May 2019 23:32:33 GMT
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.198 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:08 GMT
Content-Encoding
gzip
Last-Modified
Thu, 30-May-2019 22:11:08 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Thu, 06 Jun 2019 22:11:08 GMT
PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/
253 B
698 B
Script
General
Full URL
https://d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
46.228.164.13 , United Kingdom, ASN56396 (TURN, GB),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b5b7d6c8e0d655131338281c7655a457ca32f4e259baddb5f9acdefa2f87ba4a

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:08 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
Content-Type
text/javascript;charset=UTF-8
Content-Length
253
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
fbevents.js
connect.facebook.net/en_US/
53 KB
15 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
fa59b1ed1b011e084474ad818b5f6986d84fc678e2f37fee9330eb52d86860b3
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15397
x-xss-protection
0
pragma
public
x-fb-debug
HpSQRNtyEHPoD5pRzkieFAbguzSdfUB8v8/JzU2WVsFJZKKquf356ucDa4BYLsQ0PDZZCOToLOzaNZEZ3HgX5w==
date
Thu, 30 May 2019 22:11:08 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.36.157 Amsterdam, Netherlands, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
age
24464
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-ams21042-AMS
last-modified
Tue, 23 Jan 2018 19:05:33 GMT
x-timer
S1559254269.866324,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
spm.v1.min.js
ak.sail-horizon.com/spm/
116 KB
42 KB
Script
General
Full URL
https://ak.sail-horizon.com/spm/spm.v1.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.109 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-109.fra6.r.cloudfront.net
Software
Apache /
Resource Hash
bdceabc5bd9625f9234f2debcd0dcedbbd5b3ac0c2d1afd8fc8c2130c524fe15

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:09:37 GMT
content-encoding
gzip
last-modified
Tue, 28 May 2019 17:47:10 GMT
server
Apache
age
91
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
status
200
cache-control
max-age=600; must-revalidate
accept-ranges
bytes
content-length
42803
via
1.1 d5fb859c39a16d7f218b4c7fb1528ad6.cloudfront.net (CloudFront)
x-amz-cf-id
i0wPbcy_Y1dWbovJjKf82P7BI59Fqw5H56YW7R7bt0KM9Y_bQaD7Qw==
i.js
tag.bounceexchange.com/2806/
10 KB
4 KB
Script
General
Full URL
https://tag.bounceexchange.com/2806/i.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.92.63 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
63.92.190.35.bc.googleusercontent.com
Software
fasthttp /
Resource Hash
620d140cc74c6af3b974af1d0c380498215deb97a401384a46ca1d1fa566c326

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
server
fasthttp
etag
96c97a61696b87
content-type
text/plain; charset=utf-8
status
200
cache-control
no-cache, must-revalidate
x-region
europe-west3
alt-svc
clear
content-length
3588
via
1.1 google
57
a.ad.gt/api/v1/u/matches/
3 KB
2 KB
Script
General
Full URL
https://a.ad.gt/api/v1/u/matches/57
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.33.26.96 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-33-26-96.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
c15b17a3fcd87ed89f5573f00ac2371ab613c8645a252be1dae04beef4f7fb94

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
Content-Encoding
gzip
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
1289
Content-Type
text/html; charset=utf-8
insight.min.js
snap.licdn.com/li.lms-analytics/
15 KB
5 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:28c::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
bc9cef10d07e8da3ce80181de07a056414731f86e0dc12e2c81d652b28ac770b

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:08 GMT
Content-Encoding
gzip
Last-Modified
Mon, 03 Dec 2018 23:03:30 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=32330
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4571
beacon.js
www.medtargetsystem.com/javascript/
171 KB
50 KB
Script
General
Full URL
https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
989218ee67c40be42303c9b6227c617176ba979004225510be65c203695d4ba1

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
Content-Encoding
gzip
Last-Modified
Thu, 23 May 2019 21:03:33 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"2ad33-589946a2c3340-gzip"
Vary
X-Forwarded-Proto,Accept-Encoding
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
51036
scevent.min.js
sc-static.net/
13 KB
5 KB
Script
General
Full URL
https://sc-static.net/scevent.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.111 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-111.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
444fcc33e065e2597a8b67303ac2f1a311b1972387f0594bd428391b78c0dfcf

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 16:30:11 GMT
content-encoding
gzip
last-modified
Fri, 17 May 2019 21:29:07 GMT
server
AmazonS3
age
20463
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, s-maxage=86400, max-age=600
x-amz-cf-id
kt6UncRCK4N85Cx9keKLB56Ayyt1QiPzR2tKOGLWv79iWNYHfbOaNw==
via
1.1 04599a8a3c6eb66f23e5ae02d1ec4cf2.cloudfront.net (CloudFront)
c941cf3b-dfcd-475f-90e4-e7f422fc89dd.js
optanon.blob.core.windows.net/consent/
135 KB
18 KB
Script
General
Full URL
https://optanon.blob.core.windows.net/consent/c941cf3b-dfcd-475f-90e4-e7f422fc89dd.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.137.4 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
87d87327b6e81abe3c669cf6f7eb46e37d9920124350bd47a3c33c5194e40a8f

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Thu, 30 May 2019 22:11:09 GMT
Content-Encoding
GZIP
Last-Modified
Wed, 15 May 2019 20:31:07 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
I5FvMIogRRyjBkU+M5Kzig==
ETag
0x8D6D97442B296A7
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
x-ms-request-id
b747cf46-501e-0045-3b34-170577000000
Access-Control-Expose-Headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
Cache-Control
public, max-age=14400
x-ms-version
2009-09-19
Content-Length
18122
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1559254268844&ns_c=UTF-8&c8=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%2...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1559254268844&ns_c=UTF-8&c8=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1559254268844&ns_c=UTF-8&c8=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&c9=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.43.115.95 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-43-115-95.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:09 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1559254268844&ns_c=UTF-8&c8=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&c9=
Pragma
no-cache
Date
Thu, 30 May 2019 22:11:08 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
check
pixel.tapad.com/idsync/ex/receive/
Redirect Chain
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=ADB&partner_device_id=undefined
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
95 B
332 B
Image
General
Full URL
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.227.248.159 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
159.248.227.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

date
Thu, 30 May 2019 22:11:09 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
location
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=ADB&partner_device_id=undefined
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
302
alt-svc
clear
content-length
0
check
pixel.tapad.com/idsync/ex/receive/
Redirect Chain
  • https://pixel.tapad.com/idsync/ex/receive?partner_id=648&partner_device_id=undefined
  • https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
95 B
321 B
Image
General
Full URL
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.227.248.159 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
159.248.227.35.bc.googleusercontent.com
Software
Jetty(8.1.13.v20130916) /
Resource Hash
3eb10792d1f0c7e07e7248273540f1952d9a5a2996f4b5df70ab026cd9f05517

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
200
content-type
image/png
alt-svc
clear
content-length
95

Redirect headers

date
Thu, 30 May 2019 22:11:09 GMT
via
1.1 google
server
Jetty(8.1.13.v20130916)
location
https://pixel.tapad.com/idsync/ex/receive/check?partner_id=648&partner_device_id=undefined
p3p
policyref="http://tapad-taptags.s3.amazonaws.com/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
status
302
alt-svc
clear
content-length
0
/
r.skimresources.com/api/
130 B
440 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DC5CQYX519CQX0AAH0QGK7RQ&persistence=1&checksum=28e2d18873c56933ab72f2cb3b89d6a0a125fc2c9795355438e6a7f5ac0cc265
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
51b88a6854a6aed909efe51e86467b6d2ea6e736522a563e9e732278517051ea
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
932 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 21:13:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
3462
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
856
x-xss-protection
0
expires
Thu, 30 May 2019 22:13:27 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
426 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4013:c01::8a Groningen, Netherlands, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
arstechnica.com
srv-2019-05-30-22.config.parsely.com/config/
419 B
837 B
Script
General
Full URL
https://srv-2019-05-30-22.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.236.116.189 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-236-116-189.compute-1.amazonaws.com
Software
/ Express
Resource Hash
4c8ee27637970aea52d73d7831c3cd8cc279fb969ccb1a4cc341ac038db5301d

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
Cache-Control
private, no-cache
Connection
keep-alive
X-Powered-By
Express
ETag
W/"1a3-7XD1e/saIp+QbXBhCnWgnQ"
Content-Length
419
Content-Type
text/javascript; charset=utf-8
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
pubads_impl_2019052302.js
securepubads.g.doubleclick.net/gpt/
148 KB
54 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019052302.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.2 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
sffe /
Resource Hash
d6553a6c991fe91210741e39d64cea8f76b37d71a4905ad673e887f123a7db5a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 23 May 2019 16:46:45 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
55282
x-xss-protection
0
expires
Thu, 30 May 2019 22:11:09 GMT
228464857488266
connect.facebook.net/signals/config/
207 KB
55 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/228464857488266?v=2.8.47&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
7f9662369c61c27fd0638de306a8047adc64e37b9664f76f27b351159830ebcf
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
56215
x-xss-protection
0
pragma
public
x-fb-debug
lexluNVm9Jl8WYuO+B6SaIDn+9qalVMxIR5fLYGrimpt17sF0VS+fpkAp+1QVcNi4Z4mlQL/d+8lKEpGddak7g==
date
Thu, 30 May 2019 22:11:09 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pID=&sID=&uId=&xid=&_ts=2019-05-30T22%3A11%3A08.931Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22no%20slot%22%2C%22pageTemplate%22%3A%22report%22%2C%22url%22%3A%22information-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%22%7D&dim3=Availability%3A%20no%20slot
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
adsct
t.co/i/
43 B
166 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1o49&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.5 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_f /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block; report=https://twitter.com/i/xss_report

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=0
content-length
65
x-xss-protection
1; mode=block; report=https://twitter.com/i/xss_report
x-response-time
117
pragma
no-cache
last-modified
Thu, 30 May 2019 22:11:09 GMT
server
tsa_f
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
e169395f6850dc19d897ee40b6b74b7c
x-transaction
003e219c00c3e4a9
expires
Tue, 31 Mar 1981 05:00:00 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.1.198 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-86-1-198.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6d6f482982f8f1a1814e279ff50df4ccc301533ca9655e4d080d6b90ec69d69e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 18:18:54 GMT
Content-Encoding
gzip
Vary
Origin
Age
13935
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 24 Aug 2018 07:13:51 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Via
1.1 7ce1191b390045e05b9cc74f7514b77b.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
X-Amz-Cf-Id
r2xLnWozHnh25TGfUMU5rZ1jPbZ7xTwGwRYWo90EvVwSWMgc0UIYtw==
plugin.js
plugin.mediavoice.com/
322 KB
120 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a7c168cc02f4b8b977d98bd23fb6eae4419217abb7023fbb177730bd257828a6

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
cf-cache-status
HIT
cf-ray
4df40acdcb7b97de-FRA
status
200
content-length
122841
via
1.1 varnish
x-varnish
1922373876 1922373869
last-modified
Wed, 29 May 2019 20:28:40 GMT
server
cloudflare
etag
W/"5ceeeb78-508af"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Fri, 31 May 2019 08:28:44 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
594 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

timing-allow-origin
*
date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=86400
x-country
DE
cf-ray
4df40acd6b39d6cd-FRA
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1559254268636
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=39828
Date
Thu, 30 May 2019 22:11:09 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Fri, 31 May 2019 09:14:57 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
355 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
ijs_all_modules_008c9b736806ad26deb0c1b5861503d1.js
assets.bounceexchange.com/assets/smart-tags/versioned/
342 KB
84 KB
Script
General
Full URL
https://assets.bounceexchange.com/assets/smart-tags/versioned/ijs_all_modules_008c9b736806ad26deb0c1b5861503d1.js
Requested by
Host: tag.bounceexchange.com
URL: https://tag.bounceexchange.com/2806/i.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.3.46 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-86-3-46.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
467fed9fcffa791cee88e8e81a798e3d3dd73842aab48467ac21a1fcf1687daf

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 23 May 2019 21:39:06 GMT
content-encoding
gzip
last-modified
Thu, 23 May 2019 21:32:26 GMT
server
AmazonS3
age
606735
etag
"c6b0636799de527bfff65c135ba4ca7e"
x-cache
Hit from cloudfront
x-amz-version-id
_QfgJJQud6295UHfIvGTDXMqJY4rjW2Z
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-type
application/javascript
content-length
85544
via
1.1 d07eabeb1ed60c06da1457f35fb5c8c5.cloudfront.net (CloudFront)
x-amz-cf-id
JwXPE15nBJGVYSrVmXPd-YyeinjV4D6Yz4iup8xTTRWNGRGH2p9UsQ==
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1559254268975
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.209.166.125 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-209-166-125.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
03293baaa76959c66c23d7eacc503c05fd95707409f38964cefdc41b68604e68

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.7.45.119 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-7-45-119.compute-1.amazonaws.com
Software
/
Resource Hash
255459e1a8064659aafc676ac6460bc9f108f5cf1e6f06ccc1ef1ecc0a96f439

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A08.977Z&_t=library_sparrow&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3100&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&uNw=1&uUq=1&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&requestStart=959.8999992012978&requestEnd=1050.7249981164932&init=1179.7249987721443&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.021Z&_t=loaded&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3100&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns&cns=2_26_0&feature_get_entries=true&feature_performance_now=true&cns_metrics=1_1_0&cns_metrics_sparrow=1_2_0&_logType=info&cns_ads=2.19.0&cns_ads_ars_accelerator=0.2.0&cns_ads_amazon_match_buy=1.1.1&cns_ads_cne_interlude=1.0.0&cns_ads_adobe_audience_manager=1.0.0&cns_ads_index_exchange=1.2.2&cns_ads_proximic=0.1.2&cns_ads_4d=0.5.1&cns_ads_polar=0.2.0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.028Z&_t=library_service&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3100&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&init=958.3199992775917&requestEnd=638.5949999094009&requestStart=611.9299978017807&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.034Z&_t=page_created&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3100&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=information_technology&image_avg_surface=394400&image_count=1&image_surface=394400&server=production&vp_height=1200&vp_width=1585&channel=information_technology&slots_count=6&tags=plugin_wordpress_wp_live_chat_support&template=article&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
publishertag.js
static.criteo.net/js/ld/
83 KB
25 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.130 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
b0e82f9ce6c1510f32a8e18c9581ba6573b6988dabdd3f2ed6c1ba08eff85cb9

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
last-modified
Thu, 07 Mar 2019 13:26:35 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5c811c0b-14ca7"
content-type
text/javascript
status
200
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Fri, 31 May 2019 22:11:09 GMT
rid
match.adsrvr.org/track/
109 B
524 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.17.231.199 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-17-231-199.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
6e641d81d76bfcd71dd514f72411f50ba13ff05fecb534ee2ad359cc80006883

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Sat, 29 Jun 2019 22:11:09 GMT
ids
mid.rkdms.com/
0
0
XHR
General
Full URL
https://mid.rkdms.com/ids?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.23 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-23.fra6.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

identity
api.rlcdn.com/api/
0
74 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.95.92.78 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
78.92.95.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

status
202
date
Thu, 30 May 2019 22:11:09 GMT
via
1.1 google
alt-svc
clear
content-length
0
Cookie set dest5.html
condenast.demdex.net/ Frame F97B
0
0
Document
General
Full URL
https://condenast.demdex.net/dest5.html?d_nsid=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.249.86.253 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-249-86-253.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
condenast.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Accept-Encoding
gzip, deflate, br
Cookie
demdex=18203107120512565512498730219423746359
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Tue, 21 May 2019 22:03:19 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=18203107120512565512498730219423746359;Path=/;Domain=.demdex.net;Expires=Tue, 26-Nov-2019 22:11:09 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
rTKP12LjSrk=
Content-Length
2764
Connection
keep-alive
id
sstats.arstechnica.com/
49 B
688 B
XHR
General
Full URL
https://sstats.arstechnica.com/id?d_visid_ver=3.3.0&d_fieldgroup=A&mcorgid=F7093025512D2B690A490D44%40AdobeOrg&mid=18055424103322419822513250856014415342&ts=1559254269079
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
c1a0aefa63f0f6e4eab8a3852df167ace1851f9dc3a0c84bcaa1ead3902db551
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Thu, 30 May 2019 22:11:10 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC/2.0.0
xserver
www83
Vary
Origin
X-C
ms-6.7.4
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
49
X-XSS-Protection
1; mode=block
ibs:dpid=411&dpuuid=XPBU-QAAFDVYbhN_
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=18203107120512565512498730219423746359
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XPBU-QAAFDVYbhN_
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XPBU-QAAFDVYbhN_
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.128.62.29 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-108-128-62-29.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v029-0a19fa6a8.edge-irl1.demdex.com 5.53.0.20190510073505 3ms
Pragma
no-cache
X-TID
KWU8FMkGReY=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Thu, 30 May 2019 22:11:08 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XPBU-QAAFDVYbhN_
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
rules-p-Jjy-Cyr1NZGRz.js
rules.quantcount.com/
4 KB
2 KB
Script
General
Full URL
https://rules.quantcount.com/rules-p-Jjy-Cyr1NZGRz.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20bb:1400:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
efdbd8582066a12cf45115f1e150d2a8de06bf6b14db3feca98b116efeb9e0bb

