Submitted URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Effective URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_...
Submission: On February 13 via api from SG — Scanned from DE

Summary

This website contacted 43 IPs in 6 countries across 33 domains to perform 310 HTTP transactions. The main IP is 50.56.167.254, located in United States and belongs to RMH-14, US. The main domain is www.bankinfosecurity.com. The Cisco Umbrella rank of the primary domain is 545220.
TLS certificate: Issued by Go Daddy Secure Certificate Authority... on May 28th 2021. Valid for: a year.
This is the only time www.bankinfosecurity.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 199.15.215.8 15224 (OMNITURE)
34 50.56.167.254 33070 (RMH-14)
1 2a00:1450:400... 15169 (GOOGLE)
4 184.30.24.121 16625 (AKAMAI-AS)
3 18.195.42.228 16509 (AMAZON-02)
77 2.18.233.88 16625 (AKAMAI-AS)
39 2606:2800:234... 15133 (EDGECAST)
1 104.130.251.6 33070 (RMH-14)
8 2a00:1450:400... 15169 (GOOGLE)
2 104.111.234.67 16625 (AKAMAI-AS)
3 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2.18.235.40 16625 (AKAMAI-AS)
2 199.232.196.134 54113 (FASTLY)
5 2a00:1450:400... 15169 (GOOGLE)
2 52.208.138.90 16509 (AMAZON-02)
2 2a03:5f80:a::... 50952 (DATAIX-AS...)
8 104.111.233.140 16625 (AKAMAI-AS)
1 13.224.98.204 16509 (AMAZON-02)
13 2606:2800:134... 15133 (EDGECAST)
14 2600:9000:219... 16509 (AMAZON-02)
5 151.101.64.134 54113 (FASTLY)
15 142.250.184.226 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 37.252.172.36 29990 (ASN-APPNEX)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 142.250.186.162 15169 (GOOGLE)
1 52.72.150.209 14618 (AMAZON-AES)
6 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 192.28.147.68 15224 (OMNITURE)
7 104.244.42.72 13414 (TWITTER)
3 3 2620:1ec:21::14 8068 (MICROSOFT...)
1 108.174.10.14 14413 (LINKEDIN)
21 2a00:1450:400... 15169 (GOOGLE)
2 199.232.198.49 54113 (FASTLY)
7 2a00:1450:400... 15169 (GOOGLE)
1 178.79.242.16 22822 (LLNW)
1 1 66.155.71.25 13768 (COGECO-PEER1)
3 66.155.71.149 ()
3 104.244.43.131 ()
310 43
77    2.18.233.88 (Frankfurt am Main, Germany)
ASN16625 (AKAMAI-AS, US)
PTR: a2-18-233-88.deploy.static.akamaitechnologies.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
Apex Domain
Subdomains
Transfer
77 rackcdn.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 271711
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 401592
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 551240
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 314545
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 497972
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 388322
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 659413
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 671380
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 326302
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com — Cisco Umbrella Rank: 901147
9 MB
46 twitter.com
platform.twitter.com — Cisco Umbrella Rank: 591
syndication.twitter.com — Cisco Umbrella Rank: 840
1 MB
34 bankinfosecurity.com
www.bankinfosecurity.com — Cisco Umbrella Rank: 545220
465 KB
29 googlesyndication.com
6834b78e8a2b9d8c124bd62b8aeb9bd1.safeframe.googlesyndication.com
tpc.googlesyndication.com — Cisco Umbrella Rank: 120
pagead2.googlesyndication.com — Cisco Umbrella Rank: 92
466 KB
18 doubleclick.net
securepubads.g.doubleclick.net — Cisco Umbrella Rank: 159
stats.g.doubleclick.net — Cisco Umbrella Rank: 67
googleads.g.doubleclick.net — Cisco Umbrella Rank: 37
154 KB
16 disquscdn.com
c.disquscdn.com — Cisco Umbrella Rank: 3930
a.disquscdn.com — Cisco Umbrella Rank: 7559
527 KB
16 twimg.com
pbs.twimg.com — Cisco Umbrella Rank: 688
cdn.syndication.twimg.com
abs-0.twimg.com
31 KB
8 6sc.co
j.6sc.co — Cisco Umbrella Rank: 7147
c.6sc.co — Cisco Umbrella Rank: 10540
b.6sc.co — Cisco Umbrella Rank: 5621
14 KB
7 google.com
www.google.com — Cisco Umbrella Rank: 2
adservice.google.com — Cisco Umbrella Rank: 59
2 KB
7 disqus.com
bankinfosecurity.disqus.com — Cisco Umbrella Rank: 941251
disqus.com — Cisco Umbrella Rank: 2621
referrer.disqus.com — Cisco Umbrella Rank: 5922
63 KB
7 googletagservices.com
www.googletagservices.com — Cisco Umbrella Rank: 146
253 KB
5 google-analytics.com
www.google-analytics.com — Cisco Umbrella Rank: 31
20 KB
4 linkedin.com
px.ads.linkedin.com — Cisco Umbrella Rank: 439
www.linkedin.com — Cisco Umbrella Rank: 602
px4.ads.linkedin.com — Cisco Umbrella Rank: 5087
4 KB
3 sitescout.com
pixel.sitescout.com
458 B
3 google.de
www.google.de — Cisco Umbrella Rank: 6342
adservice.google.de — Cisco Umbrella Rank: 9027
1 KB
3 ml314.com
ml314.com — Cisco Umbrella Rank: 1357
in.ml314.com — Cisco Umbrella Rank: 7281
13 KB
3 googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 50
153 KB
3 ensighten.com
nexus.ensighten.com — Cisco Umbrella Rank: 2554
10 KB
3 addthis.com
s7.addthis.com — Cisco Umbrella Rank: 1324
m.addthis.com — Cisco Umbrella Rank: 1287
140 KB
2 basis.net
cdn01.basis.net — Cisco Umbrella Rank: 6041
pixel-a.basis.net — Cisco Umbrella Rank: 15273
1 KB
2 mktoresp.com
051-zxi-237.mktoresp.com — Cisco Umbrella Rank: 798133
622 B
2 crazyegg.com
script.crazyegg.com — Cisco Umbrella Rank: 1701
3 KB
2 gstatic.com
fonts.gstatic.com
91 KB
2 marketo.net
munchkin.marketo.net — Cisco Umbrella Rank: 2821
6 KB
2 ismgcorp.com
links.ismgcorp.com — Cisco Umbrella Rank: 192558
worker.ismgcorp.com — Cisco Umbrella Rank: 748276
1 KB
1 googleadservices.com
www.googleadservices.com — Cisco Umbrella Rank: 99
15 KB
1 adnxs.com
secure.adnxs.com — Cisco Umbrella Rank: 350
696 B
1 addthisedge.com
v1.addthisedge.com — Cisco Umbrella Rank: 1518
325 B
1 cloudfront.net
dnn506yrbagrg.cloudfront.net
821 B
1 licdn.com
snap.licdn.com — Cisco Umbrella Rank: 830
2 KB
1 bizographics.com
sjs.bizographics.com — Cisco Umbrella Rank: 19512
2 KB
1 moatads.com
z.moatads.com — Cisco Umbrella Rank: 330
1 KB
1 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 35
2 KB
310 33
Domain Requested by
39 platform.twitter.com www.bankinfosecurity.com
platform.twitter.com
34 www.bankinfosecurity.com links.ismgcorp.com
www.bankinfosecurity.com
21 tpc.googlesyndication.com securepubads.g.doubleclick.net
tpc.googlesyndication.com
19 130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com www.bankinfosecurity.com
15 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
links.ismgcorp.com
15 dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com www.bankinfosecurity.com
14 c.disquscdn.com bankinfosecurity.disqus.com
disqus.com
c.disquscdn.com
10 pbs.twimg.com www.bankinfosecurity.com
platform.twitter.com
10 75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com www.bankinfosecurity.com
10 0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com www.bankinfosecurity.com
7 pagead2.googlesyndication.com securepubads.g.doubleclick.net
tpc.googlesyndication.com
www.googletagservices.com
7 syndication.twitter.com platform.twitter.com
7 www.googletagservices.com www.bankinfosecurity.com
securepubads.g.doubleclick.net
6 www.google.com www.bankinfosecurity.com
securepubads.g.doubleclick.net
tpc.googlesyndication.com
6 b.6sc.co www.bankinfosecurity.com
6 6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com www.bankinfosecurity.com
5 disqus.com bankinfosecurity.disqus.com
c.disquscdn.com
5 www.google-analytics.com www.bankinfosecurity.com
www.google-analytics.com
www.googletagmanager.com
4 21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com www.bankinfosecurity.com
4 4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com www.bankinfosecurity.com
3 abs-0.twimg.com platform.twitter.com
3 pixel.sitescout.com www.bankinfosecurity.com
3 cdn.syndication.twimg.com platform.twitter.com
3 www.googletagmanager.com www.bankinfosecurity.com
www.googletagmanager.com
3 752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com www.bankinfosecurity.com
3 nexus.ensighten.com www.bankinfosecurity.com
nexus.ensighten.com
2 a.disquscdn.com www.bankinfosecurity.com
c.disquscdn.com
2 px.ads.linkedin.com 2 redirects
2 051-zxi-237.mktoresp.com munchkin.marketo.net
2 www.google.de www.bankinfosecurity.com
2 script.crazyegg.com dnn506yrbagrg.cloudfront.net
script.crazyegg.com
2 stats.g.doubleclick.net www.google-analytics.com
2 ml314.com www.bankinfosecurity.com
ml314.com
2 fonts.gstatic.com fonts.googleapis.com
2 munchkin.marketo.net www.bankinfosecurity.com
munchkin.marketo.net
2 f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com www.bankinfosecurity.com
2 s7.addthis.com www.bankinfosecurity.com
s7.addthis.com
1 pixel-a.basis.net 1 redirects
1 cdn01.basis.net www.googletagmanager.com
1 referrer.disqus.com www.bankinfosecurity.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 px4.ads.linkedin.com www.bankinfosecurity.com
1 www.linkedin.com 1 redirects
1 6834b78e8a2b9d8c124bd62b8aeb9bd1.safeframe.googlesyndication.com securepubads.g.doubleclick.net
1 adservice.google.com securepubads.g.doubleclick.net
1 adservice.google.de securepubads.g.doubleclick.net
1 in.ml314.com ml314.com
1 www.googleadservices.com www.googletagmanager.com
1 c.6sc.co j.6sc.co
1 secure.adnxs.com j.6sc.co
1 m.addthis.com s7.addthis.com
1 v1.addthisedge.com s7.addthis.com
1 dnn506yrbagrg.cloudfront.net www.bankinfosecurity.com
1 j.6sc.co www.bankinfosecurity.com
1 snap.licdn.com www.bankinfosecurity.com
1 sjs.bizographics.com www.bankinfosecurity.com
1 bankinfosecurity.disqus.com www.bankinfosecurity.com
1 z.moatads.com s7.addthis.com
1 worker.ismgcorp.com www.bankinfosecurity.com
1 fonts.googleapis.com www.bankinfosecurity.com
1 links.ismgcorp.com
310 62
Subject Issuer Validity Valid
ismg.io
Go Daddy Secure Certificate Authority - G2
2021-05-28 -
2022-06-29
a year crt.sh
upload.video.google.com
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
odc-addthis-prod-01.oracle.com
DigiCert SHA2 Secure Server CA
2021-04-25 -
2022-04-27
a year crt.sh
nexus.ensighten.com
DigiCert TLS RSA SHA256 2020 CA1
2021-09-14 -
2022-10-12
a year crt.sh
*.ssl.cf1.rackcdn.com
DigiCert SHA2 Secure Server CA
2021-06-29 -
2022-07-07
a year crt.sh
*.twimg.com
DigiCert TLS RSA SHA256 2020 CA1
2021-10-20 -
2022-10-19
a year crt.sh
worker.ismgcorp.com
Go Daddy Secure Certificate Authority - G2
2021-02-12 -
2022-03-16
a year crt.sh
*.g.doubleclick.net
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
*.marketo.net
DigiCert SHA2 Secure Server CA
2021-03-29 -
2022-04-06
a year crt.sh
*.google-analytics.com
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2021-11-27 -
2022-11-29
a year crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2020-04-20 -
2022-05-09
2 years crt.sh
*.ml314.com
Amazon
2021-12-17 -
2023-01-14
a year crt.sh
js.bizographics.com
DigiCert SHA2 Secure Server CA
2021-09-28 -
2022-09-28
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2021-07-15 -
2022-07-20
a year crt.sh
*.6sc.co
DigiCert SHA2 Secure Server CA
2021-03-09 -
2022-03-16
a year crt.sh
*.cloudfront.net
Amazon
2021-03-19 -
2022-03-17
a year crt.sh
a.disquscdn.com
Amazon
2021-10-31 -
2022-11-28
a year crt.sh
*.adnxs.com
GeoTrust ECC CA 2018
2021-03-05 -
2022-02-19
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-05-09 -
2022-05-08
a year crt.sh
www.googleadservices.com
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
www.google.com
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
www.google.de
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
*.google.de
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
*.google.com
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
*.mktoresp.com
DigiCert TLS RSA SHA256 2020 CA1
2021-11-30 -
2022-11-30
a year crt.sh
syndication.twitter.com
DigiCert TLS RSA SHA256 2020 CA1
2022-01-06 -
2023-01-05
a year crt.sh
tpc.googlesyndication.com
GTS CA 1C3
2022-01-17 -
2022-04-11
3 months crt.sh
*.disquscdn.com
GlobalSign Atlas R3 DV TLS CA H2 2021
2022-01-03 -
2023-02-04
a year crt.sh
cdn01.basis.net
GeoTrust TLS DV RSA Mixed SHA256 2020 CA-1
2021-06-14 -
2022-06-14
a year crt.sh
*.sitescout.com
GeoTrust TLS DV RSA Mixed SHA256 2020 CA-1
2021-12-15 -
2023-01-15
a year crt.sh