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:03:23 GMT
content-encoding
gzip
last-modified
Mon, 19 Mar 2018 22:18:17 GMT
server
AmazonS3
age
1355
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=3600
x-amz-cf-pop
FRA56
x-amz-cf-id
PbXhRbQ6NNkrp1Y7VckMdOJrTBIk46WwYa8vdU8cwwhTEEELAtTy0A==
via
1.1 be3a2ea70ea68d04665ee5db91a73443.cloudfront.net (CloudFront)
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1559254269123&sessionId=2ff19333-45df-e312-65c8-0f74e637d27d&url=arstechnica.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1559254268636
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.74.236.51 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:12 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
cf3e41c653fc24ac5449ba0199fea0c8
Content-Length
4
Expires
0
collect
www.google-analytics.com/
35 B
109 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j76&a=1901699954&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&dr=%2F&dp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&ul=en-us&de=UTF-8&dt=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGBAgUAjAAQC~&jid=423938719&gjid=160072815&cid=1322214306.1559254269&tid=UA-31997-1&_gid=111453486.1559254269&gtm=2wg5m0NLXNPCQ&cg1=article%7Creport&cg2=information-technology&cg3=information%20technology&cd1=GTM-NLXNPCQ&cd2=98&cd4=&cd6=Thu%20May%2030%202019%2022%3A11%3A08%20GMT%2B0000%20(Coordinated%20Universal%20Time)&cd7=1559254268836.d8lq1uv99&cd8=0&cd9=Mozilla%2F5.0%20(Macintosh%3B%20Intel%20Mac%20OS%20X%2010_14_5)%20AppleWebKit%2F537.36%20(KHTML%2C%20like%20Gecko)%20Chrome%2F74.0.3729.169%20Safari%2F537.36&cd10=English&cd11=desktop&cd12=0&cd13=Tag%20Name%3A%20GA%20-%20Pageview%20-%20Core%20Pageview%20-%20All%20Pages&cd20=none&cd25=Dan%20Goodin&cd26=1512259&cd27=354&cd28=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cd29=web&cd32=2019-05-29T23%3A05%3A00%2B00%3A00&cd34=2019-05-30T12%3A05%3A26%2B00%3A00&cd35=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cd36=web&cd43=Ars%20Technica&cd45=Adblock%20Enabled%20-%20false&cd62=https%3A%2F%2Farstechnica.com%2F%3Fp%3D1512259&cd63=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cd65=&cd72=1.0.0&cd92=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cd93=information%20technology&cd97=-1303530583&cd98=article%7Creport&cd103=&cd3=1322214306.1559254269&z=367445733
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 09 Mar 2019 01:14:07 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
7160222
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j76&tid=UA-31997-1&cid=1322214306.1559254269&jid=423938719&gjid=160072815&_gid=111453486.1559254269&_u=aGBAgUAjAAQC~&z=239747133
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1322214306.1559254269&jid=423938719&_v=j76&z=239747133
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1322214306.1559254269&jid=423938719&_v=j76&z=239747133&slf_rd=1&random=1700751280
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1322214306.1559254269&jid=423938719&_v=j76&z=239747133&slf_rd=1&random=1700751280
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:09 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:09 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1322214306.1559254269&jid=423938719&_v=j76&z=239747133&slf_rd=1&random=1700751280
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
38 KB
8 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-7e49d3e8aa.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.32.35 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-32-35.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
c0094eacf62bdb7dc9be4a53ba07b0c3cd159970fe1cbe9565ecd5503d485418
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
6884
X-XSS-Protection
1; mode=block
X-Request-Id
6b7226c9-26bb-4cea-82f2-229668a1121b
X-Runtime
0.003088
X-Backend-Node
10.110.44.187
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"fafd7c03463f5e7fed085851db428566"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
i
tr.snapchat.com/cm/ Frame 122A
0
0
Document
General
Full URL
https://tr.snapchat.com/cm/i?
Requested by
Host: sc-static.net
URL: https://sc-static.net/scevent.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.186.226.184 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
184.226.186.35.bc.googleusercontent.com
Software
nginx /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
GET
:authority
tr.snapchat.com
:scheme
https
:path
/cm/i?
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

status
200
server
nginx
date
Thu, 30 May 2019 22:11:09 GMT
content-type
text/html
content-length
0
strict-transport-security
max-age=31536000; includeSubDomains
via
1.1 google
alt-svc
clear
show_companion_ad.js
pagead2.googlesyndication.com/pagead/
170 KB
63 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_companion_ad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4c5ef71e92e3c44477e4a8e0a35348141c251b5527a7d158b7931e1fb66f70d1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:03:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
482
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
64794
x-xss-protection
0
server
cafe
etag
5029941873905179412
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Thu, 30 May 2019 23:03:07 GMT
inferredEvents.js
connect.facebook.net/signals/plugins/
1 KB
906 B
Script
General
Full URL
https://connect.facebook.net/signals/plugins/inferredEvents.js?v=2.8.47
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
cd1c301a8e7960a1786e2a959226b0b78b56dbea284bd114265f1662d6ca280e
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
772
x-xss-protection
0
pragma
public
x-fb-debug
89BjaJ+XGaZ9RhzfOgPfVvrDvJP96+PJexB/lQVYLREqfmT5VAUuZQVvN5BBfPAn3UWenQlTyjBXcSBBYSUKZw==
date
Thu, 30 May 2019 22:11:09 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.268Z&_t=library_gpt&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3100&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&init=1471.4399948716164&requestEnd=1040.0499999523163&requestStart=999.4649961590767&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:09 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
p
tr.snapchat.com/ Frame AEC1
0
0
Document
General
Full URL
https://tr.snapchat.com/p
Requested by
Host: sc-static.net
URL: https://sc-static.net/scevent.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.186.226.184 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
184.226.186.35.bc.googleusercontent.com
Software
nginx /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
tr.snapchat.com
:scheme
https
:path
/p
content-length
405
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
accept-encoding
gzip, deflate, br
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

status
200
server
nginx
date
Thu, 30 May 2019 22:11:09 GMT
content-type
text/html
content-length
0
access-control-allow-origin
*
cache-control
no-cache, no-transform
set-cookie
sc_at=v2|H4sIAAAAAAAAAAXBgQ3AMAgDsIuQaJp0cE6Z2BUcPxsr2x+WdV4YI46Fatt3m0UKvt+ZJSVEnBz/AT8dTqsyAAAA;Version=1;Comment=;Domain=.snapchat.com;Path=/;Max-Age=33696000;Secure
strict-transport-security
max-age=31536000; includeSubDomains
via
1.1 google
alt-svc
clear
page
t.skimresources.com/api/v2/
22 B
383 B
Other
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:09 GMT
via
1.1 google
x-content-type-options
nosniff
alt-svc
clear
server
Python/3.7 aiohttp/3.5.4
access-control-allow-origin
https://arstechnica.com
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
status
200
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
content-length
22
user
4d.condenastdigital.com/
54 B
418 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=b219b367-5c6e-4837-b889-5330f0c58e36
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1559253600
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.7.45.119 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-7-45-119.compute-1.amazonaws.com
Software
/
Resource Hash
43d7abf8bd43156c67c53c928724a897f8ddf76cee8e994d78f661708c5dff75

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
user
4d.condenastdigital.com/
54 B
418 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.7.45.119 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-7-45-119.compute-1.amazonaws.com
Software
/
Resource Hash
e79cd6996a4ad04c82b497f3c1a6f03bd4417d08653cf1f48adec61d0cd8d28b

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
Cookie set /
www.medtargetsystem.com/beacon/portal/ Frame 1B06
0
0
Document
General
Full URL
https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com&_sid=1fefb666-d75d-485c-9588-30360abd6297&_vid=d1dd8f3a-c8f5-4a15-873b-9e69d36cbf55&_ak=119-556-B0E9F642&_flash=false&_th=1559254268|1559254268|1
Requested by
Host: www.medtargetsystem.com
URL: https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash

Request headers

Host
www.medtargetsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Thu, 30 May 2019 22:11:09 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma
no-cache
Server
Apache/2.4.7 (Ubuntu)
Set-Cookie
DMDSESSID=j4i55mn342q8op9qjs3ju8ou35; path=/; HttpOnly
Vary
X-Forwarded-Proto,Accept-Encoding
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
6937
Connection
keep-alive
collect.gif
www.medtargetsystem.com/analytics/
0
313 B
Image
General
Full URL
https://www.medtargetsystem.com/analytics/collect.gif?e=1&aid=&vid=d1dd8f3a-c8f5-4a15-873b-9e69d36cbf55&sid=1fefb666-d75d-485c-9588-30360abd6297&vh=1&vt=1559254268&pt=1559254268&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&r=&t=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites%20%7C%20Ars%20Technica&p=1830.54&pm=&ab=&ak=119-556-B0E9F642
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
Server
Apache/2.4.7 (Ubuntu)
Connection
keep-alive
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
0
Vary
X-Forwarded-Proto
Content-Type
text/html; charset=UTF-8
5ce2c89234e7940313fbcad2.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady73090988
player.cnevids.com/script/video/
61 KB
20 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5ce2c89234e7940313fbcad2.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady73090988
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-7e49d3e8aa.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.40 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-40.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
3ed8ea80134d558dafa72f480e34dd3b7a7658a1fdc160544023a536bb2c88a2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Transfer-Encoding
chunked
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
X-XSS-Protection
1; mode=block
X-Request-Id
19c29a5a-2a72-43a3-821c-0c7db97952a3
X-Runtime
0.010037
X-Backend-Node
10.110.14.4
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"53227676af326f939034b71f49213674"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 d5fb859c39a16d7f218b4c7fb1528ad6.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
xBhQPXJWhtIydxNygX39-PXbjgz6smkaxyOZ7QpEwve31UObMj3rqQ==
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
8574074952616e0a56e5b72d9634bff0a683d658d09804c10324293811606d22

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 28 May 2019 17:36:27 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
189283
Edge-Cache-Tag
433557846635605494688582207268998106147,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15609
X-Request-Id
70a528d904ac1a03
X-Served-By
cache-hhn1548-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 28 May 2019 17:36:10 GMT
Server
cloudinary
X-Timer
S1559064988.504782,VS0,VE179
ETag
"8becb0d5f4f7ff3e76e89c89871f465d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
FZZshXZuaNh2xM5dJ0w_x0Ekapabw_6Tf3pqCODkjeP30WhDir4DUQ==
X-Cache-Hits
0
arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/
8 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 13 May 2019 19:11:26 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
1479584
Edge-Cache-Tag
575077299308468417590234438077035908298,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7863
X-Request-Id
913af4d2d7f725fe
X-Served-By
cache-hhn1520-HHN
Server
cloudinary
X-Timer
S1557774686.273045,VS0,VE490
ETag
"31902de995c98904a55c605571f06530"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
a-Dqzqyf7m-WH-F5FU4G6S5jZC7fDDGLSKjR7CvHXq1L2YZdKdB_pg==
X-Cache-Hits
0
arstechnica_war-stories-slay-the-spire-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/arstechnica_war-stories-slay-the-spire-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 02 May 2019 18:46:16 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
2431495
Edge-Cache-Tag
515397136805965062020045600075132664421,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15634
X-Request-Id
579ea11a416a3978
X-Served-By
cache-hhn1541-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 02 May 2019 18:45:52 GMT
Server
cloudinary
X-Timer
S1556822776.220526,VS0,VE1
ETag
"abee90e53f29ba0127fca9442ab50902"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
N4eTPjQ1FBoMC7kaFeKzyMEOjaxXZFuKK__LeCrVzQGwv4yh_t9l8A==
X-Cache-Hits
1
arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 16 May 2019 18:59:38 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
1685261
Edge-Cache-Tag
587193118310891607619753694455047488726,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15251
X-Request-Id
f4d391dc9cda09fa
X-Served-By
cache-hhn1535-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 16 Apr 2019 18:59:19 GMT
Server
cloudinary
X-Timer
S1555441161.539929,VS0,VE211
ETag
"3e7cdc13e718680bf5e1efa64468b560"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
oYCmTwwctTk4OyrDJT2GNGeivVwDemGhNx_Rba0LA_WXkQ1_F8L3bA==
X-Cache-Hits
0
arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1554815651/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1554815651/arstechnica_war-stories-mechwarrior-5-mercenaries.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
beac971874ce449cc6d4bc56595e08da64e5ff5059ac828d2964f2918fe42e98

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 25 May 2019 05:57:06 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
959673
Edge-Cache-Tag
449226972451991935294885795153819156355,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18615
X-Request-Id
dbd4f5d90c68d92f
X-Served-By
cache-hhn1525-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 09 Apr 2019 13:23:27 GMT
Server
cloudinary
X-Timer
S1554816212.722426,VS0,VE369
ETag
"2390acbcc75a98765d12a8a6d71194a5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
742qzJJzCce_rp_81WrItVdk0oWq5SwPAcW30wB10erVkcM0soKruw==
X-Cache-Hits
0
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 11 May 2019 13:35:40 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
2236482
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
adbd00b36667674a
X-Served-By
cache-fra19141-FRA
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1551286109.206125,VS0,VE190
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
vGesDf5EgZCxeJ7q_Z5ICfe_cjtaAmC67JM7co-DYkGBatG5fXarzw==
X-Cache-Hits
0
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 17 May 2019 22:15:41 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
2582515
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
0fcb1e3f977d8a35
X-Served-By
cache-hhn1523-HHN
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1550764250.379842,VS0,VE183
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
3fPcCw06JVy0VKPMH7bnMe8MUXZRl1pXMtjnyE9F-_z_AK3KIZ5TaQ==
X-Cache-Hits
0
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 25 May 2019 00:39:27 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
796151
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
d20856717f768878
X-Served-By
cache-fra19143-FRA
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1550244873.748801,VS0,VE172
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
UuMGawW7NsmhWB0e9S1RHaIOcZerkVs72kiXJ-fDS2S2otfLwgXUXg==
X-Cache-Hits
0
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 27 May 2019 02:15:04 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
456735
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-fra19129-FRA
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1546965539.158106,VS0,VE116
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
PMfFXHE0E33sBptX7FV_zZuTWXP2jXf13dxENWNIq-gbZ0C-nZQ98A==
X-Cache-Hits
0
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 19 May 2019 01:46:15 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
1393841
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
0d3c8bdfb997f2cc
X-Served-By
cache-fra19130-FRA
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1541774697.715247,VS0,VE188
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
tVxPrSkOjbKD3DyYinV7SscGVHIwdG3WPxwK7KpuIHhHhIsqcI6RMw==
X-Cache-Hits
0
arstechnica_star-control-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1540238325/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1540238325/arstechnica_star-control-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
5ecce433fdd65965f4acae00993b06c37d0f4960c18b36312efbf96471f95474

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 17 May 2019 00:14:10 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
2236286
Edge-Cache-Tag
530064111679661360080335205530300069954,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10583
X-Served-By
cache-hhn1536-HHN
Last-Modified
Tue, 23 Oct 2018 16:50:21 GMT
Server
cloudinary
X-Timer
S1540313432.546501,VS0,VE110
ETag
"adccb40ff91a04ac0066ab46e3c60f86"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
vvKT3J-lBs9LgLUB4y5nZfAFpXrs30tXNiLEzpjotluS2h5cuE_XrA==
X-Cache-Hits
0
arstechnica_war-stories-serious-sam.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1538576823/
13 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1538576823/arstechnica_war-stories-serious-sam.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
ed86af54b875e74d1f45f0e835237ecb7f8d1bd3f06d51c9586576ef756a372e

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 26 May 2019 10:02:58 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
975226
Edge-Cache-Tag
302283555134930517008734674519776029634,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13034
X-Served-By
cache-hhn1537-HHN
Last-Modified
Wed, 03 Oct 2018 18:45:04 GMT
Server
cloudinary
X-Timer
S1539650558.664767,VS0,VE148
ETag
"5ad02d5b6b61591f35f1a938c31ee9e9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
IWeqdzbXecE1tim7gS77gQrVaOaQ02fBfyjSGgQqR2Msl4N_kwAHfg==
X-Cache-Hits
0
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 16 Oct 2018 01:41:47 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
1979716
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
4e915ac71870520d
X-Served-By
cache-hhn1523-HHN
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1539654107.953322,VS0,VE303
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
uE9GMZNm-TGELuG-7Q5M3fRW70BTKA_Vm2iqzIL8Kls8fEnHpRWEDA==
X-Cache-Hits
0
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 11 May 2019 02:21:35 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
2236469
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-fra19147-FRA
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1533341234.118391,VS0,VE1
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
ZDX2lfuYCC_1OdjcdwyLeoL4m2XAuD4DZhogJOu4qfYKfVAceyjxSA==
X-Cache-Hits
1
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 17 May 2019 00:21:39 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
2463358
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
9dae2162891da1d5
X-Served-By
cache-hhn1539-HHN
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1541180718.638055,VS0,VE212
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
YeNvR-UwYQSJkEG6DUxg34U-aVLYcV_90ujMdefrh8TgR9yA5GRgNQ==
X-Cache-Hits
0
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 13 May 2019 18:44:02 GMT
Via
1.1 varnish, 1.1 c1fb60e38be5022a78e4b52bedded7c2.cloudfront.net (CloudFront)
Age
1481250
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
7a037febdfa5b2c1
X-Served-By
cache-hhn1545-HHN
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1539652322.877179,VS0,VE1
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
1A1ipQFJHwn-thhhUcHNlm7CHhseMiB_t2OpCIXWLGT73MM28os4XQ==
X-Cache-Hits
1
get
odb.outbrain.com/utils/
15 KB
9 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=01020708&apv=false&sig=RVpSJbsv&format=vjapi&rand=39797&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&va=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1559254268636
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
72521335df42829fb2020b0ed46f65f9678a8f263f73241e34859650a2550470
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
68aea48f3867033a12b5d6c50d133ef2
content-length
8488
x-served-by
cache-jfk8133-JFK, cache-hhn1548-HHN
pragma
no-cache
x-timer
S1559254270.776169,VS0,VE118
date
Thu, 30 May 2019 22:11:09 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.33
accept-ranges
bytes, bytes
x-cache-hits
0, 0
/
www.facebook.com/tr/
44 B
251 B
Image
General
Full URL
https://www.facebook.com/tr/?id=228464857488266&ev=PageView&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&rl=&if=false&ts=1559254269662&cd[SiteSection]=information%20technology&cd[PageTags]=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cd[Brand]=Pitchfork&sw=1600&sh=1200&v=2.8.47&r=stable&ec=0&o=30&fbp=fb.1.1559254269661.615809699&it=1559254268916&coo=false&rqm=GET
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:09 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Thu, 30 May 2019 22:11:09 GMT
optanon.css
optanon.blob.core.windows.net/skins/4.9.0/default_flat_bottom_two_button_black/v2/css/
23 KB
6 KB
Stylesheet
General
Full URL
https://optanon.blob.core.windows.net/skins/4.9.0/default_flat_bottom_two_button_black/v2/css/optanon.css
Requested by
Host: optanon.blob.core.windows.net
URL: https://optanon.blob.core.windows.net/consent/c941cf3b-dfcd-475f-90e4-e7f422fc89dd.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.137.4 Dublin, Ireland, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
0bd0bc4edd5e4b256b9c40ce082680ad16a78ac5faf4d3337d39cf9605518bfe

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
Date
Thu, 30 May 2019 22:11:09 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 May 2019 16:18:12 GMT
Server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
Content-MD5
/v1+qZyNk0Lh8zVa2osnSA==
ETag
0x8D6E38814CD4012
Content-Type
text/css
Access-Control-Allow-Origin
*
x-ms-request-id
b747cfb4-501e-0045-1f34-170577000000
Access-Control-Expose-Headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
Cache-Control
public, max-age=2592000
x-ms-version
2009-09-19
Content-Length
5544
jquery-3.3.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.3.1.min.js
Requested by
Host: optanon.blob.core.windows.net
URL: https://optanon.blob.core.windows.net/consent/c941cf3b-dfcd-475f-90e4-e7f422fc89dd.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.208.52 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip052.ssl.hwcdn.net
Software
nginx /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:09 GMT
Content-Encoding
gzip
Last-Modified
Sat, 20 Jan 2018 17:26:44 GMT
Server
nginx
ETag
W/"5a637bd4-1538f"
Vary
Accept-Encoding
X-HW
1559254269.dop026.fr8.shc,1559254269.dop026.fr8.t,1559254269.cds057.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
30288
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
57
p.ad.gt/api/v1/p/passive/df9f3690e4a7230cb52fa27315030b55/af10e257-1250-4264-a52d-58400d0fa1f5/
51 KB
14 KB
Script
General
Full URL
https://p.ad.gt/api/v1/p/passive/df9f3690e4a7230cb52fa27315030b55/af10e257-1250-4264-a52d-58400d0fa1f5/57
Requested by
Host: a.ad.gt
URL: https://a.ad.gt/api/v1/u/matches/57
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.41.173.154 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-41-173-154.us-west-2.compute.amazonaws.com
Software
nginx/1.10.1 / Express
Resource Hash
1470c436288121520577742b93ef7570dc4de600188e487e2ba53dd840a88b66

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:11 GMT
Content-Encoding
gzip
Server
nginx/1.10.1
X-Powered-By
Express
ETag
W/"cd77-CzqOUWADB+8CCBkvpHik3HoPQIc"
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/html; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Connection
keep-alive
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Content-Length
13495
match
ids.ad.gt/api/v1/
Redirect Chain
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=af10e257-1250-4264-a52d-58400d0fa1f5&adnxs_id=$UID
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3Daf10e257-1250-4264-a52d-58400d0fa1f5%26adnxs_id%3D%24UID
  • https://ids.ad.gt/api/v1/match?id=af10e257-1250-4264-a52d-58400d0fa1f5&adnxs_id=8081147992830129603
43 B
597 B
Image
General
Full URL
https://ids.ad.gt/api/v1/match?id=af10e257-1250-4264-a52d-58400d0fa1f5&adnxs_id=8081147992830129603
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:10 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Fri, 31 May 2019 10:11:10 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:11 GMT
AN-X-Request-Uuid
10d7ebc9-c01d-4f4a-b7b7-d322b1fb9998
Content-Type
text/html; charset=utf-8
Server
nginx/1.13.4
Location
https://ids.ad.gt/api/v1/match?id=af10e257-1250-4264-a52d-58400d0fa1f5&adnxs_id=8081147992830129603
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
X-Proxy-Origin
89.249.64.206; 89.249.64.206; 536.bm-nginx-loadbalancer.mgmt.fra1; *.adnxs.com; 37.252.172.111:80
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
t_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=af10e257-1250-4264-a52d-58400d0fa1f5
  • https://ids.ad.gt/api/v1/t_match?tdid=523c6aed-cccb-4898-8423-3172bbca8824&id=af10e257-1250-4264-a52d-58400d0fa1f5
43 B
588 B
Image
General
Full URL
https://ids.ad.gt/api/v1/t_match?tdid=523c6aed-cccb-4898-8423-3172bbca8824&id=af10e257-1250-4264-a52d-58400d0fa1f5
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:10 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 31 May 2019 10:11:10 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:09 GMT
x-aspnet-version
4.0.30319
location
https://ids.ad.gt/api/v1/t_match?tdid=523c6aed-cccb-4898-8423-3172bbca8824&id=af10e257-1250-4264-a52d-58400d0fa1f5
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
302
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
259
pbm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Daf10e257-1250-4264-a52d-58400d0fa1f5
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Daf10e257-1250-4264-a52d-58400d0fa1f5
  • https://ids.ad.gt/api/v1/pbm_match?pbm=92558141-8764-4171-8DDA-6543189FCC44&id=af10e257-1250-4264-a52d-58400d0fa1f5
43 B
607 B
Image
General
Full URL
https://ids.ad.gt/api/v1/pbm_match?pbm=92558141-8764-4171-8DDA-6543189FCC44&id=af10e257-1250-4264-a52d-58400d0fa1f5
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:14 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Fri, 31 May 2019 10:11:14 GMT

Redirect headers

Location
https://ids.ad.gt/api/v1/pbm_match?pbm=92558141-8764-4171-8DDA-6543189FCC44&id=af10e257-1250-4264-a52d-58400d0fa1f5
Date
Thu, 30 May 2019 22:11:14 GMT
X-Cnection
close
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6
Content-Length
439
Content-Type
text/html; charset=iso-8859-1
adb_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=348447&dpuuid=af10e257-1250-4264-a52d-58400d0fa1f5&redir=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fadb_match%3Fadb%3D%24%7BDD_UUID%7D%26id%3Daf10e257-1250-4264-a52d-58400...
  • https://ids.ad.gt/api/v1/adb_match?adb=18203107120512565512498730219423746359&id=af10e257-1250-4264-a52d-58400d0fa1f5
43 B
590 B
Image
General
Full URL
https://ids.ad.gt/api/v1/adb_match?adb=18203107120512565512498730219423746359&id=af10e257-1250-4264-a52d-58400d0fa1f5
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:11 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 31 May 2019 10:11:11 GMT

Redirect headers

Pragma
no-cache
X-TID
zdviMGIvQvE=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://ids.ad.gt/api/v1/adb_match?adb=18203107120512565512498730219423746359&id=af10e257-1250-4264-a52d-58400d0fa1f5
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
szm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://p.rfihub.com/cm?pub=38725&userid=af10e257-1250-4264-a52d-58400d0fa1f5&in=1&forward=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fszm_match%3Fszm%3D{userid}%26id%3Daf10e257-1250-4264-a52d-58400d0fa1f5
  • https://ids.ad.gt/api/v1/szm_match?szm=1871316016295311026&id=af10e257-1250-4264-a52d-58400d0fa1f5
43 B
590 B
Image
General
Full URL
https://ids.ad.gt/api/v1/szm_match?szm=1871316016295311026&id=af10e257-1250-4264-a52d-58400d0fa1f5
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:19 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Fri, 31 May 2019 10:11:19 GMT

Redirect headers

Location
https://ids.ad.gt/api/v1/szm_match?szm=1871316016295311026&id=af10e257-1250-4264-a52d-58400d0fa1f5
Server
Jetty(9.0.6.v20130930)
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
g_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=af10e257-1250-4264-a52d-58400d0fa1f5
  • https://ids.ad.gt/api/v1/g_match?id=af10e257-1250-4264-a52d-58400d0fa1f5&google_gid=CAESEBUkLvjii_6fGPh4MsGTCD0&google_cver=1&google_ula=450542624,0
43 B
605 B
Image
General
Full URL
https://ids.ad.gt/api/v1/g_match?id=af10e257-1250-4264-a52d-58400d0fa1f5&google_gid=CAESEBUkLvjii_6fGPh4MsGTCD0&google_cver=1&google_ula=450542624,0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:11 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Fri, 31 May 2019 10:11:11 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:11 GMT
server
HTTP server (unknown)
location
https://ids.ad.gt/api/v1/g_match?id=af10e257-1250-4264-a52d-58400d0fa1f5&google_gid=CAESEBUkLvjii_6fGPh4MsGTCD0&google_cver=1&google_ula=450542624,0
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
357
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ptrack-v1.3.0-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
39 KB
16 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.3.0-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.41 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-41.fra6.r.cloudfront.net
Software
nginx /
Resource Hash
1c508cfdbbecf7374004eb8affe23689bd61e2705cbfc180bcdce0233a6ced3b

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
public
Date
Tue, 07 May 2019 18:26:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 07 May 2019 18:14:11 GMT
Server
nginx
Age
2000676
ETag
W/"5cd1caf3-9c1c"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 21da0a66bafe2c8de8be4a4d8039346b.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
Connection
keep-alive
X-Amz-Cf-Id
lX29DKZOWXyaKlfg72mUloI_YOKeoTzunAPS6Mx_V-QRDFrO-zBrJw==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5ce2c89234e7940313fbcad2&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ce2c89234e7940313fbcad2.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady73090988
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-95.fra6.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
cd010a77d68c3c5b2eb0ff1f747d17b601a5850a536d86d8bc5ce50ef4e72a73
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:10:31 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
44
X-Cache
Hit from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
1990
X-XSS-Protection
1; mode=block
X-Request-Id
0e89567e-b502-449c-bb72-e8572362988f
X-Runtime
0.009135
X-Backend-Node
10.110.45.152
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"5fe66893df3a9d9b8499740b4bd1ee71"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
yt8saViosdYLviT8WBa2XSND8TEjVyyIi7ri7LA2dS1fAyGeNVzyrA==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame A512
232 KB
79 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ce2c89234e7940313fbcad2.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady73090988
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
da1e4ea9f517b559a315ba7628e68464084d4bdf0005ad9783d362cf01136fcd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
80735
x-xss-protection
0
expires
Thu, 30 May 2019 22:11:11 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
139 KB
49 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ce2c89234e7940313fbcad2.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady73090988
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
306f425bfff6364d4d62f8b34da942400511157e315bf01c86ce4dce3bbcced2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:02:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 30 May 2019 19:08:06 GMT
server
sffe
age
549
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
50410
x-xss-protection
0
expires
Thu, 30 May 2019 22:17:02 GMT
player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame A512
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ce2c89234e7940313fbcad2.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady73090988
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.94 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-94.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4cc07db5e979ec8fc492f1cd9d88391360460adc0d8ce6ae568d50cc084da3e0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 13 Feb 2019 16:48:56 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Feb 2019 15:32:39 GMT
Server
AmazonS3
Age
9177739
ETag
"4acddbd24b10301fdc4909837b98a5bf"
X-Cache
Hit from cloudfront
Content-Type
text/css; charset=utf-8
Via
1.1 25c6baf0a31a5ef699c1e219b25ce7b9.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
11327
X-Amz-Cf-Id
_UU4UsBA0qX7XPYP-_eGZ7RpzY0BX_RYhbRjb-e_XEqtocYeEcbVyA==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-6af644e7b1e6d08bb8ee.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame A512
914 KB
229 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5ce2c89234e7940313fbcad2.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady73090988
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.94 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-94.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6329976c148222961bf8c99c35338617f6a2ee51ca1e5095dccbb6ce3ae0828c