This page contains 20 frames:

Primary Page: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Frame ID: CF637D2EF04B1E203E488090B0A95453
Requests: 185 HTTP requests in this frame

Frame: https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Frame ID: 797E914ABDCAAE0F7D3C98BF9A20CC84
Requests: 1 HTTP requests in this frame

Frame: https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Frame ID: 5A89DFEC5280F236126362B6436DFB99
Requests: 1 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
Frame ID: 7B1C7565C218C46CB24E221D3928146E
Requests: 17 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.4e067713e19d4fff483536ddc4df18b9.html?origin=https%3A%2F%2Fwww.bankinfosecurity.com
Frame ID: B02D85CD4AF9FC59B1FC597459F26F62
Requests: 2 HTTP requests in this frame

Frame: https://6834b78e8a2b9d8c124bd62b8aeb9bd1.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Frame ID: C4B8669D18E3A59E68F85A18AB07B950
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstKYdMff8HIiZVf9U0eDw8FIzu63fsu4ZNW6wRs31a3fn4XnWUUpg-_pXESza4NcBZRLkWzyOIzftGqH8EwXR-VHuL-4nN0hIQgX-Z3owfBaklZLjsdUC-vn7TizE6BFuhElrQniM3Rjb-yGC1epjOKJdSFIdP-44K1tEJIgkN7gJqbo6RiTCKpAd9Aj5Xq3WQuGk6Gf4nuv_7lVWu0riS4iy3BerrHUMjYmJnC1ZDkmDxt3nRuJ-HGu9zkxcmGRTPE1Sl-EMOo78rz1oN6trTHeO6dd8onEd9ikZnMibrKrrOTyC8o33oo2sGnIiCljWle9A&sai=AMfl-YR8GFdJ2nsFMNgSjfGmD1xpXLIGDAbq-76dqIs0rKvzoEMFFjcGpJybQM6vD48YsLkBgKKWeb2K7NzXQCXFiPiwCKQumRU3d10FpOlLlWJrAU5GBCWxruHlmPIk9oCs&sig=Cg0ArKJSzKZtZ6UclDkjEAE&uach_m=[UACH]&adurl=
Frame ID: BB82E090B6EE9FE9599CB5280C2E7BCF
Requests: 8 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuWTtIilj9sbkG5SLWBxuncCFak02aGwRTc2bXaVhCQ8MPJixjJA6nnGEeEE7lJEwKV1rxGWA71hdUjRyWUOjLC9VWJIz3bSCdDeIi3llrcgw6H-pcQ4opT_gdIqnaeyj4KlAb4p6bmJoNdlO4M_dHtWv8ypNvdtUVzXJTh46fA7bE8XaRUJ3uvOfKCWRaNu2_74JRdgkUnSr1NrW38F3NFEv2lCju2RC4z1WU5QI2Wi247utv4r1F7rxJjo7r5kF7wbce6_G1XCjqbCMDLWYIk4XdbNh6eRqN2rkUVOloS3kx4rVamOtnQKkcc5DacAXaLWHcy4M8&sai=AMfl-YRJ5ytgvmjafukDE7KQygqBc9_5SFhcsB8GjWM5mr_uVUyVtV63ZMeCiyV7GiZGGD9OC0NJnq2ALAr9_J9tQNB0cLwj5rgkmBD7_7tAY-N46nBIfKTb1k8uUGvcQ3Pe&sig=Cg0ArKJSzEfFWc4xcyguEAE&uach_m=[UACH]&adurl=
Frame ID: 65EAEA4551BF0192272DE791EBD32255
Requests: 9 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv0hhH64Y3HHicnK0xx7eY3SjEJ4uIvQJ-cdCxxeXv2f0lmjmBnK94Mm-VZ--lagyz_McgG59kc7B_hCzFJGzwB-IGRiU4z9znlhNQ2hpHmVUORFtWrCKBRr13ptKU_A9d4EV0AM4IB9kfmj7Co1xLkgVC64BTNhwZxIEZ8-yrhhDRiQodnLNum1m2Qmje17yoC7uTzmqldqtC9k1MoZP6VgbqUFfqCnPhB7hFzqvxyt74QioHlgec3-CvTbk6WILGOrPpG3gigr8f0Gy63uQFkLajSPNaBFnVeuEg3tHCs6amL08aIMKIzVAKYimZlHCcGQ8PzuaMlRg&sai=AMfl-YR9xtUFFCBk01lbccjQ17PpCsMMQdFB5OFFPdfbOtJpYvc3bfarHFznjRhsH_xQpnzVrbCzo5r10fVyBnlnkHsr5Pdw7qpGioT99uFEkyu68EEf2yPuzmcbYy5sPWS7&sig=Cg0ArKJSzD4Ia3ZhJL3GEAE&uach_m=[UACH]&adurl=
Frame ID: 53D025755C74CF66BE5AA04EE0E143FA
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuCf23f7PSOPf3ewoLQJ6tUPkEt6hB3dHPMmjKzh9dZKgQjM0cX-0nPzTUmHRNA_ElPWpXdnYWT6v7F3mmHWn2IUckyZB3q6f8S5Hly7d0aPQFOcMtllye89igR7RwUs6M-hfvdQk_iRnbQ9RKJ7i7m4vg_npMgKyK0pAK29jfmHFrKRWu1fdRMWeXtM7kG2AtK0bis_OTnITch5A2AD56p9--Ps309KaWq0Z5grEIpEB1Ee4boIWQ1x6_Ei81ImqK1Rf1mb5qXdrNRJ61NE97fvgc6N4DucxqUBCZjpCBH5da3305N2ADJRKsF0FOkbyoJzpjCbsk&sai=AMfl-YTkksCIQqHj5pt2motj2I4NLAuBCSianQsiX2FCDLcU7veasWFX9ao_qhm7Ck5uRTnrbAncQs6V1vlxyOzqZYus6S2rnNFKfXBhwdZPMYqzxwZaf2m1eNAtCL7_qa2y&sig=Cg0ArKJSzDyGVUsE4WXBEAE&uach_m=[UACH]&adurl=
Frame ID: 0D36C58E4670E761ED61AC9F10FA0B7F
Requests: 8 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstBuRSeq4zps1M2ifzkKRDqZjz_v_nwWHJ5GIars-6LIt8swo8foJeNZicjyu9Pzr82QLlnMyrP6aV8DGEYxlU--1IGVXYzq6vtDOzHqYBMyDcns2FFPgDYSeqLb_3FIg_ZKD1PRp7KfpStr6QrHSgueVfAZ1aFC8SEph4tYuxe707v_aTn86VuAFdkaRK31dlYv_WcNMBukFXcEbNdGtx-TpkFUMhgi4l0ajgVaCwl4eW88QfSWjQ03nv6TQ45cskFLpkXcK-0Q7iq7Yyy6qrMy3dSKffQleEzhBme4Uql10byj1eXQysG4mvqoNqPGrjh42pnCQ&sai=AMfl-YRPmtCpGJg0BFPWcdh3lDeglIYsB7kmlR08zJoXLZevK4ZQEE7gL-Zpr08029qI4cRwCwLkDmV1NAlGR7evpnG7qXPh65XZLIyZgqHG_2XfqskXwPbpEi1tXKRdn57T&sig=Cg0ArKJSzGc1VJAqOMnoEAE&uach_m=[UACH]&adurl=
Frame ID: 68BD5DCDFA97A720D3B0FE5556DDFF97
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssGGiwZjFCobVj8OePhJA58LIsA0JbSkxfitvTPbHSCGYgk_eTkr9Kwe2b93OkXQGP8XalzLKB0Wc-JhXl_nIzYWs2r2L57fmigpsjWl5-idh2-I0BDlQIYgoaxSSW6wAeyIrIYTgdJMub_3ySIMVczn1sSo-6GvjHt0FUZ2FwBNIMJmYlO2_MmcUKwyRnvBRMgh1RQcHBchNP8uklJQp6Pq9J4P5EQA1wBLZLVDU-KgOHX1FuDtrWI6dBWiHrJu5dX2kwfteRoJsSA6do2nXBUrXOlbVCbltQFubDBtEPIS1VsStscWcij0wdy7QX3OcOQsiHQ&sai=AMfl-YQzG8bk0SSYXUgEnGtomjA5lF82PfNz_yXQlf1cJ-Zbp0FaTqzkvLuiuKbRJjruRwuulBmdsZaUrzJ5oPUu6X1OMwn58O78I59kqw8NQuDheyxusl81BlaVmykuja2-&sig=Cg0ArKJSzA2o8bPqsHhbEAE&uach_m=[UACH]&adurl=
Frame ID: 1F3C910C2D85832E951CD71B718121E8
Requests: 9 HTTP requests in this frame