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 29 May 2019 16:16:39 GMT
Content-Encoding
gzip
Last-Modified
Wed, 29 May 2019 14:44:55 GMT
Server
AmazonS3
Age
107676
ETag
"e105f27c8396734b4f63101f886f5e4d"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 25c6baf0a31a5ef699c1e219b25ce7b9.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
234237
X-Amz-Cf-Id
O2Oo4E7rtte17FWLY0bMqc5zdkpbnZmlz3b4iBANBDuITkGekthTRw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.800Z&_t=pageview&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&_o=ars-technica&_c=general&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.839Z&_t=slot_staged&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=17148.08695652174&image_count=23&image_surface=394406&server=production&vp_height=1200&vp_width=1585&created=2030.7299941778183&staged=2041.424997150898&pageload_to_staged=2041.424997150898&channel=information_technology&ctx_template=article&id=1559254269827y1awgeifeulio5muhagjt4dcwct0oc&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&tags=plugin_wordpress_wp_live_chat_support&template=article&type=post_nav&CNS_init=958.3199992775917&CNS_init_to_staged=1083.1049978733063&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
945 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A53726831%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%221%22%2C%22siteID%22%3A%22175689%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%222%22%2C%22siteID%22%3A%22175690%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%223%22%2C%22siteID%22%3A%22175691%22%7D%2C%22id%22%3A%223%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22523c6aed-cccb-4898-8423-3172bbca8824%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-05-30T22%3A11%3A09%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bb6bdc7135561fb8c628195f46b208b9bda9eb4c6d796389923df5920122b4bb

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:15 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Thu, 30 May 2019 22:11:15 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.858Z&_t=slot_staged&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=17148.08695652174&image_count=23&image_surface=394406&server=production&vp_height=1200&vp_width=1585&created=2033.4849953651428&staged=2060.339994728565&pageload_to_staged=2060.339994728565&channel=information_technology&ctx_template=article&id=15592542698308flta2dygnelccir0yyxvi0li76cbo&instance=0&name=siderail_0&position_fold=atf&position_xy=145x0&tags=plugin_wordpress_wp_live_chat_support&template=article&type=siderail&CNS_init=958.3199992775917&CNS_init_to_staged=1102.0199954509735&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

fastlane.json
fastlane.rubiconproject.com/a/api/
0
0

ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
945 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A99721471%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2210%22%2C%22siteID%22%3A%22175698%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2211%22%2C%22siteID%22%3A%22175699%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A1050%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2212%22%2C%22siteID%22%3A%22175700%22%7D%2C%22id%22%3A%223%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%22523c6aed-cccb-4898-8423-3172bbca8824%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-05-30T22%3A11%3A09%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b36875f83c903f5a122b6ed5f0d33059e0ca4e90e67c5183908ee32d20e3dbc5

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:15 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Thu, 30 May 2019 22:11:15 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.871Z&_t=slot_staged&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=17148.08695652174&image_count=23&image_surface=394406&server=production&vp_height=1200&vp_width=1585&created=2034.7899943590164&staged=2073.8999992609024&pageload_to_staged=2073.8999992609024&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&tags=plugin_wordpress_wp_live_chat_support&template=article&type=native_xrail&CNS_init=958.3199992775917&CNS_init_to_staged=1115.5799999833107&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A09.880Z&_t=slot_staged&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=17148.08695652174&image_count=23&image_surface=394406&server=production&vp_height=1200&vp_width=1585&created=2035.7349961996078&staged=2083.4549963474274&pageload_to_staged=2083.4549963474274&channel=information_technology&ctx_template=article&id=1559254269832zvgc5dmkkhhf8s5kjmnble35r7ctfh&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=plugin_wordpress_wp_live_chat_support&template=article&type=out_of_page&CNS_init=958.3199992775917&CNS_init_to_staged=1125.1349970698357&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
EU
geolocation.onetrust.com/cookieconsentpub/v1/geo/countries/
32 B
195 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/countries/EU?callback=jQuery33108037049828507643_1559254269903&_=1559254269904
Requested by
Host: code.jquery.com
URL: https://code.jquery.com/jquery-3.3.1.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
40.89.141.103 Paris, France, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
b0817a0d6a87f2d42532035e42b20ea55cfaa5ca1092c761f5fc5e734790bdbf

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:12 GMT
Content-Length
32
X-Application-Context
application:8080
Content-Type
application/json;charset=UTF-8
bid
aax.amazon-adsystem.com/e/dtb/
47 B
344 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pid=5483827168611559254268941&cb=5641724911481559254269911&ws=1600x1200&v=7.31.02&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_1559254269827Y1AWgeIFeuliO5MUHAgjt4DcwCt0OC_post_nav_0_container%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%7D%5D&pj=%7B%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldCFRoute%22%3Afalse%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.218.7 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
f371cbd7e9790d6d6b2e28deb790f9bce3d7eaed0dda8adc46152dae58580be6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:15 GMT
Server
Server
Vary
User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
47
bid
aax.amazon-adsystem.com/e/dtb/
47 B
344 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pid=5483827168611559254268941&cb=9903713019351559254269913&ws=1600x1200&v=7.31.02&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_15592542698308FlTa2DYgnelCcIr0YYXVi0lI76CBo_siderail_0_container%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%7D%5D&pj=%7B%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldCFRoute%22%3Afalse%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.218.7 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
37a738fc8e09cd053010a5bb2189bfdd7b201591af2f2aacad9985c5736a72c9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:15 GMT
Server
Server
Vary
User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
47
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=3375853fddbda9894004bbe95b12b796_6817_1559254269849&tm=961&eT=0&wRV=01020708&pVis=0&lsd=2e435376-afd2-4f63-978e-f27163c4f88a&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1559254268636
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.51 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:23 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
e0a862b1b3b1a080a34325df7f0b22c5
Content-Length
30
eyJpdSI6ImFkZTU4NjhiMjgwZmJiYTUzN2IwMjcwNDAzMzEwMTc1ZjczYmViZGM3YmE0MGRmMmMzMmZlZDk0MmFhNTBjZDEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
7 KB
8 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImFkZTU4NjhiMjgwZmJiYTUzN2IwMjcwNDAzMzEwMTc1ZjczYmViZGM3YmE0MGRmMmMzMmZlZDk0MmFhNTBjZDEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
87111f0e9abc0b3fb80eb4705177d7a7c9799b4cec576033dbe1fe079d4b8634
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 13 May 2019 06:21:03 GMT
Date
Thu, 30 May 2019 22:11:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2147562
Connection
keep-alive
X-TraceId
4be4c6ab227b3b427c040e7ea37bd637
Timing-Allow-Origin
*
Content-Length
7566
eyJpdSI6IjMzODVkNDZlZTk5NGRhODUzYjRlNjJiNGUzNzhjNTM1NjVmMDQyZTY3NjRkYmRjNDg4NzVmNTBhNDAxNTk4NGQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
9 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjMzODVkNDZlZTk5NGRhODUzYjRlNjJiNGUzNzhjNTM1NjVmMDQyZTY3NjRkYmRjNDg4NzVmNTBhNDAxNTk4NGQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
809d2fb43a8bfd279c0f2276149b807af5e2a7b990f10a78f903dd30f53fca2f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 03 May 2019 20:52:07 GMT
Date
Thu, 30 May 2019 22:11:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1772367
Connection
keep-alive
X-TraceId
8f8a8d03e176fbb3d32014f92eda0d13
Timing-Allow-Origin
*
Content-Length
9384
eyJpdSI6IjI0MzdmMDM1MDQzMTU3NDkwY2NlZmQyMzkzYjVlMDUxNzNjMWU5MjkwZDQzNzM2ZWY3NWE3OWQwM2Q1NTRkZjQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
5 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjI0MzdmMDM1MDQzMTU3NDkwY2NlZmQyMzkzYjVlMDUxNzNjMWU5MjkwZDQzNzM2ZWY3NWE3OWQwM2Q1NTRkZjQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4340f624ed800d14bff399a3f67e66a7e356235aa23fe4f0da35199323496f8c
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 26 Apr 2019 14:20:31 GMT
Date
Thu, 30 May 2019 22:11:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=753790
Connection
keep-alive
X-TraceId
81825afb1498cb51cae8b2a40d79122a
Timing-Allow-Origin
*
Content-Length
5422
eyJpdSI6ImQxMDI5ZThjMzJmMTBlODdhZGUxMmRjYTE3ZTA2ODMxOGRlZTljNmEzMTgzMTdhODdkMzAwNzBkNjM0MzdiNmEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
12 KB
13 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQxMDI5ZThjMzJmMTBlODdhZGUxMmRjYTE3ZTA2ODMxOGRlZTljNmEzMTgzMTdhODdkMzAwNzBkNjM0MzdiNmEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
df170ade96fb3ce9940a65f015602b3ebda73876d470fa28458f8ebdcaa9a7d1
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 23 May 2019 10:44:50 GMT
Date
Thu, 30 May 2019 22:11:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1945012
Connection
keep-alive
X-TraceId
c4bad0f6334659dca4e2a0165202309d
Timing-Allow-Origin
*
Content-Length
12460
eyJpdSI6IjIyYzdjMmQyNmY1NzYyYjJiZDUyM2FlZGRhMDg1ZTY2ZTBlMjU2NGUxYTM0MzEyN2M4ODBlMDc4MzIzYzFhYmEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
12 KB
13 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjIyYzdjMmQyNmY1NzYyYjJiZDUyM2FlZGRhMDg1ZTY2ZTBlMjU2NGUxYTM0MzEyN2M4ODBlMDc4MzIzYzFhYmEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ce01370280b2b88d8f7f702841ed807cead72acf6d760aa49ed9d84d9e857e9c
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 10 May 2019 06:48:54 GMT
Date
Thu, 30 May 2019 22:11:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2446798
Connection
keep-alive
X-TraceId
3f96c6d6d43c8a1a478f2f98927db8e1
Timing-Allow-Origin
*
Content-Length
12676
eyJpdSI6ImNjODJjMWE2NDU0MWY4YjBkNWE3MGQwYWI5NjIyYTQyYzllNWJlYTA0NmJkMzk0NzYwNWVhZWJmY2RjY2JhZjgiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
8 KB
8 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImNjODJjMWE2NDU0MWY4YjBkNWE3MGQwYWI5NjIyYTQyYzllNWJlYTA0NmJkMzk0NzYwNWVhZWJmY2RjY2JhZjgiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.28 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-28.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1bace45eb3176f11a69f8d8ac76dd4fcfeb78b61059da542f168e0068ddeda13
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 15 May 2019 08:52:47 GMT
Date
Thu, 30 May 2019 22:11:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2000617
Connection
keep-alive
X-TraceId
68829b1116d5b17dcf529e9770004eb3
Timing-Allow-Origin
*
Content-Length
8264
/
www.facebook.com/tr/ Frame 3DE6
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
2484
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
accept-encoding
gzip, deflate, br
cookie
fr=0qDvTA1yanHrmEExi..Bc8FT9...1.0.Bc8FT9.
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
content-length
0
server
proxygen-bolt
date
Thu, 30 May 2019 22:11:10 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A10.852Z&_t=slot_requested&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3700&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=15910.206896551725&image_count=29&image_surface=461396&server=production&vp_height=1200&vp_width=1585&created=2030.7299941778183&staged=2041.424997150898&pageload_to_staged=2041.424997150898&channel=information_technology&ctx_template=article&id=1559254269827y1awgeifeulio5muhagjt4dcwct0oc&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&tags=plugin_wordpress_wp_live_chat_support&template=article&type=post_nav&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1083.1049978733063&inViewport=2051.5749976038933&pageLoad_to_in_viewport=1093.2549983263016&isRefresh=true&is_first_Request=true&requested=3054.8649951815605&pageLoad_to_requested=3054.8649951815605&CNS_init_to_requested=2096.544995903969&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:12 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:12 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 30 May 2019 22:11:12 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A10.877Z&_t=slot_requested&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3700&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=16372.206896551725&image_count=29&image_surface=474794&server=production&vp_height=1200&vp_width=1585&created=2033.4849953651428&staged=2060.339994728565&pageload_to_staged=2060.339994728565&channel=information_technology&ctx_template=article&id=15592542698308flta2dygnelccir0yyxvi0li76cbo&instance=0&name=siderail_0&position_fold=atf&position_xy=145x0&tags=plugin_wordpress_wp_live_chat_support&template=article&type=siderail&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1102.0199954509735&inViewport=2069.5549994707108&pageLoad_to_in_viewport=1111.235000193119&isRefresh=true&requested=3080.029994249344&pageLoad_to_requested=3080.029994249344&CNS_init_to_requested=2121.709994971752&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:12 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:12 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 30 May 2019 22:11:12 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A10.892Z&_t=slot_requested&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3700&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=16834.206896551725&image_count=29&image_surface=488192&server=production&vp_height=1200&vp_width=1585&created=2034.7899943590164&staged=2073.8999992609024&pageload_to_staged=2073.8999992609024&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&tags=plugin_wordpress_wp_live_chat_support&template=article&type=native_xrail&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1115.5799999833107&inViewport=2082.7749967575073&pageLoad_to_in_viewport=1124.4549974799156&isRefresh=true&requested=3094.679996371269&pageLoad_to_requested=3094.679996371269&CNS_init_to_requested=2136.3599970936775&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:12 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A10.907Z&_t=slot_requested&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3700&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=16834.206896551725&image_count=29&image_surface=488192&server=production&vp_height=1200&vp_width=1585&created=2035.7349961996078&staged=2083.4549963474274&pageload_to_staged=2083.4549963474274&channel=information_technology&ctx_template=article&id=1559254269832zvgc5dmkkhhf8s5kjmnble35r7ctfh&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=plugin_wordpress_wp_live_chat_support&template=article&type=out_of_page&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1125.1349970698357&inViewport=2093.0599942803383&pageLoad_to_in_viewport=1134.7399950027466&isRefresh=true&requested=3110.004998743534&pageLoad_to_requested=3110.004998743534&CNS_init_to_requested=2151.6849994659424&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
s57485374584230
sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/
43 B
615 B
Image
General
Full URL
https://sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/s57485374584230?AQB=1&ndh=1&pf=1&t=30%2F4%2F2019%2022%3A11%3A10%204%200&D=D%3D&mid=18055424103322419822513250856014415342&aamlh=6&ce=UTF-8&ns=condenast&pageName=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&g=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cc=USD&ch=Biz%20%26amp%3B%20IT&events=event2%2Cevent28&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&v2=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&l2=plugin%7Cwordpress%7Cwp-live-chat-support%7Ctype%3A%20report&c3=D%3Dv3&v3=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&c4=D%3Dv4&v4=1512259&c5=D%3Dv5&v5=report&c6=D%3Dv6&v6=Biz%20%26amp%3B%20IT&c7=D%3Dv7&v7=Biz%20%26amp%3B%20IT%2Fundefined&c11=D%3Dv11&v11=6%3A11%20PM%7CThursday&c16=not%20logged%20in&v16=not%20logged%20in&c17=1&v17=1&c23=D%3Dv23&v23=New&c32=D%3Dv32&v32=1&c44=D%3Dv44&v44=null&c50=plugin%7Cwordpress%7Cwp-live-chat-support%7Ctype%3A%20report&c51=D%3Dv51&v51=desktop%20layout%3A1600x1200&c55=D%3Dv55&v55=Dan%20Goodin&c56=D%3Dv56&v56=0.8&c60=D%3Dv60&v60=354&c61=D%3Dv61&v61=23h%7C0d&c62=D%3Dv62&v62=2019-05-29T23%3A05%3A00%2B00%3A00&c65=D%3Dv65&v65=null&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:12 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.7.4
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
43
X-XSS-Protection
1; mode=block
Pragma
no-cache
Last-Modified
Fri, 31 May 2019 22:11:12 GMT
Server
Omniture DC/2.0.0
xserver
www26
ETag
"3348473052281241600-5018946238825890869"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Wed, 29 May 2019 22:11:12 GMT
ads
securepubads.g.doubleclick.net/gampad/
44 KB
16 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=2640647116347288&correlator=536204889911915&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&hxva=1&scor=4003115265266819&eid=21062724%2C21062818%2C21063203&vrg=2019052302&tfcd=0&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A32776%2C8%3A32776&sc=1&sfv=1-0-33&ecs=20190530&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1%2Chero%2Crail%2C2&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5%2C0%2F1%2F6%2F3%2F4%2F5%2C0%2F1%2F7%2F3%2F4%2F5%2C0%2F1%2F7%2F3%2F4%2F8&prev_iu_szs=1x1%2C728x90%7C970x60%7C970x250%7C930x370%7C970x90%7C970x420%7C9x1%7C9x3%7C9x9%7C1200x370%7C10x1%2C300x250%7C300x600%7C300x1050%2C300x140&fsbs=1%2C1%2C1%2C1&ists=8&prev_scp=ctx_slot_name%3D_out_of_page_0%26ctx_slot_instance%3D_out_of_page_0%26ctx_slot_type%3D_out_of_page%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dpost_nav_0%26ctx_slot_instance%3Dpost_nav_0%26ctx_slot_type%3Dpost_nav%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dsiderail_0%26ctx_slot_instance%3Dsiderail_0%26ctx_slot_type%3Dsiderail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dnative_xrail_0%26ctx_slot_instance%3Dnative_xrail_0%26ctx_slot_type%3Dnative_xrail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0&eri=1&cust_params=amznbid%3D1%26amznp%3D1%26env_device_type%3Ddesktop%26env_server%3Dproduction%26rdt_device_template%3Ddesktop_article%26cnt_tags%3Dplugin%252Cwordpress%252Cwp-live-chat-support%26usr_bkt_pv%3D88%26ctx_cns_version%3D2_26_0%26vnd_prx_segments%3D300003%252C121100%252C131100%252C131103%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cwmhp4i%252C2hkgm5%252Cap05we%252Cfdf1wd%252Cf5u35n%252Cv8lc56%252C_GrvbJftPxaU_%26vnd_4d_ctx_topics%3DALLBRANDS_64%252CALLBRANDS_57%252CALLBRANDS_28%252CALLBRANDS_244%252CALLBRANDS_21%252CALLBRANDS_192%252CALLBRANDS_70%252CALLBRANDS_7%252CALLBRANDS_63%252CALLBRANDS_38%252CALLBRANDS_31%252CALLBRANDS_283%252CALLBRANDS_274%252CALLBRANDS_258%252CALLBRANDS_167%252CALLBRANDS_134%26vnd_4d_ctx_topic_sc%3D0.4421488418730969%252C0.4421488418730969%252C0.4421488418730969%252C0.4421488418730969%252C0.4421488418730969%252C0.4421488418730969%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%26vnd_4d_ctx_entities%3Dhacker%252Cwordpress%252Cpage%2520layout%252Ccontent%2520management%2520system%252Cjavascript%252Czscaler%252Ccross-site%2520scripting%252Cprakhar%2520shrotriya%252Cdan%2520goodin%252Cutc%252Cdrupal%252Ccond%25C3%25A9%2520nast%252Cars%2520orbital%2520transmission%252Ccms%252Cars%2520technica%2520addendum%252Ccnmn%2520collection%252Cmedia%2520group%252Car%26vnd_4d_ctx_ent_sc%3D0.9916231558235189%252C0.8997148674806648%252C0.843273301942686%252C0.785498321886274%252C0.7628638284904774%252C0.7098644768309692%252C0.5927603627647994%252C0.5388039322551391%252C0.5148449250448555%252C0.4756642786456441%252C0.4477497512113542%252C0.4393050133122588%252C0.39471710216076733%252C0.35360187943049914%252C0.3312051676562671%252C0.3223247902638557%252C0.32186520921147455%252C0.31684364537472576%26vnd_4d_ctx_keywords%3Dvulnerability%252Chacker%252Csite%252Cwordpress%252Cplugin%252Cpage%2520layout%252Ccontent%2520management%2520system%252Cjavascript%252Cmalicious%2520redirect%252Czscaler%252Cvisitor%252Cmisleading%2520popup%252Cresearcher%252Ccross-site%2520scripting%252Cversion%252Cprakhar%2520shrotriya%252Cdan%2520goodin%252Cattacker%252Cunwanted%2520popup%252Cwebsite%26vnd_4d_ctx_kw_sc%3D1%252C0.9916231558235189%252C0.9693398909662085%252C0.8997148674806648%252C0.8512955820150983%252C0.843273301942686%252C0.785498321886274%252C0.7628638284904774%252C0.7577880353869039%252C0.7098644768309692%252C0.6319734789717176%252C0.6134291364151024%252C0.5972291919101648%252C0.5927603627647994%252C0.5784444461926286%252C0.5388039322551391%252C0.5148449250448555%252C0.5053766890448752%252C0.4855792532666747%252C0.47928366163275893%26vnd_4d_pid%3D0d940ef5-83d8-4b6b-aa24-0a72595bfc83%26vnd_4d_xid%3Db219b367-5c6e-4837-b889-5330f0c58e36%26vnd_4d_sid%3Dd06a5ada-98e9-4bcd-bd4d-37aa470eafcb%26ctx_template%3Darticle%26ctx_page_slug%3Dhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%26ctx_page_channel%3Dinformation_technology&cookie_enabled=1&bc=31&abxe=1&lmt=1559254271&dt=1559254271019&dlt=1559254268294&idt=910&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C193%2C1063%2C1063&adys=0%2C80%2C370%2C786&adks=3882222161%2C1029390515%2C2070898163%2C57498633&ucis=1%7C2%7C3%7C4&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&dssz=71&icsg=2253079713939456&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x-1%7C1200x90%7C300x250%7C300x0&msz=0x-1%7C1200x90%7C300x250%7C300x140&blev=1&bisch=1&ga_vid=1322214306.1559254269&ga_sid=1559254271&ga_hid=1901699954&fws=4%2C4%2C4%2C4
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.2 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
cafe /
Resource Hash
b71bc9f463464e4543a2dd1db99069619d47a29513e9588b5fc17392e4e889a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:11 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
16002
x-xss-protection
0
google-lineitem-id
-2,-1,-1,4736014287
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2,-1,-1,138237302059
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019052302.js
securepubads.g.doubleclick.net/gpt/
66 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019052302.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.2 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
sffe /
Resource Hash
392052f027818de38eb23d2e99bf20e017e9ad6a18f2a3de17002cdbc7495087
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 23 May 2019 16:46:45 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
25328
x-xss-protection
0
expires
Thu, 30 May 2019 22:11:12 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-33/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-33/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

getpixels
pixels.ad.gt/api/v1/
5 KB
2 KB
Script
General
Full URL
https://pixels.ad.gt/api/v1/getpixels?tagger_id=df9f3690e4a7230cb52fa27315030b55&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&code=LU6O0M
Requested by
Host: p.ad.gt
URL: https://p.ad.gt/api/v1/p/passive/df9f3690e4a7230cb52fa27315030b55/af10e257-1250-4264-a52d-58400d0fa1f5/57
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.89.80.23 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-89-80-23.us-west-2.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
746e702acf29abec0770d991897634ddec9bd2d3a1c5bc39c08e7d93a9636bcc

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:20 GMT
Content-Encoding
gzip
Server
nginx/1.12.1
Connection
keep-alive
Content-Length
1465
Content-Type
text/html; charset=utf-8
ecommerce.js
www.google-analytics.com/plugins/ua/
1 KB
836 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ecommerce.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8e1b84265e633c043720dd0921476c16bc9f75e393e855c9116ca7c3a847b5c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 21:23:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
2870
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
735
x-xss-protection
0
expires
Thu, 30 May 2019 22:23:22 GMT
ec.js
www.google-analytics.com/plugins/ua/
3 KB
1 KB
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ec.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
058ed961bfe422af7bfc65865f4c08531ec8ace995f8a1ec560a46581cb7712c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 21:21:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
2990
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1296
x-xss-protection
0
expires
Thu, 30 May 2019 22:21:22 GMT
conde_nast_xid
ids.ad.gt/api/v1/put/
43 B
629 B
Image
General
Full URL
https://ids.ad.gt/api/v1/put/conde_nast_xid?conde_nast_xid=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:13 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Fri, 31 May 2019 10:11:13 GMT
df9f3690e4a7230cb52fa27315030b55
p.ad.gt/api/v1/p/tid/dec/s/
0
616 B
Image
General
Full URL
https://p.ad.gt/api/v1/p/tid/dec/s/df9f3690e4a7230cb52fa27315030b55?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&title=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&image=https%3A%2F%2Fcdn.arstechnica.net%2Fwp-content%2Fuploads%2F2019%2F05%2Fredirected-site-760x380.jpg&type=article&tags=&sn=1&description=If%20you%27re%20seeing%20more%20malicious%20redirects%20than%20usual%2C%20now%20you%20know%20why.
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.133.92 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-133-92.us-west-2.compute.amazonaws.com
Software
nginx/1.10.1 / Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:13 GMT
Server
nginx/1.10.1
X-Powered-By
Express
ETag
W/"0-2jmj7l5rSw0yVb/vlWAYkK/YBwk"
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/html; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Connection
keep-alive
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Content-Length
0
container.html
tpc.googlesyndication.com/safeframe/1-0-33/html/ Frame 666E
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-33/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-33/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
3444
date
Thu, 30 May 2019 20:27:46 GMT
expires
Fri, 29 May 2020 20:27:46 GMT
last-modified
Tue, 16 Apr 2019 19:37:56 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
6206
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
osd.js
www.googletagservices.com/activeview/js/current/
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
95dcbfa4bbc86a287a619632a6f0de5f4b7cff56306cef0b6ae171abede68e98
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1559128787843989"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28505
x-xss-protection
0
expires
Thu, 30 May 2019 22:11:12 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-33/html/ Frame 5EA8
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-33/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-33/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
3444
date
Thu, 30 May 2019 20:27:46 GMT
expires
Fri, 29 May 2020 20:27:46 GMT
last-modified
Tue, 16 Apr 2019 19:37:56 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
6206
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
view
securepubads.g.doubleclick.net/pcs/ Frame D886
0
57 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssobs2Qgoj4E3-KTA0UweoYge-XXE5IPBC8cgWVghVgfqKkemt4ZmMEr_uvzArkpkQIj3DkrFGWX1MszmlWPSpwj2sl2LOCNHuduSrAjJDmeMJ353WSK9YmrMTTzvF4-qNHsn8JaKADVL_10jR5wXxYr5L1MyIF5RuxNM86yce2BuvCyyeWlyng0egNJwh9KYubIGn9pxqVFgAZgqb9kdtHoWUpff_anSLGxMjK4DZ3IJ6UInRY2Jv9KJGDHtlOvwceXjVuujkYBIP2SAJKHFXLdhqXedcAcA2VyzhHZA&sig=Cg0ArKJSzOEl8ZOVa-F0EAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.18.2 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s28-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 30 May 2019 22:11:12 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
creative.js
static.polarcdn.com/creative/ Frame D886
300 KB
115 KB
Script
General
Full URL
https://static.polarcdn.com/creative/creative.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f87e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e20bfa20cda54cce40ff36b5f1b498a32c8ef4f4727c610e1391975bf187d97a

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:13 GMT
content-encoding
gzip
cf-cache-status
HIT
status
200
content-length
116872
via
1.1 varnish
timing-allow-origin
*
x-varnish
1155682200 1155682199
last-modified
Wed, 29 May 2019 20:30:06 GMT
server
cloudflare
cache-control
max-age=10800
etag
W/"5ceeebce-4b1e6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cf-ipcountry
DE
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
4df40ae67bffc2c7-FRA
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Thu, 30 May 2019 23:30:18 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D886
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019052302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
01ff437b6e21ea90d9633141d629ffd78f33474b75308473f163563d9586f145
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1559128787843989"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28532
x-xss-protection
0
expires
Thu, 30 May 2019 22:11:12 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame D886
290 KB
90 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019052302.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
485656112dd24f14085de380f441744589531ce9d74a5535abaf09918852d943

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:13 GMT
Content-Encoding
gzip
Last-Modified
Thu, 30 May 2019 21:21:35 GMT
Server
AmazonS3
x-amz-request-id
484FB542EEBCBD2D
ETag
"3ca31366109b46e1bb7b40ce5a79e1bd"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=63868
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
91381
x-amz-id-2
Kh3R2UAppGFnZrCxNxjJ68cRCfkT2jcOd9wkdPlQtJtcYoC4Qy9NB9Mz7JDudpmlFml39e1KwJw=
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A12.873Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=23789.935483870966&image_count=31&image_surface=737488&server=production&vp_height=1200&vp_width=1585&created=2035.7349961996078&staged=2083.4549963474274&pageload_to_staged=2083.4549963474274&channel=information_technology&ctx_template=article&id=1559254269832zvgc5dmkkhhf8s5kjmnble35r7ctfh&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=plugin_wordpress_wp_live_chat_support&template=article&type=out_of_page&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1125.1349970698357&inViewport=2093.0599942803383&pageLoad_to_in_viewport=1134.7399950027466&isRefresh=true&requested=3110.004998743534&pageLoad_to_requested=3110.004998743534&CNS_init_to_requested=2151.6849994659424&rendered=5075.969994068146&creative_type=sized&is_empty=true&request_to_rendered=1965.9649953246117&is_first_rendered=true&pageLoad_to_rendered=5075.969994068146&CNS_init_to_rendered=4117.649994790554&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A12.879Z&_t=unfriendly_iframe&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=23789.935483870966&image_count=31&image_surface=737488&server=production&vp_height=1200&vp_width=1585&created=2035.7349961996078&staged=2083.4549963474274&pageload_to_staged=2083.4549963474274&channel=information_technology&ctx_template=article&id=1559254269832zvgc5dmkkhhf8s5kjmnble35r7ctfh&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=plugin_wordpress_wp_live_chat_support&template=article&type=out_of_page&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1125.1349970698357&inViewport=2093.0599942803383&pageLoad_to_in_viewport=1134.7399950027466&isRefresh=true&requested=3110.004998743534&pageLoad_to_requested=3110.004998743534&CNS_init_to_requested=2151.6849994659424&rendered=5075.969994068146&creative_type=sized&is_empty=true&request_to_rendered=1965.9649953246117&is_first_rendered=true&pageLoad_to_rendered=5075.969994068146&CNS_init_to_rendered=4117.649994790554&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A12.896Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=23789.935483870966&image_count=31&image_surface=737488&server=production&vp_height=1200&vp_width=1585&created=2030.7299941778183&staged=2041.424997150898&pageload_to_staged=2041.424997150898&channel=information_technology&ctx_template=article&id=1559254269827y1awgeifeulio5muhagjt4dcwct0oc&instance=0&name=post_nav_0&position_fold=atf&position_xy=0x193&request_number=1&tags=plugin_wordpress_wp_live_chat_support&template=article&type=post_nav&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1083.1049978733063&inViewport=2051.5749976038933&pageLoad_to_in_viewport=1093.2549983263016&isRefresh=true&is_first_Request=true&requested=3054.8649951815605&pageLoad_to_requested=3054.8649951815605&CNS_init_to_requested=2096.544995903969&rendered=5098.854996263981&advertiser_id=4660981638&creative_id=programmatic&creative_type=sized&line_item_id=programmatic&order_id=2443012271&rendered_size=970x250&request_to_rendered=2043.9900010824203&pageLoad_to_rendered=5098.854996263981&CNS_init_to_rendered=4140.534996986389&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A12.926Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=23789.935483870966&image_count=31&image_surface=737488&server=production&vp_height=1200&vp_width=1585&created=2033.4849953651428&staged=2060.339994728565&pageload_to_staged=2060.339994728565&channel=information_technology&ctx_template=article&id=15592542698308flta2dygnelccir0yyxvi0li76cbo&instance=0&name=siderail_0&position_fold=atf&position_xy=20x0&request_number=1&tags=plugin_wordpress_wp_live_chat_support&template=article&type=siderail&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1102.0199954509735&inViewport=2069.5549994707108&pageLoad_to_in_viewport=1111.235000193119&isRefresh=true&requested=3080.029994249344&pageLoad_to_requested=3080.029994249344&CNS_init_to_requested=2121.709994971752&rendered=5129.224993288517&advertiser_id=4660981638&creative_id=programmatic&creative_type=sized&line_item_id=programmatic&order_id=2443012271&rendered_size=300x600&request_to_rendered=2049.194999039173&pageLoad_to_rendered=5129.224993288517&CNS_init_to_rendered=4170.904994010925&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A12.945Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=dd7229d7-45ee-42ec-a2dc-0a156c37a05c&sID=d06a5ada-98e9-4bcd-bd4d-37aa470eafcb&pID=0d940ef5-83d8-4b6b-aa24-0a72595bfc83&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=23789.935483870966&image_count=31&image_surface=737488&server=production&vp_height=1200&vp_width=1585&created=2034.7899943590164&staged=2073.8999992609024&pageload_to_staged=2073.8999992609024&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=786x0&request_number=1&tags=plugin_wordpress_wp_live_chat_support&template=article&type=native_xrail&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1115.5799999833107&inViewport=2082.7749967575073&pageLoad_to_in_viewport=1124.4549974799156&isRefresh=true&requested=3094.679996371269&pageLoad_to_requested=3094.679996371269&CNS_init_to_requested=2136.3599970936775&rendered=5147.979997098446&advertiser_id=1454517775&creative_id=138237302059&creative_type=sized&line_item_id=4736014287&order_id=2338761482&rendered_size=300x140&request_to_rendered=2053.3000007271767&pageLoad_to_rendered=5147.979997098446&CNS_init_to_rendered=4189.659997820854&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j76&a=1901699954&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=1322214306.1559254269&jid=1327594066&_gid=111453486.1559254269&gjid=18530472&_v=j76&z=1111171531
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1322214306.1559254269&jid=1327594066&_v=j76&z=1111171531
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1322214306.1559254269&jid=1327594066&_v=j76&z=1111171531&slf_rd=1&random=2401049036
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1322214306.1559254269&jid=1327594066&_v=j76&z=1111171531&slf_rd=1&random=2401049036
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:13 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:13 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=1322214306.1559254269&jid=1327594066&_v=j76&z=1111171531&slf_rd=1&random=2401049036
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
wt
polarcdn-pentos.com/ Frame D886
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=1&n=3&p=UNKNOWN&s=1&u=10c9b2d9-d668-4c7e-8dc0-494b42e1c5ee&v=2%2Fd89f97f&w=1.143.0&y=w&z=v1.6.40&pas=asa-web&pag2=%2F3379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2&pai=660e4&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=bafdcbf7e6f14f203bb277c2b3290339&t=arx&parcid=0dd2c&parid=59e51&parin=1&partm=0&par=s&maxts=0.016&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&_=1559254273161
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:14 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4df40af20b36c82f-AMS
wt
polarcdn-pentos.com/ Frame D886
3 B
593 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=2&n=3&p=UNKNOWN&s=1&u=10c9b2d9-d668-4c7e-8dc0-494b42e1c5ee&v=2%2Fd89f97f&w=1.143.0&y=w&z=v1.6.40&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=u&pai=660e4&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=bafdcbf7e6f14f203bb277c2b3290339&t=atx&parcid=0dd2c&parid=9139d&parin=2&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&_=1559254273162
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:14 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4df40af20b38c82f-AMS
pl
bw-prod.plrsrvcs.com/bid/ Frame D886
0
340 B
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/bid/pl
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dd0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://arstechnica.com
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type,x-openrtb-version