Frame: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Frame ID: 9663A0CA6BE46CC786F65CBFDDB0D6FF
Requests: 18 HTTP requests in this frame

Frame: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Frame ID: BB68948EC178AD105AC4759F4A3DE19E
Requests: 17 HTTP requests in this frame

Frame: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Frame ID: 98AA2566636FF83A1A7686FFB01ECF91
Requests: 18 HTTP requests in this frame

Frame: https://c.disquscdn.com/next/embed/styles/realtime.b23ff3c36dd0169627f8e54ca1621eca.css
Frame ID: 896068B5368E916B36D45A72E8CD4993
Requests: 1 HTTP requests in this frame

Frame: https://c.disquscdn.com/next/embed/styles/realtime.b23ff3c36dd0169627f8e54ca1621eca.css
Frame ID: D598F0A4C2777F9F31EE999442B6B275
Requests: 1 HTTP requests in this frame

Frame: https://pixel.sitescout.com/dmp/asyncPixelSync
Frame ID: 0D90E045F5C59319D0F8FD986C52DE34
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Frame ID: BA56E649585EED3A6CD92597031C0D7D
Requests: 3 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/aframe
Frame ID: 3CCF95B5B615E1A798D0ECFE24964716
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

$4.4 Million Stolen From Crypto Firm: Multi-Bridge Exploited

Page URL History Show full URLs

  1. http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2... Page URL
  2. https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • /tiny_?mce(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • addthis\.com/js/

Overall confidence: 100%
Detected patterns
  • adnxs\.(?:net|com)

Overall confidence: 100%
Detected patterns
  • script\.crazyegg\.com/pages/scripts/\d+/\d+\.js

Overall confidence: 100%
Detected patterns
  • googletagservices\.com/tag/js/gpt(?:_mobile)?\.js

Overall confidence: 100%
Detected patterns
  • //nexus\.ensighten\.com/

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
  • <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Overall confidence: 100%
Detected patterns
  • googlesyndication\.com/

Overall confidence: 100%
Detected patterns
  • google-analytics\.com/(?:ga|urchin|analytics)\.js

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com

Overall confidence: 100%
Detected patterns
  • googletagmanager\.com/gtm\.js
  • googletagmanager\.com/gtag/js

Overall confidence: 100%
Detected patterns
  • snap\.licdn\.com/li\.lms-analytics/insight\.min\.js

Overall confidence: 100%
Detected patterns
  • munchkin\.marketo\.\w+/(?:([\d.]+)/)?munchkin\.js

Overall confidence: 100%
Detected patterns
  • moatads\.com

Overall confidence: 100%
Detected patterns
  • ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js

Overall confidence: 100%
Detected patterns
  • //platform\.twitter\.com/widgets\.js

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • jquery-ui.*\.js

Overall confidence: 100%
Detected patterns
  • (?:<link [^>]*href="[^"]*prettyPhoto(?:\.min)?\.css|<a [^>]*rel="prettyPhoto)
  • jquery\.prettyPhoto\.js

Page Statistics

310
Requests

98 %
HTTPS

43 %
IPv6

33
Domains

62
Subdomains

43
IPs

6
Countries

12801 kB
Transfer

22884 kB
Size

29
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc= Page URL
  2. https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 171
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1644763066283&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%252C2330930%26time%3D1644763066283%26url%3Dhttps%253A%252F%252Fwww.bankinfosecurity.com%252F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%253Frf%253D2022-02-12__ACQ_DBT__Slot5_ART18467%2526mkt_tok%253DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1644763066283&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&liSync=true HTTP 302
  • https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1644763066283&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&liSync=true&e_ipv6=AQKId3mKN6ye_AAAAX7zhLHKwJb2BtAAn9FD77oxjLNvRZq7-CzGwCOUJqmDDkIGIWz29VG3xg22QuB2h1UUe558whq11w
Request Chain 284
  • https://pixel-a.basis.net/iap/64ead273d1f41aa7 HTTP 301
  • https://pixel.sitescout.com/iap/64ead273d1f41aa7

310 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
links.ismgcorp.com/
584 B
899 B
Document
General
Full URL
http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Protocol
HTTP/1.1
Server
199.15.215.8 , United States, ASN15224 (OMNITURE, US),
Reverse DNS
Software
Apache /
Resource Hash
50b77b06536218be01497371316cba1f4d0cad897a1a7cfb68bbc3a16281f8f4
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Sun, 13 Feb 2022 14:37:43 GMT
Server
Apache
Cache-Control
private, no-cache, no-store, max-age=0
Connection
close
X-Content-Type-Options
nosniff
Vary
Accept-Encoding
Content-Encoding
gzip
Transfer-Encoding
chunked
Content-Type
text/html
Primary Request 44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467
www.bankinfosecurity.com/
382 KB
55 KB
Document
General
Full URL
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Requested by
Host: links.ismgcorp.com
URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
f4f302ca9ce579ce72cdfa05258b83c962a8820efb43c83f9b963adbedb1cda8
Security Headers
Name Value
Strict-Transport-Security max-age=63072000