Response headers

date
Thu, 30 May 2019 22:11:13 GMT
server
cloudflare
access-control-allow-origin
*
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, POST, OPTIONS
status
204
cf-ray
4df40ae8a9e9bebf-FRA
access-control-allow-headers
Content-Type, x-openrtb-version
truncated
/ Frame D886
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
427a0afe833d93f6818fc2d495ba5f86948001d5996abef9d0bb02475914cdc0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
pl
bw-prod.plrsrvcs.com/bid/ Frame D886
2 KB
2 KB
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/bid/pl
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dd0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e2ef72a3f22c85a885b2e4023af8f8b23e833a0ed8126db3aa5c6f3334fe1a01

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
x-openrtb-version
2.3
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Origin
https://arstechnica.com
Content-Type
application/json

Response headers

date
Thu, 30 May 2019 22:11:13 GMT
content-encoding
gzip
x-polar-trace-id
x-polar-response-id
ac392aa19b9a4e3e81641ecccbecb5a7
status
200
x-polar-h
ddf0e-31
x-polar-t
0.216
pragma
no-cache
server
cloudflare
cache-control
no-cache, no-store, must-revalidate
x-polar-misses
tq,at
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cf-ipcountry
DE
cf-ray
4df40ae8c9f5bebf-FRA
expires
0
wt
polarcdn-pentos.com/ Frame D886
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=3&n=3&p=UNKNOWN&s=1&u=10c9b2d9-d668-4c7e-8dc0-494b42e1c5ee&v=2%2Fd89f97f&w=1.143.0&y=w&z=v1.6.40&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.97c08aa1-d58c-4295-82b7-743a8bfc5cd9.ac392a&paensm=n&pai=660e4&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&cu=bafdcbf7e6f14f203bb277c2b3290339&t=arx&parcid=0dd2c&parid=9139d&parin=2&partm=1&par=s&maxts=0.518&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&_=1559254273163
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:14 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4df40af20b39c82f-AMS
c3e1e8b602614b8ea5861e9e2780be24
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/ Frame D886
15 KB
4 KB
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/c3e1e8b602614b8ea5861e9e2780be24?order=a05edd94a057480d932920bafeea5f83
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
33824c29b587313a02bf1b72cf964c63ccb5c4ad3860455774a6be382a48ac36

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 30 May 2019 22:11:13 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"ee012ec0c19bbaada9e78eb8427f742c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=900
x-country
DE
cf-ray
4df40aeaecabd6cd-FRA
wt
polarcdn-pentos.com/ Frame D886
3 B
65 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=4&n=3&p=NA-ARSTECH-11238837&s=1&u=10c9b2d9-d668-4c7e-8dc0-494b42e1c5ee&v=2%2Fd89f97f&w=1.143.0&y=w&z=v1.6.40&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.97c08aa1-d58c-4295-82b7-743a8bfc5cd9.ac392a&paenli=23426872b48649499cc8db8fecd909fe&paenlip=126aacc9f35e47588e077e06cb68ff23&paeno=a05edd94a057480d932920bafeea5f83&paenop=6d13adb958b8476daf9100ad68e5b136&paes=fd9a1a7c3cf24f9fb674bbc3a4ebe163&paensm=n&pai=660e4&d=arstechnica.com&l=Key-native_xrail+%5BXrail%5D&pajs=body&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&paio=1&pasb=1&pecy=DE&c=86f9eef5f2704a08b08ac823e5757758&pacexp=241695506287489c9b2365e8ffddfdd0&t=i&pasp=6fe1dded4b5f4d1a8a01dfa8492cbdab&papss=a&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&_=1559254273164
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:14 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4df40af20b3ac82f-AMS
5cd19646524942ba3c915664
polarcdn-terrax.com/image/v1.0.0/bin/
8 KB
8 KB
Image
General
Full URL
https://polarcdn-terrax.com/image/v1.0.0/bin/5cd19646524942ba3c915664?v=ae026&w=300
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bd399288570ab719552a1aa92a45b7fc41afe6192fd535c0b78d7a2ee2e733a

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:13 GMT
via
1.1 varnish
cf-cache-status
HIT
cf-ray
4df40aeb7a756383-FRA
status
200
access-control-max-age
432000
content-length
8016
x-varnish
1280705041 1280356250
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=432000
accept-ranges
bytes
timing-allow-origin
*
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A14.262Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=c9039ca5-af59-46a9-849a-86c8162df8ae&uNw=1&uUq=1&pID=dea7ce55-fced-4af1-9c8e-19cd4d9dd685&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=24621.5&image_count=32&image_surface=787888&server=production&vp_height=1200&vp_width=1585&created=2030.7299941778183&staged=2041.424997150898&pageload_to_staged=2041.424997150898&channel=information_technology&ctx_template=article&id=1559254269827y1awgeifeulio5muhagjt4dcwct0oc&instance=0&name=post_nav_0&position_fold=atf&position_xy=0x308&request_number=1&tags=plugin_wordpress_wp_live_chat_support&template=article&type=post_nav&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1083.1049978733063&inViewport=2051.5749976038933&pageLoad_to_in_viewport=1093.2549983263016&isRefresh=true&is_first_Request=true&requested=3054.8649951815605&pageLoad_to_requested=3054.8649951815605&CNS_init_to_requested=2096.544995903969&rendered=5098.854996263981&advertiser_id=4660981638&creative_id=programmatic&creative_type=sized&line_item_id=programmatic&order_id=2443012271&rendered_size=970x250&request_to_rendered=2043.9900010824203&pageLoad_to_rendered=5098.854996263981&CNS_init_to_rendered=4140.534996986389&is_first_impression_viewable=true&impression_Viewable=6465.119995176792&in_viewport_to_visible_change=4413.544997572899&pageLoad_to_gpt_viewable=6465.119995176792&CNS_init_to_impression_Viewable=5506.7999958992&request_to_impression_Viewable=3410.2549999952316&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:15 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
1535ffdd-f2a5-4a2b-85fb-6fbf3694c1cc
https://arstechnica.com/ Frame A512
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/1535ffdd-f2a5-4a2b-85fb-6fbf3694c1cc
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
ADTECH;apid=1Ad708dd48-8327-11e9-8154-12795fd23bd8;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Ad708dd48-8327-11e9-8154-12795fd23bd8;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Ad708dd48-8327-11e9-8154-12795fd23bd8;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Ad708dd48-8327-11e9-8154-12795fd23bd8;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Ad708dd48-8327-11e9-8154-12795fd23bd8;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ad708e356-8327-11e9-86a0-124c2db8624e;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Ad708e356-8327-11e9-86a0-124c2db8624e;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Ad708e356-8327-11e9-86a0-124c2db8624e;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Ad708e356-8327-11e9-86a0-124c2db8624e;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Ad708e356-8327-11e9-86a0-124c2db8624e;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ad708fc60-8327-11e9-9d8f-12d220623a1c;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Ad708fc60-8327-11e9-9d8f-12d220623a1c;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Ad708fc60-8327-11e9-9d8f-12d220623a1c;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Ad708fc60-8327-11e9-9d8f-12d220623a1c;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Ad708fc60-8327-11e9-9d8f-12d220623a1c;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ad709771c-8327-11e9-a8f6-12783854d8e0;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Ad709771c-8327-11e9-a8f6-12783854d8e0;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Ad709771c-8327-11e9-a8f6-12783854d8e0;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Ad709771c-8327-11e9-a8f6-12783854d8e0;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Ad709771c-8327-11e9-a8f6-12783854d8e0;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ad708e356-8327-11e9-86a0-124c2db8624e;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
495 B
611 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1Ad708e356-8327-11e9-86a0-124c2db8624e;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._nI5PBIdi
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
f3153ca072b6b17a1a557c7db6d772b37afb80db2af4cb693b3c7a719b59daa9

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
495
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ad708dd48-8327-11e9-8154-12795fd23bd8;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
494 B
634 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1Ad708dd48-8327-11e9-8154-12795fd23bd8;cfp=1;rndc=1559254274;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._DLy9OBHm
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
6070476e2cea9d08b6d7c8b1c17274aa75a47b30196ddc8c78bc433b57dedd3e

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
494
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ad708fc60-8327-11e9-9d8f-12d220623a1c;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
495 B
611 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1Ad708fc60-8327-11e9-9d8f-12d220623a1c;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269868;callback=window.headertag.AolHtb.adResponseCallbacks._QYEfhbPl
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
8c3b177d37452866e9dfd7cbbfcebfbe161b0b2cc2a30bec8a97b706fe2c6c86

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
495
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ad709771c-8327-11e9-a8f6-12783854d8e0;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
494 B
610 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1Ad709771c-8327-11e9-a8f6-12783854d8e0;cfp=1;rndc=1559254273;cmd=bid;cors=yes;v=2;misc=1559254269853;callback=window.headertag.AolHtb.adResponseCallbacks._vPQRJhrQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
8671937b9093cddb7c42f78b585bd6d091f2aa40f449e42a685feaaf0fe2fb2c

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:14 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
494
expires
Mon, 15 Jun 1998 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A15.312Z&_t=timespent&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=c9039ca5-af59-46a9-849a-86c8162df8ae&sID=72e9fa00-c64a-4731-a66a-aa8310ca4a1c&pID=dea7ce55-fced-4af1-9c8e-19cd4d9dd685&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&_v=5000&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:15 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame A512
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.131 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-131.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:20 GMT
Content-Encoding
gzip
X-Cache
RefreshHit from cloudfront
Access-Control-Max-Age
3000
Connection
keep-alive
Content-Length
29632
Via
1.1 b8e900270aa30d899882e71796feca9c.cloudfront.net (CloudFront)
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
aUHBLbKDLlacOFWfxAYN3qQrIGgglD4u_deXPBEe3HZMOc_VhhMS0A==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.309.0_en.html
imasdk.googleapis.com/js/core/ Frame 57A1
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.309.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.309.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
188912
date
Thu, 30 May 2019 03:23:47 GMT
expires
Fri, 29 May 2020 03:23:47 GMT
last-modified
Thu, 30 May 2019 03:19:50 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
67649
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame A512
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Thu, 30 May 2019 22:11:16 GMT
integrator.js
adservice.google.com/adsid/ Frame A512
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 30 May 2019 22:11:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame A512
53 KB
15 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
fa59b1ed1b011e084474ad818b5f6986d84fc678e2f37fee9330eb52d86860b3
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15397
x-xss-protection
0
pragma
public
x-fb-debug
HpSQRNtyEHPoD5pRzkieFAbguzSdfUB8v8/JzU2WVsFJZKKquf356ucDa4BYLsQ0PDZZCOToLOzaNZEZ3HgX5w==
date
Thu, 30 May 2019 22:11:16 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame A512
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.113 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-113.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:07:46 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
212
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 f038e7175be9761825b2eefc2b0a832e.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
Connection
keep-alive
X-Amz-Cf-Id
EFDW-HVYrpR7CGQ6NIOiCBrSnaDExkib60bRmVB9-6fDNQzBYaY-cg==
collect
www.google-analytics.com/r/
35 B
128 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:16 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
infinityid
infinityid.condenastdigital.com/ Frame A512
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/infinityid
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.209.166.125 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-209-166-125.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
140bac6ce2e74fd6acbb5e994d6782adf809a3fedc3434382e681f687ebc9a7e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 22:11:16 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
track
capture.condenastdigital.com/ Frame A512
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-05-30T22%3A11%3A15.912Z&_c=&_t=Player%20Requested&sID=72e9fa00-c64a-4731-a66a-aa8310ca4a1c&pID=dea7ce55-fced-4af1-9c8e-19cd4d9dd685&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:16 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/ Frame A512
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-05-30T22%3A11%3A16.175Z&_c=Performance&_t=adj_player_download_time&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fobra-dinn-war-stories&cId=5ce2c89234e7940313fbcad2&cKe=&cPd=2019-05-21T15%3A00%3A00%2B00%3A00&cTi=Return%20of%20the%20Obra%20Dinn%3A%20Lost%20in%20translation%20%7C%20War%20Stories&mDu=617&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pID=dea7ce55-fced-4af1-9c8e-19cd4d9dd685&pWw=540&pWh=303.75&sID=72e9fa00-c64a-4731-a66a-aa8310ca4a1c&uId=c9039ca5-af59-46a9-849a-86c8162df8ae&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%223013756-59de-44da-8496-20fde907cc46%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A2403.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&_v=4573.090001940727&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:16 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1558373184/ Frame A512
58 KB
59 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
2e3846d5f2f5b32e83c31448e8b06203de00da6fc011c9333baed2ba03e20867

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 21 May 2019 15:14:35 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
802601
Edge-Cache-Tag
433557846635605494688582207268998106147,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
59222
X-Request-Id
ed6c24be7621936d
X-Served-By
cache-fra19167-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 21 May 2019 15:03:25 GMT
Server
cloudinary
X-Timer
S1558451675.273837,VS0,VE247
ETag
"f0ca9843bf5f020d6c2fca61a6bf30b3"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
Tbhnm0hA6qRH9-eRlhPkuVzPnoVh0vUn0O3ESA6pVHoTJVqHCWBVng==
X-Cache-Hits
0
75f12808-639c-462c-a6e2-cc5d3f10cc8dthumbs.mp4
dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/ Frame A512
174 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/75f12808-639c-462c-a6e2-cc5d3f10cc8dthumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.82 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-82.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-
chrome-proxy
frfr

Response headers

Date
Thu, 30 May 2019 20:27:02 GMT
Via
1.1 62dc260e32d7b9197a4511447f6a264a.cloudfront.net (CloudFront)
Last-Modified
Mon, 20 May 2019 16:55:20 GMT
Server
AmazonS3
Age
6255
ETag
"ef1dda7ea871c0824581b5e004bdd627"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-2377620/2377621
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2377621
X-Amz-Cf-Id
bpNO8ftatoVrMiPL-Ui9jMlYm6zaxjLgAZs9k77HwfkHPpgi3tOU-Q==
75f12808-639c-462c-a6e2-cc5d3f10cc8dthumbs.mp4
dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/ Frame A512
16 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/75f12808-639c-462c-a6e2-cc5d3f10cc8dthumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.82 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-82.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-
chrome-proxy
frfr

Response headers

Date
Thu, 30 May 2019 20:27:02 GMT
Via
1.1 08bbe291f260c2b80a00874a80ade07c.cloudfront.net (CloudFront)
Last-Modified
Mon, 20 May 2019 16:55:20 GMT
Server
AmazonS3
Age
6258
ETag
"ef1dda7ea871c0824581b5e004bdd627"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-2377620/2377621
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2377621
X-Amz-Cf-Id
Bw1uwgRXvnnGMu7YURyQnBAkh_xfVji1u5apa8CkV_jz2Bs8U-efEA==
track
capture.condenastdigital.com/ Frame A512
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-05-30T22%3A11%3A16.241Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fobra-dinn-war-stories&cId=5ce2c89234e7940313fbcad2&cKe=&cPd=2019-05-21T15%3A00%3A00%2B00%3A00&cTi=Return%20of%20the%20Obra%20Dinn%3A%20Lost%20in%20translation%20%7C%20War%20Stories&mDu=617&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pID=dea7ce55-fced-4af1-9c8e-19cd4d9dd685&pWw=540&pWh=303.75&sID=72e9fa00-c64a-4731-a66a-aa8310ca4a1c&uId=c9039ca5-af59-46a9-849a-86c8162df8ae&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%223013756-59de-44da-8496-20fde907cc46%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A2403.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:16 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
559a6976-b1ff-4a29-afda-bd8eb1cd3458
https://arstechnica.com/ Frame A512
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/559a6976-b1ff-4a29-afda-bd8eb1cd3458
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
75f12808-639c-462c-a6e2-cc5d3f10cc8dmanifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/ Frame A512
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/75f12808-639c-462c-a6e2-cc5d3f10cc8dmanifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.82 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-82.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
14524ba86c7876f23b3e72384312a9e561e617dd917476be2972c3da44a11d72

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 06:53:20 GMT
Via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
Vary
Origin
Age
55078
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Mon, 20 May 2019 16:54:10 GMT
Server
AmazonS3
ETag
"c8b510b0dfbe907a3b39547d5e431a83"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Accept-Ranges
bytes
X-Amz-Cf-Id
hvdp5MWJ76RNwD0egYYHFe0dzvkZB123nL9NR66UAPEODk9-IGtPgQ==
1663130473914833
connect.facebook.net/signals/config/ Frame A512
207 KB
55 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.8.47&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
d3a643a7e9e559b030e5bdc3c22ea5e08611bbf931cd715c082f25be77d84b95
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
56215
x-xss-protection
0
pragma
public
x-fb-debug
SUYr5Ip5m8RgyeIBmQt7l/wOQej29W0K5rnrEZrGDyoYfElYmxsNPMMFvznwW55FWHKVX25UC25uGf93mCr0sw==
date
Thu, 30 May 2019 22:11:16 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
inferredEvents.js
connect.facebook.net/signals/plugins/ Frame A512
1 KB
906 B
Script
General
Full URL
https://connect.facebook.net/signals/plugins/inferredEvents.js?v=2.8.47
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
cd1c301a8e7960a1786e2a959226b0b78b56dbea284bd114265f1662d6ca280e
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
772
x-xss-protection
0
pragma
public
x-fb-debug
89BjaJ+XGaZ9RhzfOgPfVvrDvJP96+PJexB/lQVYLREqfmT5VAUuZQVvN5BBfPAn3UWenQlTyjBXcSBBYSUKZw==
date
Thu, 30 May 2019 22:11:16 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
/
srv-2019-05-30-22.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-05-30-22.pixel.parsely.com/plogger/?rand=1559254276531&plid=11974976&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%224846082f-4fba-433c-88ba-2d3de840a6aa%22%2C%22parsely_site_uuid%22%3A%225e1e2bf6-4356-4116-8cff-1c55888af1ce%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&sref=&sts=1559254276526&slts=0&title=Hackers+actively+exploit+WordPress+plugin+flaw+to+send+visitors+to+bad+sites+%7C+Ars+Technica&date=Thu+May+30+2019+22%3A11%3A16+GMT%2B0000+(Coordinated+Universal+Time)&action=pageview&pvid=30654006&u=5e1e2bf6-4356-4116-8cff-1c55888af1ce
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.93.90.146 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-93-90-146.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:17 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1558373184/ Frame A512
58 KB
59 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.194 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-194.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
2e3846d5f2f5b32e83c31448e8b06203de00da6fc011c9333baed2ba03e20867

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Tue, 21 May 2019 15:14:35 GMT
Via
1.1 varnish, 1.1 25c6baf0a31a5ef699c1e219b25ce7b9.cloudfront.net (CloudFront)
Age
802601
Edge-Cache-Tag
433557846635605494688582207268998106147,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
59222
X-Request-Id
ed6c24be7621936d
X-Served-By
cache-fra19167-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 21 May 2019 15:03:25 GMT
Server
cloudinary
X-Timer
S1558451675.273837,VS0,VE247
ETag
"f0ca9843bf5f020d6c2fca61a6bf30b3"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
G9kI4MO0Qj_oKFtuNjvEia9URyWBfnXYidUPPcwdA2Hqk92WbECGJw==
X-Cache-Hits
0
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1558373184/ Frame A512
58 KB
59 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.254.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-254-32.fra6.r.cloudfront.net
Software
cloudinary /
Resource Hash
2e3846d5f2f5b32e83c31448e8b06203de00da6fc011c9333baed2ba03e20867

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 21 May 2019 15:14:35 GMT
Via
1.1 varnish, 1.1 e7e7960d7731a7583cedd8f1ff1aca38.cloudfront.net (CloudFront)
Age
802601
Edge-Cache-Tag
433557846635605494688582207268998106147,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
59222
X-Request-Id
ed6c24be7621936d
X-Served-By
cache-fra19167-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 21 May 2019 15:03:25 GMT
Server
cloudinary
X-Timer
S1558451675.273837,VS0,VE247
ETag
"f0ca9843bf5f020d6c2fca61a6bf30b3"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
jO1FMkxttHbUCZh6BILfZM24LOjqFkfOt6Wf5JOyszq6CNLx1Kg-PA==
X-Cache-Hits
0
75f12808-639c-462c-a6e2-cc5d3f10cc8dfile-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/ Frame A512
8 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/75f12808-639c-462c-a6e2-cc5d3f10cc8dfile-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.82 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-82.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d1d0e79a6bb91741a26f6e421bf2ca531dfa5bcd600a96de2f27486c1ce5cf35

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 06:53:20 GMT
Content-Encoding
gzip
Last-Modified
Mon, 20 May 2019 16:57:22 GMT
Server
AmazonS3
Age
55078
Vary
Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
toHo8yUwArFvpRXFrh3V0UC-JuR-Ej_w7UzomsSLg5jNXdyJNXMPEQ==
Via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
3307c80d-7004-437c-af85-66e2118e7ee0
https://arstechnica.com/ Frame A512
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/3307c80d-7004-437c-af85-66e2118e7ee0
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d98f6483472c91ab7120ec1a5c4d74f759490cdbbfe655035ab2d024feb9009

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
75f12808-639c-462c-a6e2-cc5d3f10cc8dfile-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/ Frame A512
407 KB
392 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5ce2c89234e7940313fbcad2/75f12808-639c-462c-a6e2-cc5d3f10cc8dfile-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.35.253.82 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-35-253-82.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
fcf834c7d962780112867420bf4ef5e51956aa843eefd66906e7cef49b89f039

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

Date
Thu, 30 May 2019 06:53:21 GMT
Content-Encoding
gzip
Last-Modified
Mon, 20 May 2019 16:57:22 GMT
Server
AmazonS3
Age
55077
Vary
Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
gUl0ntw8IpizTlBRHfy9nPYTYJWaphw0duEgh_gQMvioXXzfZDCFNw==
Via
1.1 e0bc02299b03254b2a35b8c930f005c6.cloudfront.net (CloudFront)
ads
pubads.g.doubleclick.net/gampad/ Frame A512
8 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/biz-andamp-it&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=env_device_type%3Ddesktop%26env_server%3Dproduction%26rdt_device_template%3Ddesktop_article%26cnt_tags%3Dplugin%252Cwordpress%252Cwp-live-chat-support%26usr_bkt_pv%3D88%26ctx_cns_version%3D2_26_0%26vnd_ars_data%3D%26vnd_prx_segments%3D300003%252C121100%252C131100%252C131103%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cwmhp4i%252C2hkgm5%252Cap05we%252Cfdf1wd%252Cf5u35n%252Cv8lc56%252C_GrvbJftPxaU_%26vnd_4d_ctx_topics%3DALLBRANDS_64%252CALLBRANDS_57%252CALLBRANDS_28%252CALLBRANDS_244%252CALLBRANDS_21%252CALLBRANDS_192%252CALLBRANDS_70%252CALLBRANDS_7%252CALLBRANDS_63%252CALLBRANDS_38%252CALLBRANDS_31%252CALLBRANDS_283%252CALLBRANDS_274%252CALLBRANDS_258%252CALLBRANDS_167%252CALLBRANDS_134%26vnd_4d_ctx_topic_sc%3D0.4421488418730969%252C0.4421488418730969%252C0.4421488418730969%252C0.4421488418730969%252C0.4421488418730969%252C0.4421488418730969%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%252C0.23221502981406242%26vnd_4d_ctx_entities%3Dhacker%252Cwordpress%252Cpage%2520layout%252Ccontent%2520management%2520system%252Cjavascript%252Czscaler%252Ccross-site%2520scripting%252Cprakhar%2520shrotriya%252Cdan%2520goodin%252Cutc%252Cdrupal%252Ccond%25C3%25A9%2520nast%252Cars%2520orbital%2520transmission%252Ccms%252Cars%2520technica%2520addendum%252Ccnmn%2520collection%252Cmedia%2520group%252Car%26vnd_4d_ctx_ent_sc%3D0.9916231558235189%252C0.8997148674806648%252C0.843273301942686%252C0.785498321886274%252C0.7628638284904774%252C0.7098644768309692%252C0.5927603627647994%252C0.5388039322551391%252C0.5148449250448555%252C0.4756642786456441%252C0.4477497512113542%252C0.4393050133122588%252C0.39471710216076733%252C0.35360187943049914%252C0.3312051676562671%252C0.3223247902638557%252C0.32186520921147455%252C0.31684364537472576%26vnd_4d_ctx_keywords%3Dvulnerability%252Chacker%252Csite%252Cwordpress%252Cplugin%252Cpage%2520layout%252Ccontent%2520management%2520system%252Cjavascript%252Cmalicious%2520redirect%252Czscaler%252Cvisitor%252Cmisleading%2520popup%252Cresearcher%252Ccross-site%2520scripting%252Cversion%252Cprakhar%2520shrotriya%252Cdan%2520goodin%252Cattacker%252Cunwanted%2520popup%252Cwebsite%26vnd_4d_ctx_kw_sc%3D1%252C0.9916231558235189%252C0.9693398909662085%252C0.8997148674806648%252C0.8512955820150983%252C0.843273301942686%252C0.785498321886274%252C0.7628638284904774%252C0.7577880353869039%252C0.7098644768309692%252C0.6319734789717176%252C0.6134291364151024%252C0.5972291919101648%252C0.5927603627647994%252C0.5784444461926286%252C0.5388039322551391%252C0.5148449250448555%252C0.5053766890448752%252C0.4855792532666747%252C0.47928366163275893%26vnd_4d_pid%3D0d940ef5-83d8-4b6b-aa24-0a72595bfc83%26vnd_4d_xid%3Db219b367-5c6e-4837-b889-5330f0c58e36%26vnd_4d_sid%3Dd06a5ada-98e9-4bcd-bd4d-37aa470eafcb%26ctx_template%3Darticle%26ctx_page_slug%3Dhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%26ctx_page_channel%3Dinformation_technology%26ctx_line_items%3D%26height%3D304%26muted%3D1%26series%3D5c82bd18bcdfff6f1f2fc5e7%26width%3D540&correlator=536204889911915&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fobra-dinn-war-stories&vid=5ce2c89234e7940313fbcad2&cmsid=1495&ppid=0605a333cc95455fb0377a4fbace9322
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.2 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s14-in-f2.1e100.net
Software
cafe /
Resource Hash
7549324f461f1c656cb453e7217bc268831f1a4a018cb3c57b66aa7ab07002ad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com

Response headers

date
Thu, 30 May 2019 22:11:20 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1814
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame A512
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-05-30T22%3A11%3A19.035Z&_c=timedOut&_t=gptData&sID=72e9fa00-c64a-4731-a66a-aa8310ca4a1c&pID=dea7ce55-fced-4af1-9c8e-19cd4d9dd685&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225ce2c89234e7940313fbcad2%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:19 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
cdb
bidder.criteo.com/
0
213 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=65&profileId=154&cb=2286552090
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://arstechnica.com
Date
Thu, 30 May 2019 22:11:19 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Timing-Allow-Origin
*
Vary
Origin
cdb
bidder.criteo.com/
0
213 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=65&profileId=154&cb=81023189274
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://arstechnica.com
Date
Thu, 30 May 2019 22:11:19 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Timing-Allow-Origin
*
Vary
Origin
collect
www.google-analytics.com/r/
35 B
111 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 30 May 2019 22:11:20 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame A512
281 KB
87 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-6af644e7b1e6d08bb8ee.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.18.235.40 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
9d20353b332d87a8c909335a215c1a4c19d9ea8ef59acb8dc1fd3ea7a4f2d6cb

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:20 GMT
Content-Encoding
gzip
Last-Modified
Thu, 30 May 2019 21:28:05 GMT
Server
AmazonS3
x-amz-request-id
DF1924E230F2A2D7
ETag
"ff50f3161826fcd54c0ef987255eaef6"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=63871
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88404
x-amz-id-2
oSdquX7KgnFRv3aIa7hN5logDuVUXv8khwVzrw3/qsoBwVWynmzpG6a8nQnm5u+d60ga+slwAiw=
track
capture.condenastdigital.com/ Frame A512
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-05-30T22%3A11%3A20.157Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fobra-dinn-war-stories&cId=5ce2c89234e7940313fbcad2&cKe=&cPd=2019-05-21T15%3A00%3A00%2B00%3A00&cTi=Return%20of%20the%20Obra%20Dinn%3A%20Lost%20in%20translation%20%7C%20War%20Stories&cTy=%2F3379%2Fconde.ars%2Fplayer%2Fbiz-andamp-it&mDu=617&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pID=dea7ce55-fced-4af1-9c8e-19cd4d9dd685&pWw=540&pWh=303.75&sID=72e9fa00-c64a-4731-a66a-aa8310ca4a1c&uId=c9039ca5-af59-46a9-849a-86c8162df8ae&xid=0605a333-cc95-455f-b037-7a4fbace9322&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%223013756-59de-44da-8496-20fde907cc46%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A2403.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:20 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
419 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&o=3&t=1559254280212&de=988341922661&m=0&ar=499cee0265-clean&q=5&cb=0&cu=1559254280212&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=Return%20of%20the%20Obra%20Dinn_%20Lost%20in%20translation%20%7C%20War%20Stories%3A%2F3379%2Fconde.ars%2Fplayer%2Fbiz-andamp-it%3Aundefined%3Aundefined&zMoatVideoId=5ce2c89234e7940313fbcad2&zMoatAP=-&qs=1&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&id=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&fs=163039&na=1118230139&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.75.174.31 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-75-174-31.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 30 May 2019 22:11:20 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
AkamaiNetStorage
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 30 May 2019 22:11:20 GMT
local_storage_frame10.min.html
assets.bounceexchange.com/assets/bounce/ Frame 84D6
0
0
Document
General
Full URL
https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Requested by
Host: assets.bounceexchange.com
URL: https://assets.bounceexchange.com/assets/smart-tags/versioned/ijs_all_modules_008c9b736806ad26deb0c1b5861503d1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.86.3.46 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-99-86-3-46.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
assets.bounceexchange.com
:scheme
https
:path
/assets/bounce/local_storage_frame10.min.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/