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
http://links.ismgcorp.com/

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Strict-Transport-Security
max-age=63072000
Content-Encoding
gzip
Vary
Accept-Encoding
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
jquery-ui.min.css
www.bankinfosecurity.com/css-responsive/vendor/
25 KB
5 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/jquery-ui.min.css?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
fc54c09a7a71615ec35a22ed20afa4034588986ed88c3fc184b2c0bc637c33fb
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4896
mediaelementplayer-updated.css
www.bankinfosecurity.com/css-responsive/vendor/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/mediaelementplayer-updated.css?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
1a0bbdba57f90a60fef89419fc940d8eae55c5b0d12ecbadde2beaef32ab2d90
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
2622
css
fonts.googleapis.com/
26 KB
2 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:831::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
035f76cad89b4436226962589da4573cdba89378ed3ef64029e73035d4e122c5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Sun, 13 Feb 2022 13:24:54 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
date
Sun, 13 Feb 2022 14:37:44 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sun, 13 Feb 2022 14:37:44 GMT
main.css
www.bankinfosecurity.com/css-responsive/
231 KB
42 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/main.css?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ba45c4b9710b1386b82a4354f829ee2f201e70742a2e646ffbedfa889e43d41f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
43006
prettyPhoto.css
www.bankinfosecurity.com/css-responsive/
21 KB
3 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/prettyPhoto.css?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
7d0bada0d9b66aa1ca8eb906bb9736ca96e3859e9c05287a8f0cf5ffa9ff8760
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2840
bis-hdr.desktop.r2.css
www.bankinfosecurity.com/css-responsive/vendor/
8 KB
2 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/bis-hdr.desktop.r2.css?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
eefc2533a82b69fab9b19b9e316bb606e70d17d61b57f9ea841b26c59624bc20
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1956
bis-hdr.mobile.r2.css
www.bankinfosecurity.com/css-responsive/vendor/
9 KB
2 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/bis-hdr.mobile.r2.css?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
77c36fad51d04a56e55d1d454094c4312c3b11443f42b456c3f5082d66696be1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2133
font-awesome.min.css
www.bankinfosecurity.com/css-responsive/vendor/
22 KB
5 KB
Stylesheet
General
Full URL
https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
93f466f6b1a81c848140e51c839a5372034ab22182601e86dd86947ad3a7fe94
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
text/css
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
5049
jquery.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
91 KB
33 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
eccabf5cc7613433c3ddc71ff34391ae850d304d3aceb5666868c4947134f3b5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
33094
modernizr.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
0
0
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/modernizr.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=63072000

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=63072000
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Expires
Thu, 19 Nov 1981 08:52:00 GMT
bootstrap.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
35 KB
9 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/bootstrap.min.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
3fede2d0c0a8c93b0c5d0ab0c38289a5743bb88720255b8298c520d2e3d90939
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
9328
jquery.validate.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
21 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.validate.min.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
e51831d751ef667b1f703a47bb05802b681e6a30816f5cce0d56c3552a4eaa31
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
6689
mediaelement-and-player-updated.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
154 KB
38 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/mediaelement-and-player-updated.min.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4e7304371ef9bcaea396e8928a9647f8306c296b9195c8763848d70c7f6f1390
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:44 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
38476
tinymce.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
295 KB
101 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/tinymce.min.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
247d04c4d14c60a79c16245a74a792a662f9e7adf784d68edd4520a35ec90251
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
jquery.validate.bootstrap.popover.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.validate.bootstrap.popover.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
04d304d7ee49ac157f146382a46f02a666279bd7f29074f50e863b88f2affae9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
926
jquery.placeholder.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.placeholder.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
256a489beea4a14eca458f6e5436758f1fcb8dd34034d3c36dd21b22a5841f3b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
922
jquery-ui.min.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
222 KB
60 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery-ui.min.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
78cf63898c91ce3b95e37bc53e07adba5c2ee705ff28c2dd1dd784173c264ad1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
61345
crypt_des.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
9 KB
3 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/crypt_des.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
aed1d71b7280c09f06dc1f8e87795f9d89f7a1a8ab1af32ff8c92037ddeed6ee
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
2857
addthis_widget.js
s7.addthis.com/js/250/
353 KB
114 KB
Script
General
Full URL
https://s7.addthis.com/js/250/addthis_widget.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
184.30.24.121 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-24-121.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
acd2f7ad78edeebad4b6b0fdd17ff57d81c3726c60fd5435ee8c5a0115d29403
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
last-modified
Mon, 26 Oct 2020 18:11:48 GMT
server
nginx/1.15.8
etag
W/"5f971164-5834c"
vary
Accept-Encoding
x-distribution
99
content-type
application/javascript
cache-control
public, max-age=600
date
Sun, 13 Feb 2022 14:37:45 GMT
x-host
s7.addthis.com
content-length
116325
Bootstrap.js
nexus.ensighten.com/choozle/12567/
28 KB
9 KB
Script
General
Full URL
https://nexus.ensighten.com/choozle/12567/Bootstrap.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
18.195.42.228 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-195-42-228.eu-central-1.compute.amazonaws.com
Software
nginx /
Resource Hash
feb6a4829cc0a55f2fed1d3aaceb83b52e6823f15c649c5ef1c14a7e86e4988b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:44 GMT
content-encoding
gzip
last-modified
Mon, 01 Mar 2021 15:40:46 GMT
server
nginx
etag
W/"603d0afe-7076"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
cache-control
max-age=300
headerlogo-bis.png
www.bankinfosecurity.com/images-responsive/logos/
2 KB
2 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logos/headerlogo-bis.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ea3325c2094d82033ce9583d4180194fb82729dfae65b62925831a88a6838d7c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
1682
data-breach-exposes-booking-details-19-million-customers-showcase_image-10-a-18505.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
33 KB
34 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/data-breach-exposes-booking-details-19-million-customers-showcase_image-10-a-18505.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b74ae7d9731bb953f2085475ea4f71ef4c859278a768a65e24088845c323d593

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Sat, 12 Feb 2022 13:28:05 GMT
X-Trans-Id
tx74e8da96bb5445c9b1554-006207cff5dfw1
ETag
fa1ad813abeb6694b80310be0dfb04b1
Content-Type
image/jpeg
X-Timestamp
1644672484.63019
Cache-Control
public, max-age=80381
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
34067
Expires
Mon, 14 Feb 2022 12:57:26 GMT
senators-cia-surveillance-program-involved-citizens-data-showcase_image-2-a-18504.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
174 KB
174 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/senators-cia-surveillance-program-involved-citizens-data-showcase_image-2-a-18504.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5ffb480c77fe129dcb2225dda5d39d559d0393bc9210ead707597fe8ed11e9b9

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 11 Feb 2022 20:16:24 GMT
X-Trans-Id
tx777359b35b5a4ece86f04-006206d5e1dfw1
ETag
4255ef7f917200a797e3b174f6e437e3
Content-Type
image/jpeg
X-Timestamp
1644610583.40191
Cache-Control
public, max-age=16368
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
177804
Expires
Sun, 13 Feb 2022 19:10:33 GMT
spanish-police-arrest-8-over-sim-swapping-fraud-showcase_image-4-a-18498.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
217 KB
217 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/spanish-police-arrest-8-over-sim-swapping-fraud-showcase_image-4-a-18498.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ac4bce8af4804260106a6df619f9d35d0ab9efc65f9065afb64b4628d9e338e1

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 11 Feb 2022 17:39:27 GMT
X-Trans-Id
tx11c5a3286a0447d4a4288-006206baacdfw1
ETag
49d313765da3ff403cba62fe7ce10aca
Content-Type
image/jpeg
X-Timestamp
1644601166.12766
Cache-Control
public, max-age=9497
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
221975
Expires
Sun, 13 Feb 2022 17:16:02 GMT
ismg-editors-has-ransomware-group-blackmatter-rebooted-showcase_image-9-a-18500.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
139 KB
139 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ismg-editors-has-ransomware-group-blackmatter-rebooted-showcase_image-9-a-18500.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9008f05a9b6d6e5f62a68e8751ad63a80ec3a5ea25073a6c7080746d1f0faeca

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 11 Feb 2022 15:31:33 GMT
X-Trans-Id
tx50223603b29e48a395cb6-006206a245dfw1
ETag
e19a6fe02b8ef87f9e5efe828bdeff39
Content-Type
image/jpeg
X-Timestamp
1644593492.97039
Cache-Control
public, max-age=82133
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
142106
Expires
Mon, 14 Feb 2022 13:26:38 GMT
improving-market-higher-security-showcase_image-8-i-5022.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
35 KB
36 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/improving-market-higher-security-showcase_image-8-i-5022.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
818649e5e32fb63a4182cb639191800d9fc9da1bc16da89d710e595a542df19f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 15:19:22 GMT
X-Trans-Id
tx7513780b60d94ccca2473-0062058834dfw1
ETag
8b42f1bde106b32657a8fd5e798a0a53
Content-Type
image/jpeg
X-Timestamp
1644506361.85677
Cache-Control
public, max-age=10004
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
36060
Expires
Sun, 13 Feb 2022 17:24:29 GMT
biggest-cryptocurrency-seizure-in-us-history-showcase_image-5-i-5024.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
99 KB
99 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/biggest-cryptocurrency-seizure-in-us-history-showcase_image-5-i-5024.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eda827405badf341e8357e42bf649e1cc40f7d5cf393be9870be1424961589d8

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 21:45:56 GMT
X-Trans-Id
txc89c673006b94f76a9c86-0062058d4cdfw1
ETag
569857d83c010f089451ce43e1f5d61c
Content-Type
image/jpeg
X-Timestamp
1644529555.94501
Cache-Control
public, max-age=13513
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
101056
Expires
Sun, 13 Feb 2022 18:22:58 GMT
russian-cyber-operations-target-ukraine-what-happens-next-showcase_image-1-i-5020.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
115 KB
115 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/russian-cyber-operations-target-ukraine-what-happens-next-showcase_image-1-i-5020.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5cadf876ce2dff4a93791251964a09ebb6f54af16666dbece38603c0753579fa

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 03 Feb 2022 21:20:31 GMT
X-Trans-Id
tx9f2bb68436434422b3158-0061fce25fdfw1
ETag
d25121377f2e3d64d179917665428921
Content-Type
image/jpeg
X-Timestamp
1643923230.40072
Cache-Control
public, max-age=80653
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
117325
Expires
Mon, 14 Feb 2022 13:01:58 GMT
challenges-in-world-cybersecurity-marketing-showcase_image-8-i-5018.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
126 KB
127 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/challenges-in-world-cybersecurity-marketing-showcase_image-8-i-5018.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7902a7b1a63f970b0a9256d775b01a6acaa7cf3d5371cfa883e10bf08ac91a60

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 31 Jan 2022 20:00:41 GMT
X-Trans-Id
tx5fd8634abe794bfcba048-0061f8f5a2dfw1
ETag
3ccb486ced5759dd46f48999b5117a61
Content-Type
image/jpeg
X-Timestamp
1643659240.77238
Cache-Control
public, max-age=52459
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
129400
Expires
Mon, 14 Feb 2022 05:12:04 GMT
decryption-keys-released-for-3-defunct-ransomware-strains-showcase_image-3-p-3183.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
74 KB
74 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/decryption-keys-released-for-3-defunct-ransomware-strains-showcase_image-3-p-3183.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
545c9ee829666444d7163acfd45a9683a55c12d9237a5302bc448277a446a0d3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 15:24:55 GMT
X-Trans-Id
tx297c848098884dd3a43f2-0062053131dfw1
ETag
292468e4a19f3ca1d96cc2ef6e1eb48b
Content-Type
image/jpeg
X-Timestamp
1644506694.77141
Cache-Control
public, max-age=65881
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
75608
Expires
Mon, 14 Feb 2022 08:55:46 GMT
bust-cryptocurrency-couple-shows-money-laundering-risks-showcase_image-3-p-3178.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
73 KB
74 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/bust-cryptocurrency-couple-shows-money-laundering-risks-showcase_image-3-p-3178.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5831c9b555532cdc0cf4b15c93e3ce25531f57b7841cb43e0050b74cebcc4164

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 09 Feb 2022 13:35:38 GMT
X-Trans-Id
tx1adf25d445554c0296fd0-006203c83cdfw1
ETag
33dd1d33d0129ea37ad5ad696e315197
Content-Type
image/jpeg
X-Timestamp
1644413737.03609
Cache-Control
public, max-age=50808
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
75245
Expires
Mon, 14 Feb 2022 04:44:33 GMT
ransomware-alphvblackcat-darksideblackmatter-reboot-showcase_image-5-p-3177.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
52 KB
52 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/ransomware-alphvblackcat-darksideblackmatter-reboot-showcase_image-5-p-3177.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
788731ef9d0d2cf46bc4b1616698956057cc9f9ef3cf9a347a178cb07fdde38d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 07 Feb 2022 14:09:54 GMT
X-Trans-Id
txe090258437d7414ab6e8f-0062014f79dfw1
ETag
2d7116934ec0c814541ff0048ef033f6
Content-Type
image/jpeg
X-Timestamp
1644242993.26448
Cache-Control
public, max-age=47265
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
53216
Expires
Mon, 14 Feb 2022 03:45:30 GMT
how-to-lead-when-your-superheroes-need-superhero-showcase_image-6-p-3176.jpg
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/
87 KB
88 KB
Image
General
Full URL
https://4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com/how-to-lead-when-your-superheroes-need-superhero-showcase_image-6-p-3176.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c0f1be597c64988a5f57355b8e9c5fba4435d3d7a2c9a2562227cb2e78a3c938

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 26 Jan 2022 20:17:13 GMT
X-Trans-Id
tx13b5759938be43049ec16-0061f7fc26dfw1
ETag
7d768eb606d87d3b87ac157132ecb0b4
Content-Type
image/jpeg
X-Timestamp
1643228232.66580
Cache-Control
public, max-age=68520
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
89214
Expires
Mon, 14 Feb 2022 09:39:45 GMT
profiles-in-leadership-jerich-beason-svp-ciso-epiq-showcase_image-9-a-18457.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
78 KB
79 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/profiles-in-leadership-jerich-beason-svp-ciso-epiq-showcase_image-9-a-18457.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
409813649524f771c1e2f47916e25bd40e16ddbd4895b6a0f585e179cff1ea61

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 04 Feb 2022 10:30:22 GMT
X-Trans-Id
tx1483208c642e4393a4b61-0062058937dfw1
ETag
d4ed55c5a7226421df3f250dedefcf2a
Content-Type
image/jpeg
X-Timestamp
1643970621.73432
Cache-Control
public, max-age=16857
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
80120
Expires
Sun, 13 Feb 2022 19:18:42 GMT
how-fraudsters-changed-their-synthetic-fraud-tactics-showcase_image-5-a-18476.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
185 KB
185 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/how-fraudsters-changed-their-synthetic-fraud-tactics-showcase_image-5-a-18476.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2810231ab4bd0af9b88ead055c2e8a8208041e1c8764b00625c85b682a9a7559

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 08 Feb 2022 08:42:35 GMT
X-Trans-Id
tx1c53e5710db04be8a95d9-00620240cfdfw1
ETag
fd12b7b915382df8f24ef871147bfddb
Content-Type
image/jpeg
X-Timestamp
1644309754.72272
Cache-Control
public, max-age=35188
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
189469
Expires
Mon, 14 Feb 2022 00:24:13 GMT
profiles-in-leadership-bradley-schaufenbuel-ciso-paychex-showcase_image-8-a-18455.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
57 KB
57 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/profiles-in-leadership-bradley-schaufenbuel-ciso-paychex-showcase_image-8-a-18455.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6d88a7e44c98d6c30d3618a3d9498ea920b65140fff5f9f95f730344f218ea93

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 04 Feb 2022 09:30:50 GMT
X-Trans-Id
tx59723f5212fe4372a35af-006202bc56dfw1
ETag
b7387b2250d1f07f7f457eea0a11bf11
Content-Type
image/jpeg
X-Timestamp
1643967049.18870
Cache-Control
public, max-age=60632
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
57953
Expires
Mon, 14 Feb 2022 07:28:17 GMT
guess-who-no-more-how-to-unlock-power-identity-graphs-for-fraud-prevention-showcase_image-8-w-3776.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
217 KB
217 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/guess-who-no-more-how-to-unlock-power-identity-graphs-for-fraud-prevention-showcase_image-8-w-3776.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
09bbed0d4841d1b1b5df95504ef8e54d487ec069ef30a3166888201e0477d82e

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 08 Feb 2022 19:21:33 GMT
X-Trans-Id
txfb82b3ffc84e4d7f9b739-0062041918dfw1
ETag
7364ae801d83423bf9f10b04e2bc537b
Content-Type
image/jpeg
X-Timestamp
1644348092.41709
Cache-Control
public, max-age=74561
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
221713
Expires
Mon, 14 Feb 2022 11:20:26 GMT
panel-discussion-three-critical-tenets-for-effective-managed-detection-response-showcase_image-6-w-3765.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
105 KB
106 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/panel-discussion-three-critical-tenets-for-effective-managed-detection-response-showcase_image-6-w-3765.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
868952659f64049b5e14fae3bb37b248eb756b4919fc335f7aa26716d31819ed

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 09 Feb 2022 02:34:52 GMT
X-Trans-Id
txa85edcfb2d6f49e589c46-00620663bcdfw1
ETag
bb104e851fee19e6e142643351c6c17b
Content-Type
image/jpeg
X-Timestamp
1644374091.23286
Cache-Control
public, max-age=66828
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
107903
Expires
Mon, 14 Feb 2022 09:11:33 GMT
how-identity-data-lays-foundation-for-innovation-showcase_image-6-w-3764.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
76 KB
76 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/how-identity-data-lays-foundation-for-innovation-showcase_image-6-w-3764.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4797a0f2717af2ad6c2dbfa90bb93ec223023a4ed7c05ef55a3b02545e00d9ab

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 04 Feb 2022 20:13:22 GMT
X-Trans-Id
txf4fa5a9ee5654c6b95c4d-00620168a1dfw1
ETag
c90a2afdc39611ea5310e8e1d59b6d93
Content-Type
image/jpeg
X-Timestamp
1644005601.79569
Cache-Control
public, max-age=52929
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
77526
Expires
Mon, 14 Feb 2022 05:19:54 GMT
live-webinar-nuclear-ransomware-30-we-thought-was-bad-then-got-even-worse-showcase_image-10-w-3763.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
142 KB
143 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-nuclear-ransomware-30-we-thought-was-bad-then-got-even-worse-showcase_image-10-w-3763.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
15e3427ce8627c053280e8c705c6df85949bece28e038bf4382bb407dcc959ad

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 04 Feb 2022 20:43:56 GMT
X-Trans-Id
tx8cd7cfcca988439ea86b7-0061fd987fdfw1
ETag
1e89b2e21145aa4eab01f1f89a4ce01d
Content-Type
image/jpeg
X-Timestamp
1644007435.23589
Cache-Control
public, max-age=39323
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
145658
Expires
Mon, 14 Feb 2022 01:33:08 GMT
live-webinar-how-to-deal-cyber-insurance-in-midst-ransomware-era-showcase_image-10-w-3662.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
351 KB
352 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-how-to-deal-cyber-insurance-in-midst-ransomware-era-showcase_image-10-w-3662.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ca8003db6440e55d3aa187f4450ff5270e814b39f60cedde5ff97a43a3a033eb