Response headers

status
200
content-type
text/html
content-length
995
date
Mon, 10 Dec 2018 18:23:34 GMT
last-modified
Thu, 06 Dec 2018 22:10:11 GMT
etag
"55fccc7bc73db2181e976f1ccec90e2c"
cache-control
max-age=31536000
content-encoding
gzip
x-amz-version-id
iR64T.LKj_uq4qI1dcEGfT66vRlvUKzS
accept-ranges
bytes
server
AmazonS3
age
14788067
x-cache
Hit from cloudfront
via
1.1 d07eabeb1ed60c06da1457f35fb5c8c5.cloudfront.net (CloudFront)
x-amz-cf-id
9vBJ7esRMzH-LNGdgl_pXxlaNHz6ek8MxnudquFrPltFcsoXCmJYhw==
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-05-30T22%3A11%3A24.575Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=plugin%7Cwordpress%7Cwp%20live%20chat%20support&cCh=information%20technology&cTi=Hackers%20actively%20exploit%20WordPress%20plugin%20flaw%20to%20send%20visitors%20to%20bad%20sites&cTy=article%7Creport&cTp=ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192%2C%20ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134&cTpw=0.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.4421488418730969%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242%2C%200.23221502981406242&cEnt=hacker%2C%20wordpress%2C%20page%20layout%2C%20content%20management%20system%2C%20javascript%2C%20zscaler%2C%20cross-site%20scripting%2C%20prakhar%20shrotriya%2C%20dan%20goodin%2C%20utc%2C%20drupal%2C%20cond%C3%A9%20nast%2C%20ars%20orbital%20transmission%2C%20cms%2C%20ars%20technica%20addendum%2C%20cnmn%20collection%2C%20media%20group%2C%20ar&cEnw=0.9916231558235189%2C%200.8997148674806648%2C%200.843273301942686%2C%200.785498321886274%2C%200.7628638284904774%2C%200.7098644768309692%2C%200.5927603627647994%2C%200.5388039322551391%2C%200.5148449250448555%2C%200.4756642786456441%2C%200.4477497512113542%2C%200.4393050133122588%2C%200.39471710216076733%2C%200.35360187943049914%2C%200.3312051676562671%2C%200.3223247902638557%2C%200.32186520921147455%2C%200.31684364537472576&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&cCl=354&cId=1512259&cPd=2019-05-29T23%3A05%3A00.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=3800&pSw=1600&pSh=1200&uID=2f12c680-9166-48d8-9842-67f0987ce117&uNw=1&uUq=1&pID=40b3571e-553b-4d58-9b62-239158d6da76&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=4ff8d6fd-6aa0-4659-b65a-2d160f0133b1&content_uri=information_technology&image_avg_surface=24621.5&image_count=32&image_surface=787888&server=production&vp_height=1200&vp_width=1585&created=2033.4849953651428&staged=2060.339994728565&pageload_to_staged=2060.339994728565&channel=information_technology&ctx_template=article&id=15592542698308flta2dygnelccir0yyxvi0li76cbo&instance=0&name=siderail_0&position_fold=atf&position_xy=20x0&request_number=1&tags=plugin_wordpress_wp_live_chat_support&template=article&type=siderail&CNS_init=958.3199992775917&suffix=dart&CNS_init_to_staged=1102.0199954509735&inViewport=2069.5549994707108&pageLoad_to_in_viewport=1111.235000193119&isRefresh=true&requested=3080.029994249344&pageLoad_to_requested=3080.029994249344&CNS_init_to_requested=2121.709994971752&rendered=5129.224993288517&advertiser_id=4660981638&creative_id=programmatic&creative_type=sized&line_item_id=programmatic&order_id=2443012271&rendered_size=300x600&request_to_rendered=2049.194999039173&pageLoad_to_rendered=5129.224993288517&CNS_init_to_rendered=4170.904994010925&impression_Viewable=16774.669997394085&in_viewport_to_visible_change=14705.114997923374&pageLoad_to_gpt_viewable=16774.669997394085&CNS_init_to_impression_Viewable=15816.349998116493&request_to_impression_Viewable=13694.640003144741&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=vulnerability%2Chacker%2Csite%2Cwordpress%2Cplugin%2Cpage%20layout%2Ccontent%20management%20system%2Cjavascript%2Cmalicious%20redirect%2Czscaler%2Cvisitor%2Cmisleading%20popup
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 30 May 2019 22:11:24 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
/
srv-2019-05-30-22.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-05-30-22.pixel.parsely.com/plogger/?rand=1559254287079&plid=11974976&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%224846082f-4fba-433c-88ba-2d3de840a6aa%22%2C%22parsely_site_uuid%22%3A%225e1e2bf6-4356-4116-8cff-1c55888af1ce%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&sref=&sts=1559254287069&slts=0&date=Thu+May+30+2019+22%3A11%3A27+GMT%2B0000+(Coordinated+Universal+Time)&action=heartbeat&inc=5&tt=4900&pvid=30654006&u=5e1e2bf6-4356-4116-8cff-1c55888af1ce
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.92.219.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-92-219-53.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2019/05/hackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 30 May 2019 22:11:27 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
cs.js
sb.scorecardresearch.com/c2/6035094/
0
0

adsct
analytics.twitter.com/i/
0
0

/
px.ads.linkedin.com/collect/
0
0

/
www.facebook.com/tr/
0
0

event
condenast.demdex.net/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.5505881144855083
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=57&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.4494568159864729
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=55&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.5941163610335038
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.8784959532957051
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=10&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.12758437662927302
Domain
fastlane.rubiconproject.com
URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=54&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=custom&rand=0.33115412819570267
Domain
sb.scorecardresearch.com
URL
https://sb.scorecardresearch.com/c2/6035094/cs.js
Domain
analytics.twitter.com
URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=o1o49&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F
Domain
px.ads.linkedin.com
URL
https://px.ads.linkedin.com/collect/?time=1559254298349&pid=434737&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&fmt=js&s=1
Domain
www.facebook.com
URL
https://www.facebook.com/tr/?id=228464857488266&ev=Spire-Studio-Segment&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F05%2Fhackers-actively-exploit-wordpress-plugin-flaw-to-send-visitors-to-bad-sites%2F&rl=&if=false&ts=1559254298445&cd[code]=&sw=1600&sh=1200&v=2.8.47&r=stable&ec=2&o=30&fbp=fb.1.1559254298442.840357739&it=1559254268916&coo=false&rqm=GET
Domain
condenast.demdex.net
URL
https://condenast.demdex.net/event?_ts=1559254298451

Verdicts & Comments Add Verdict or Comment

191 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| ars object| digitalData object| cns object| dataLayer object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady73090988 function| __cmp object| BOOMR_mq object| _satellite object| google_tag_manager object| __SKIM_JS_GLOBAL__ object| googletag function| moatCondeListener object| apstag object| headertag object| CN object| _4d object| SparrowCache function| arsData object| _cne object| PolarConde function| e object| visitor function| Visitor object| s_c_il number| s_c_in function| DIL object| dilInstance string| referrer object| urlParams string| queryString string| fullUrl object| myParam string| GoogleAnalyticsObject function| ga object| _qevents object| __adIq_Config string| b object| h object| _aam_dataLayer undefined| userId boolean| _aam_spa function| fbq function| _fbq function| twq function| getVisitNumCustom number| d string| _linkedin_partner_id object| _linkedin_data_partner_ids object| AIM function| snaptr object| r function| addPixel string| hash object| PARSELY function| s_doPlugins function| s_getLoadTime function| AppMeasurement function| s_gi function| s_pgicq object| s string| s_loadT number| s_objectID number| s_giq number| vb function| Sparrow object| google_tag_data object| gaplugins object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| twttr object| __core-js_shared__ object| core object| NATIVEADS object| NATIVEADS_QUEUE object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| bouncex boolean| sparrowInitialize object| _sparrow object| Criteo function| headertag_render object| rubicontag object| gaGlobal function| quantserve function| __qc object| ezt object| _qoptions object| gaData object| Sailthru undefined| google_measure_js_timing boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id object| NATIVEADS_STORE object| _0x54bb function| _0x1750 object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| criteo_pubtag function| docReady undefined| a undefined| c function| jsonFeed object| OneTrust object| Optanon string| OnetrustActiveGroups string| OptanonActiveGroups function| OptanonWrapper function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| googleCompanionsServicePresent function| googleGetCompanionAdSlots function| googleSetCompanionAdContents function| google_show_companion_ad function| google_show_companion_ad_in_slot function| google_get_companion_slot_params function| google_companion_error function| google_companion_loaded function| google_increment_num_ad_mouseovers string| google_ad_output string| google_ad_client string| google_flash_version boolean| google_webgl_support string| google_ad_section string| google_country object| s_i_conde-arstechnica number| google_unique_id object| google_reactive_ads_global_state function| mb function| Goog_AdSense_Lidar_sendVastEvent function| Goog_AdSense_Lidar_getViewability function| Goog_AdSense_Lidar_getUrlSignalsArray function| Goog_AdSense_Lidar_getUrlSignalsList object| ima object| closure_lm_192892 object| google string| au_audience_code string| audigent_visitor_id object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 string| key object| closure_lm_78976 number| google_global_correlator function| reload_campaigns function| setBounceCookie function| getBounceCookie function| setBounceVisitCookie function| getBounceVisitCookie function| clearBounceCookie object| aupixels function| arrive function| unbindArrive function| leave function| unbindLeave

2 Cookies

Domain/Path Name / Value
.arstechnica.com/ Name: OptanonConsent
Value: groups=1%3A1%2C2%3A1%2C3%3A1%2C4%3A1%2C0_90183%3A1%2C0_90185%3A1%2C0_90179%3A1%2C0_90181%3A1%2C0_90158%3A1%2C0_90160%3A1%2C0_90187%3A1%2C0_90189%3A1%2C0_90156%3A1%2C0_90167%3A1%2C0_90169%3A1%2C0_90163%3A1%2C0_90165%3A1%2C0_90175%3A1%2C0_90177%3A1%2C0_90171%3A1%2C0_90173%3A1%2C0_90182%3A1%2C0_90184%3A1%2C0_90178%3A1%2C0_90180%3A1%2C0_90159%3A1%2C0_90161%3A1%2C0_90155%3A1%2C0_90186%3A1%2C0_90157%3A1%2C0_90188%3A1%2C0_90166%3A1%2C0_90168%3A1%2C0_90162%3A1%2C0_90164%3A1%2C0_90174%3A1%2C0_90176%3A1%2C0_90170%3A1%2C0_90172%3A1&datestamp=Thu+May+30+2019+22%3A11%3A38+GMT%2B0000+(Coordinated+Universal+Time)&version=4.9.0
arstechnica.com/ Name: GED_PLAYLIST_ACTIVITY
Value: W3sidSI6IldLVnciLCJ0c2wiOjE1NTkyNTQyOTcsIm52IjowLCJ1cHQiOjE1NTkyNTQyNzAsImx0IjoxNTU5MjU0MjcwfV0.

6 Console Messages

Source Level URL
Text
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined
console-api log URL: https://js-sec.indexww.com/ht/htw-condenast.js(Line 3)
Message:
digiTrustUser not defined

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
a.ad.gt
aax.amazon-adsystem.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ak.sail-horizon.com
ampcid.google.com
ampcid.google.de
analytics.twitter.com
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
assets.adobedtm.com
assets.bounceexchange.com
bidder.criteo.com
bw-prod.plrsrvcs.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.accelerator.arsdev.net
cdn.arstechnica.net
cdn.mediavoice.com
cm.everesttech.net
cm.g.doubleclick.net
code.jquery.com
condenast.demdex.net
connect.facebook.net
d.turn.com
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dpm.demdex.net
dwgyu36up6iuz.cloudfront.net
fastlane.rubiconproject.com
geolocation.onetrust.com
ids.ad.gt
image2.pubmatic.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
mcdp-nydc1.outbrain.com
mid.rkdms.com
odb.outbrain.com
optanon.blob.core.windows.net
p.ad.gt
p.rfihub.com
p.skimresources.com
pagead2.googlesyndication.com
pixel.condenastdigital.com
pixel.tapad.com
pixels.ad.gt
player.cnevids.com
plugin.mediavoice.com
polarcdn-pentos.com
polarcdn-terrax.com
pubads.g.doubleclick.net
px.ads.linkedin.com
px.moatads.com
r.skimresources.com
rules.quantcount.com
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
sc-static.net
secure.adnxs.com
secure.quantserve.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
snap.licdn.com
srv-2019-05-30-22.config.parsely.com
srv-2019-05-30-22.pixel.parsely.com
sstats.arstechnica.com
static.ads-twitter.com
static.criteo.net
static.polarcdn.com
stats.g.doubleclick.net
t.co
t.skimresources.com
tag.bounceexchange.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
tr.snapchat.com
widgets.outbrain.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.medtargetsystem.com
z.moatads.com
analytics.twitter.com
condenast.demdex.net
fastlane.rubiconproject.com
px.ads.linkedin.com
sb.scorecardresearch.com
www.facebook.com
104.17.192.78
104.244.42.5
104.75.174.31
108.128.62.29
13.35.253.109
13.35.253.111
13.35.253.23
13.35.253.40
13.35.253.62
13.35.253.82
13.35.253.95
13.35.254.113
13.35.254.131
13.35.254.194
13.35.254.32
13.35.254.41
13.35.254.94
151.101.0.239
151.101.2.2
151.101.36.157
151.139.128.10
152.195.39.114
172.217.18.162
172.217.18.2
172.217.22.2
178.250.0.165
178.250.2.130
185.64.189.110
193.0.160.129
2.18.232.23
2.18.232.28
2.18.234.190
2.18.234.21
2.18.235.40
205.185.208.52
205.234.175.175
23.43.115.95
2600:9000:20bb:1400:6:44e3:f8c0:93a1
2606:4700::6811:4032
2606:4700::6811:4132
2606:4700::6811:dd0f
2606:4700::6813:da83
2606:4700::6813:f87e
2a00:1450:4001:808::2002
2a00:1450:4001:814::200e
2a00:1450:4001:817::2004
2a00:1450:4001:819::200a
2a00:1450:4001:81a::2001
2a00:1450:4001:81b::2002
2a00:1450:4001:81b::2006
2a00:1450:4001:81e::2003
2a00:1450:4001:81f::2008
2a00:1450:4001:820::2002
2a00:1450:4001:820::200e
2a00:1450:400c:c06::9c
2a00:1450:4013:c01::8a
2a02:26f0:6c00:28c::25ea
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
3.92.219.53
3.93.90.146
34.209.133.92
34.215.123.63
34.226.174.86
34.235.240.97
34.236.116.189
34.249.86.253
34.95.92.78
35.160.176.109
35.186.226.184
35.190.40.172
35.190.59.101
35.190.92.63
35.201.67.47
35.227.248.159
37.252.173.22
40.89.141.103
46.228.164.13
50.31.169.131
52.17.231.199
52.2.117.76
52.206.32.35
52.239.137.4
52.3.171.116
52.30.183.205
52.33.26.96
52.4.39.251
52.41.173.154
52.7.45.119
52.89.80.23
52.94.218.7
54.165.0.24
54.209.166.125
63.140.41.50
64.74.236.51
66.117.28.86
70.42.32.51
91.228.74.198
99.86.1.198
99.86.3.46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