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 08 Dec 2021 21:39:14 GMT
X-Trans-Id
tx9c4dd3ca6b8243b6b6844-0061ce6464dfw1
ETag
a0c07ee66648bb823f5426f8a9c6b9f2
Content-Type
image/jpeg
X-Timestamp
1638999553.23368
Cache-Control
public, max-age=58679
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
359604
Expires
Mon, 14 Feb 2022 06:55:44 GMT
live-webinar-i-protecting-your-ics-environment-from-ransomware-showcase_image-1-w-3716.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
330 KB
330 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-i-protecting-your-ics-environment-from-ransomware-showcase_image-1-w-3716.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1772babd93af556bb2349cdca00e7e9141f9d5526efbe0c15296b588f3495afd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 07 Jan 2022 16:33:42 GMT
X-Trans-Id
txc0c7a5d33d8b4262babda-0061dbd0addfw1
ETag
63f77afbf69c12acfcdebdd9f0e9d696
Content-Type
image/jpeg
X-Timestamp
1641573221.01987
Cache-Control
public, max-age=74573
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
337772
Expires
Mon, 14 Feb 2022 11:20:38 GMT
live-webinar-reduce-fraud-friction-increase-your-bottom-line-secure-frictionless-consumer-digital-journey-showcase_image-6-w-3710.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
111 KB
111 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-reduce-fraud-friction-increase-your-bottom-line-secure-frictionless-consumer-digital-journey-showcase_image-6-w-3710.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
23cdf65171b5e32f604e043d0a38506bcfceb77d9908ea85694501306d0eff0f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 07 Jan 2022 21:35:28 GMT
X-Trans-Id
txcf3c461cbfdf410a9f190-0061e0e3fbdfw1
ETag
f5cf0d72f48a990618b0e438c6a3fbb8
Content-Type
image/jpeg
X-Timestamp
1641591327.93933
Cache-Control
public, max-age=74586
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
113335
Expires
Mon, 14 Feb 2022 11:20:51 GMT
live-webinar-all-mfas-are-created-equal-some-mfas-are-more-equal-than-others-showcase_image-2-w-3759.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
68 KB
68 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-all-mfas-are-created-equal-some-mfas-are-more-equal-than-others-showcase_image-2-w-3759.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a2e20556274b006d9f7d7f8263d72251856703664003968a55938716463da085

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 26 Jan 2022 13:50:13 GMT
X-Trans-Id
tx695ed54d732643719e867-0061f1537edfw1
ETag
c31f86f19932969fd554d0c72ae56465
Content-Type
image/jpeg
X-Timestamp
1643205012.73501
Cache-Control
public, max-age=35166
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
69516
Expires
Mon, 14 Feb 2022 00:23:51 GMT
liz-votaw-largeImage-8-a-1607.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
76 KB
77 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/liz-votaw-largeImage-8-a-1607.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
68dab3dd9bc29fb678e2b4db70df43083e7f0604edb60dd013c2f8c732f1206a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 02 May 2016 12:54:16 GMT
X-Trans-Id
txa2d6bd1dd186404c85792-0061a574c8dfw1
ETag
36361d03a4a97aae602217d60aec5acc
Content-Type
image/jpeg
X-Timestamp
1462193655.88643
Cache-Control
public, max-age=6142
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
77951
Expires
Sun, 13 Feb 2022 16:20:07 GMT
jerry-archer-largeImage-9-a-1618.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
65 KB
65 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/jerry-archer-largeImage-9-a-1618.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d728e670ee45d60a8173e8f8c464827ff9fdb5442cae20920eac7b221bdeb2b0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 13 May 2016 19:39:29 GMT
X-Trans-Id
tx4c85a04266944a149e8d8-0061b7cecfdfw1
ETag
6154b288c4ed12b340e8f79dfb806698
Content-Type
image/jpeg
X-Timestamp
1463168368.23033
Cache-Control
public, max-age=81555
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
66573
Expires
Mon, 14 Feb 2022 13:17:00 GMT
alex-mosher-largeImage-8-a-1900.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
129 KB
129 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/alex-mosher-largeImage-8-a-1900.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4e8774d0b5222a769020cbff207419669f77a64af4027470def4e17d3a5195fd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 26 Apr 2017 16:50:04 GMT
X-Trans-Id
tx68397d5b67974df28ae30-0062060a38dfw1
ETag
007ae7d9acaed9c1add8a2abd3224ebd
Content-Type
image/jpeg
X-Timestamp
1493225403.30383
Cache-Control
public, max-age=54864
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
131615
Expires
Mon, 14 Feb 2022 05:52:09 GMT
james-van-dyke-largeImage-7-a-864.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
51 KB
52 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/james-van-dyke-largeImage-7-a-864.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a753ae5df867078a24f92c99b85f1b041d54ec8de159a779eefb91e122e02396

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 01 Mar 2017 14:50:19 GMT
X-Trans-Id
tx07f7a4d228264e0291286-0061ef4910dfw1
ETag
5836b29e886bfe1da43195e365a69fb8
Content-Type
image/jpeg
X-Timestamp
1488379818.05030
Cache-Control
public, max-age=4081
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
52637
Expires
Sun, 13 Feb 2022 15:45:46 GMT
mobile-app-friction-report-crypto-edition-onboarding-pdf-3-w-9716.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
151 KB
151 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/mobile-app-friction-report-crypto-edition-onboarding-pdf-3-w-9716.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
12c8b3d381665ed3957f4f9a9412662133dd953a49ee638b9d6920478e169db7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 11 Feb 2022 18:11:42 GMT
X-Trans-Id
tx06b810545c984dc389375-006206f8bbdfw1
ETag
770dd8cfd6c82d3c35f840bc61ef9aa8
Content-Type
image/jpeg
X-Timestamp
1644603101.56470
Cache-Control
public, max-age=28003
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
154237
Expires
Sun, 13 Feb 2022 22:24:28 GMT
insider-threat-checklist-pdf-3-w-9705.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
188 KB
189 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/insider-threat-checklist-pdf-3-w-9705.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c14c20b8684ba64f31c675c9610f6943d2935ef45aad9bae8a79035b1da13502

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 18:16:35 GMT
X-Trans-Id
txb9248c68ac134f188d7e0-0062067186dfw1
ETag
299bb0bb088df02e953b2afba02e844d
Content-Type
image/jpeg
X-Timestamp
1644516994.76621
Cache-Control
public, max-age=69401
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
193014
Expires
Mon, 14 Feb 2022 09:54:26 GMT
insider-threat-detection-mitigation-pdf-2-w-9706.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
296 KB
296 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/insider-threat-detection-mitigation-pdf-2-w-9706.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a0cb26c899700daf3694b476f6f8dec87ce4804ff060734e0b6dea2b6d8ed788

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 18:38:24 GMT
X-Trans-Id
tx8c645473ace2435397c95-0062067185dfw1
ETag
d1ad7a7d4ebe997c434a988b55c5ec3c
Content-Type
image/jpeg
X-Timestamp
1644518303.67046
Cache-Control
public, max-age=69230
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
302998
Expires
Mon, 14 Feb 2022 09:51:35 GMT
cio-ciso-guide-how-to-mitigate-growing-legal-risks-around-new-data-obligations-pdf-4-w-9707.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
129 KB
129 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/cio-ciso-guide-how-to-mitigate-growing-legal-risks-around-new-data-obligations-pdf-4-w-9707.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
05d62aa67257a9eb3f3205f61c1564b48a39ee2cc04e5987f53524cb50a0ed5d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 18:33:54 GMT
X-Trans-Id
txde98f6419cab4bd9b5f6f-0062067185dfw1
ETag
ff7ce36c77e3bfbce1122577f9301d7b
Content-Type
image/jpeg
X-Timestamp
1644518033.71417
Cache-Control
public, max-age=68872
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
131981
Expires
Mon, 14 Feb 2022 09:45:37 GMT
2021-year-complexity-pdf-9-h-106.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
167 KB
168 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/2021-year-complexity-pdf-9-h-106.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7feb9afd2b66cb0776368af51a4e74d22787d4cbe836e1d6490fc1badbd46d5e

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 14 Jan 2022 21:05:07 GMT
X-Trans-Id
txb41c861ccaa647cd967df-0061e1f0fedfw1
ETag
9cea7f13e1a59b282e81257964303095
Content-Type
image/jpeg
X-Timestamp
1642194306.07043
Cache-Control
public, max-age=77372
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
171288
Expires
Mon, 14 Feb 2022 12:07:17 GMT
combatting-cybercrime-pdf-9-h-103.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
358 KB
358 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/combatting-cybercrime-pdf-9-h-103.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7ff5b98c09ec9d2af43d4108160ea0455f91f415f83031cc79fbe24a3a765bb8

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 26 Nov 2019 19:37:47 GMT
X-Trans-Id
tx3f2c2399ab6d42cba3b4b-00605ccba9dfw1
ETag
11a3adb400c0ff282a505428b1d7be73
Content-Type
image/jpeg
X-Timestamp
1574797066.57975
Cache-Control
public, max-age=50844
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
366322
Expires
Mon, 14 Feb 2022 04:45:09 GMT
top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
76 KB
77 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/top-canadian-cyber-threats-expected-in-2020-logo-9-h-102.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eb9ec684a7198fded61e248eaff2d28d0c9f8a15dfee8d9afff66aa6ff200461

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 28 Oct 2019 13:57:45 GMT
X-Trans-Id
tx529fbe8bd614429184765-00605cc59bdfw1
ETag
69913c61181f1fc9d730d6c8298e55c4
Content-Type
image/jpeg
X-Timestamp
1572271064.63410
Cache-Control
public, max-age=51332
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
78320
Expires
Mon, 14 Feb 2022 04:53:17 GMT
leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/
197 KB
198 KB
Image
General
Full URL
https://fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com/leveraging-new-technologies-in-fraud-investigations-logo-7-h-101.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c70242480ad0a0ecc7c305d659f1fdb3a9cb1eb480927b46f8bd62d33ed0f8b2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 15 Oct 2019 14:06:53 GMT
X-Trans-Id
tx61c71f812a9c4bae867a2-00605cc93edfw1
ETag
e3e068e355cdbfaa15e88b627d7ebc55
Content-Type
image/jpeg
X-Timestamp
1571148412.42493
Cache-Control
public, max-age=78953
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
202154
Expires
Mon, 14 Feb 2022 12:33:38 GMT
industrial-cybersecurity-preparedness-research-survey-showcase_image-8-s-93.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
117 KB
118 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/industrial-cybersecurity-preparedness-research-survey-showcase_image-8-s-93.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
cb7e2c6314883974a64ce8537f9e52072e02916490aac1799d88a0bcd25ddaf4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 04 Jan 2022 23:04:56 GMT
X-Trans-Id
tx3e01f63b82524dc6b84ac-0061d76e34dfw1
ETag
da9651881d05896a8df5979aeda6100a
Content-Type
image/jpeg
X-Timestamp
1641337495.25507
Cache-Control
public, max-age=44037
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
120251
Expires
Mon, 14 Feb 2022 02:51:42 GMT
ciso-perspectives-2022-data-protection-survey-showcase_image-6-s-92.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
79 KB
79 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/ciso-perspectives-2022-data-protection-survey-showcase_image-6-s-92.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0e9eb2f14e00016ef6ad511f7b664e86e0ac9be063e2965919e874ea27c8e45d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 15 Dec 2021 19:43:45 GMT
X-Trans-Id
txf3c38dff989f4af8948c0-0061ba6847dfw1
ETag
00595fd2c42d6386837641ecab325f08
Content-Type
image/jpeg
X-Timestamp
1639597424.80929
Cache-Control
public, max-age=28011
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
80805
Expires
Sun, 13 Feb 2022 22:24:36 GMT
securing-industry-40-cyber-risk-in-smart-manufacturing-operations-in-2022-showcase_image-10-s-91.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
121 KB
121 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/securing-industry-40-cyber-risk-in-smart-manufacturing-operations-in-2022-showcase_image-10-s-91.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2cd478781801719733141104b47812b1294f1cda8aaa8e45483b0559099bcd64

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 16 Nov 2021 16:34:59 GMT
X-Trans-Id
tx986c4cd6f58f486f86287-0061a8e814dfw1
ETag
dccbf3520bd13d77057e971cc08d0f69
Content-Type
image/jpeg
X-Timestamp
1637080498.31402
Cache-Control
public, max-age=63158
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
123581
Expires
Mon, 14 Feb 2022 08:10:23 GMT
zero-trust-strategies-for-2022-showcase_image-5-s-90.jpg
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/
32 KB
32 KB
Image
General
Full URL
https://21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com/zero-trust-strategies-for-2022-showcase_image-5-s-90.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c40189fa541b5c6d003be5744cd55d5e80d5bb6e85b92e0ab19613716d099c2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 17 Sep 2021 21:16:38 GMT
X-Trans-Id
tx5fc8f8ebc023468a83590-006148b2acdfw1
ETag
e58f6a88501e731000c3cf1805866f38
Content-Type
image/jpeg
X-Timestamp
1631913397.13895
Cache-Control
public, max-age=56755
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
32365
Expires
Mon, 14 Feb 2022 06:23:40 GMT
are-you-covered-from-top-threat-vector-in-2022-pdf-10-w-9701.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
134 KB
134 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/are-you-covered-from-top-threat-vector-in-2022-pdf-10-w-9701.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d4e0909b8b24d03563ba16fc800eec70fabb644bfc6fe6d0f1a4b8d35d4530f8

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 13:34:10 GMT
X-Trans-Id
tx48342bea6b92418f971d8-006206904cdfw1
ETag
261e8be8e293ccbb99ebfa7d5acd26df
Content-Type
image/jpeg
X-Timestamp
1644500049.88445
Cache-Control
public, max-age=77240
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
137162
Expires
Mon, 14 Feb 2022 12:05:05 GMT
reducing-identity-fraud-while-improving-digital-customer-experience-in-financial-services-pdf-6-w-9703.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
107 KB
108 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/reducing-identity-fraud-while-improving-digital-customer-experience-in-financial-services-pdf-6-w-9703.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
66faec05e2e2790f16d3a7272a582c97ca91a18e8216648639b5b2bcd4990452

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 14:27:35 GMT
X-Trans-Id
tx468fa85e5d154bbeb4c72-00620521fadfw1
ETag
cd429dc91f49911618fdbb620397311d
Content-Type
image/jpeg
X-Timestamp
1644503254.76090
Cache-Control
public, max-age=62741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
109836
Expires
Mon, 14 Feb 2022 08:03:26 GMT
virtual-zero-trust-summit-showcase_image-5-e-358.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
78 KB
79 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/virtual-zero-trust-summit-showcase_image-5-e-358.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b8bfa05f530d61830fb0ec4ae9d725c66ea3451430a3b6b684ef52be1b7540cc

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 03 Dec 2021 18:03:22 GMT
X-Trans-Id
txdcf971da39f644af8a477-0061aa6916dfw1
ETag
dfffa755c906704cd9f89a943af83bff
Content-Type
image/jpeg
X-Timestamp
1638554601.69461
Cache-Control
public, max-age=79670
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
80379
Expires
Mon, 14 Feb 2022 12:45:35 GMT
virtual-anz-summit-showcase_image-7-e-359.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
73 KB
74 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/virtual-anz-summit-showcase_image-7-e-359.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b66976a5feab46b27be01446ea1fbe394a95607791925a6d5d0685ef457cc082

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 03 Dec 2021 18:11:29 GMT
X-Trans-Id
txb15a8d4a0c464312835b1-0061aa690fdfw1
ETag
34ca197619d23ff30d2c85f5d8b2f18b
Content-Type
image/jpeg
X-Timestamp
1638555088.49726
Cache-Control
public, max-age=76510
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
75020
Expires
Mon, 14 Feb 2022 11:52:55 GMT
hybrid-canada-summit-showcase_image-9-e-360.jpg
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/
78 KB
78 KB
Image
General
Full URL
https://752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com/hybrid-canada-summit-showcase_image-9-e-360.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6ebb2bf248f21502bab02c6d29176be760f4732499b72b703855e4dec4ae5f88

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 03 Dec 2021 18:17:27 GMT
X-Trans-Id
tx9efbe8d846e4491bac182-0061aa699ddfw1
ETag
a30d7039fd2b40f59daf8a4adc2014fd
Content-Type
image/jpeg
X-Timestamp
1638555446.01601
Cache-Control
public, max-age=69313
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
79722
Expires
Mon, 14 Feb 2022 09:52:58 GMT
empty_menu_image.png
www.bankinfosecurity.com/images/navigation/generic/
5 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images/navigation/generic/empty_menu_image.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
69278fe35261286939e10f3832f461f9bf6addf267ffe0134e26be3d313dbd7d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
3692
best-virtual-rsa-conference-2021-showcase_image-2-a-16877.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
246 KB
247 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/best-virtual-rsa-conference-2021-showcase_image-2-a-16877.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4e038124df0c30dc173fff44912f119f3318f93197f082bb98cddacd2e1e2e00

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 15 Jun 2021 17:19:03 GMT
X-Trans-Id
tx7163510291484184b47ad-0060c8f7a2dfw1
ETag
6fe1bde30830126d3e1d1361cfb2b773
Content-Type
image/jpeg
X-Timestamp
1623777542.69955
Cache-Control
public, max-age=13535
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
252213
Expires
Sun, 13 Feb 2022 18:23:20 GMT
eyes-wide-open-visibility-in-digital-risk-protection-showcase_image-9-a-16745.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
67 KB
68 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/eyes-wide-open-visibility-in-digital-risk-protection-showcase_image-9-a-16745.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0bee57e2de6644c6b1d78c450389bfbaa4de968bb942ee7fb48b7df2d39b41e5

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 26 May 2021 18:10:50 GMT
X-Trans-Id
tx08295b47b3a74922b06f7-0060af94f1dfw1
ETag
51534089f4373df509551a14f5d8857d
Content-Type
image/jpeg
X-Timestamp
1622052649.32488
Cache-Control
public, max-age=39092
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
68761
Expires
Mon, 14 Feb 2022 01:29:17 GMT
profiles-in-leadership-khawaja-ali-federal-bank-pakistan-showcase_image-6-a-16569.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
170 KB
171 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/profiles-in-leadership-khawaja-ali-federal-bank-pakistan-showcase_image-6-a-16569.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a6b23ecf194d27d041fd0f801403090911753b6c1dd7968f1459dd7c59dc685d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Sun, 23 May 2021 13:50:25 GMT
X-Trans-Id
tx3799d6d61c394b35a09cf-0060abb0d9dfw1
ETag
5efd8420c7ddd9e71af9cf45427fb932
Content-Type
image/jpeg
X-Timestamp
1621777824.48830
Cache-Control
public, max-age=39290
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
174380
Expires
Mon, 14 Feb 2022 01:32:35 GMT
ismgs-editors-panel-improving-hiring-practices-more-showcase_image-3-a-16715.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
135 KB
135 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/ismgs-editors-panel-improving-hiring-practices-more-showcase_image-3-a-16715.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c47f11b814fc6f1e7dce6f7d94333aacc647cef2b6eaedeb273ca3a0fc662643

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 21 May 2021 13:07:17 GMT
X-Trans-Id
tx87dfd55fcede4eb59d11c-00610c84b9dfw1
ETag
a942ad0afe7c52c648629385844ba71f
Content-Type
image/jpeg
X-Timestamp
1621602436.45046
Cache-Control
public, max-age=68781
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
138089
Expires
Mon, 14 Feb 2022 09:44:06 GMT
infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
89 KB
89 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/infosec-europe-2019-compendium-imageFile-2-a-12739.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4546d13ea9bae9935dcd23f61d215a528120a53479bf51e372de3420029ed535

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 05 Jul 2019 20:13:34 GMT
X-Trans-Id
txd6fb5857fe1f4f07bc1ae-00605cb624dfw1
ETag
f9dab7917669551bb50361c2dcd43aa7
Content-Type
image/jpeg
X-Timestamp
1562357613.59432
Cache-Control
public, max-age=53392
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
91187
Expires
Mon, 14 Feb 2022 05:27:37 GMT
improving-iot-risk-management-showcase_image-10-a-12689.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
60 KB
61 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/improving-iot-risk-management-showcase_image-10-a-12689.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6ec9288103b5919c36e28909faf04364cdf19cf7687e234663d0d9daab65a3c0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 28 Jun 2019 14:04:32 GMT
X-Trans-Id
tx02bfa77783654d38ad8e9-006033d15bdfw1
ETag
7f5fdd9cf37f980ea13c12c231815e13
Content-Type
image/jpeg
X-Timestamp
1561730671.53151
Cache-Control
public, max-age=35752
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
61807
Expires
Mon, 14 Feb 2022 00:33:37 GMT
gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
62 KB
62 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/gdpr-where-do-we-go-from-here-showcase_image-1-a-12681.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8bc7f122cae9e9efd75cd58076d06fb057d8f50abf07ffc1716e17d87682b9cf

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 25 Jun 2019 19:30:48 GMT
X-Trans-Id
tx780eb42c426f415ca59d8-00605cd0addfw1
ETag
bba47bed092092a1c82b09a86a3a0e40
Content-Type
image/jpeg
X-Timestamp
1561491047.60933
Cache-Control
public, max-age=38092
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
63007
Expires
Mon, 14 Feb 2022 01:12:37 GMT
reinventing-application-security-showcase_image-10-a-12671.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
53 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/reinventing-application-security-showcase_image-10-a-12671.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4179815331b1b050e45da1ccf1d1a8cb50904e1cbb92228b32d55d545d4aaf7c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 25 Jun 2019 19:54:35 GMT
X-Trans-Id
tx5993f37ecbce42fa89e1b-006033d7acdfw1
ETag
89521d60b07d7e85acabbf0301821f45
Content-Type
image/jpeg
X-Timestamp
1561492474.52472
Cache-Control
public, max-age=15988
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
54026
Expires
Sun, 13 Feb 2022 19:04:13 GMT
44-million-stolen-from-crypto-firm-multi-bridge-exploited-showcase_image-2-a-18467.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
97 KB
97 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-showcase_image-2-a-18467.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
413087f29d5def38c8b55aa15f507c78e66565f9222d5ed541e60ded5a9cc239

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 07 Feb 2022 14:36:51 GMT
X-Trans-Id
txd99e37e319314078821c8-0062014ca3dfw1
ETag
abebd7c2d5f9e680245ab3860c9e62d3
Content-Type
image/jpeg
X-Timestamp
1644244610.92721
Cache-Control
public, max-age=2311
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
99012
Expires
Sun, 13 Feb 2022 15:16:16 GMT
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CEC) /
Resource Hash
1f5a3cbf19a41df9f5e59f05ac4c668b3caa896cb3c2e5c96f7addf4f6a96479

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
22
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
29179
x-tw-cdn
VZ
Last-Modified
Tue, 01 Feb 2022 20:03:56 GMT
Server
ECS (mil/6CEC)
Etag
"94840c3a0697481258cd2b28513e7509+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
prajeet-nair-largeImage-5-a-3483.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
45 KB
45 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/prajeet-nair-largeImage-5-a-3483.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5a2dcc98890f7760ad225371f7267d1320deb196ab8452535c4e0fd00c2f6a70

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 02 Jul 2020 13:13:58 GMT
X-Trans-Id
txdae203e7ea93496399931-0061d3ce73dfw1
ETag
59dd8613ef975203b55fd7f79768a252
Content-Type
image/jpeg
X-Timestamp
1593695637.87942
Cache-Control
public, max-age=47273
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
45594
Expires
Mon, 14 Feb 2022 03:45:38 GMT
case-study-road-to-zero-trust-showcase_image-8-a-18196.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
125 KB
126 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/case-study-road-to-zero-trust-showcase_image-8-a-18196.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b1116afbd0e2c0113788d03d90d7062358db54ecb706d95bbae22f16ca001008

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 23 Dec 2021 20:28:38 GMT
X-Trans-Id
tx66918505cf13417ca7ed8-0061d8aca4dfw1
ETag
60533762096663b1d729ccd898796683
Content-Type
image/jpeg
X-Timestamp
1640291317.46287
Cache-Control
public, max-age=84775
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
128256
Expires
Mon, 14 Feb 2022 14:10:40 GMT
4-ways-xdr-levels-up-security-programs-pdf-7-w-9627.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
187 KB
187 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/4-ways-xdr-levels-up-security-programs-pdf-7-w-9627.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1eab6f49bff9b85b13a4fda7883b7d555fd4bf180a10eb46ab17732f6e50c1c6

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 02 Feb 2022 00:31:32 GMT
X-Trans-Id
txc4eac6659ba64239ae250-0061f9d7fbdfw1
ETag
4e0bdc097fdabe1d53201de99f41c191
Content-Type
image/jpeg
X-Timestamp
1643761891.02963
Cache-Control
public, max-age=2261
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
191237
Expires
Sun, 13 Feb 2022 15:15:26 GMT
how-to-uplevel-your-defenses-security-analytics-pdf-3-w-6551.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
218 KB
219 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/how-to-uplevel-your-defenses-security-analytics-pdf-3-w-6551.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f8926bcd2ffa7e82f08210092d7efe02938311ebacc02fbf0c519915baabc22b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 10 Aug 2020 15:53:50 GMT
X-Trans-Id
tx243f501e1490470c92cf0-0061384caedfw1
ETag
b79deff8926f5cbe088a30366f7af4a0
Content-Type
image/jpeg
X-Timestamp
1597074829.29038
Cache-Control
public, max-age=47747
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
223577
Expires
Mon, 14 Feb 2022 03:53:32 GMT
you-should-take-security-to-cloud-logo-6-w-5981.JPG
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
57 KB
58 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/you-should-take-security-to-cloud-logo-6-w-5981.JPG
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c35dab8f16b1dbfa88c0dee6d510e0185a815814011a42cdd9d6ef73a59da527

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Sun, 22 Mar 2020 22:39:58 GMT
X-Trans-Id
tx0eb33b7b55a643deb913f-006106482fdfw1
ETag
0d359d1397fac26c331ffb062665c651
Content-Type
image/jpeg
X-Timestamp
1584916797.40787
Cache-Control
public, max-age=43151
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
58769
Expires
Mon, 14 Feb 2022 02:36:56 GMT
beginners-guide-to-observability-pdf-9-w-6567.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
117 KB
117 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/beginners-guide-to-observability-pdf-9-w-6567.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c0e35d55bc8310a3f5e6820a9c150853bc124ed180497f83e0d6569ac70a31ac

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 11 Aug 2020 19:53:19 GMT
X-Trans-Id
tx730c8b818e4b424485eda-0060a66826dfw1
ETag
58cbcb51e15081f5fdeff1567797cc79
Content-Type
image/jpeg
X-Timestamp
1597175598.65833
Cache-Control
public, max-age=69146
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
119625
Expires
Mon, 14 Feb 2022 09:50:11 GMT
guide-to-modern-apm-essentials-for-your-cloud-native-journey-pdf-8-w-7809.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
113 KB
113 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/guide-to-modern-apm-essentials-for-your-cloud-native-journey-pdf-8-w-7809.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ccb6c1dc8bea5ec2de80ac2c8ab21073f11c5e5a1f7b44f5a7373bb42dd90772

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 15 Mar 2021 15:04:35 GMT
X-Trans-Id
txbd26cf79ec96431fb2063-0060c0dd50dfw1
ETag
e977926183b0f4af6ed69a1f337abc9a
Content-Type
image/jpeg
X-Timestamp
1615820674.36289
Cache-Control
public, max-age=22815
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
115546
Expires
Sun, 13 Feb 2022 20:58:00 GMT
forrester-total-economic-impact-guardicore-akamai-technologies-company-pdf-4-w-9435.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
135 KB
136 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/forrester-total-economic-impact-guardicore-akamai-technologies-company-pdf-4-w-9435.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7932ddf5f88513cfb3ceca889f25d3bd0b1e7a03e3f512e09ebeccc5a8fd9fdd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 16 Dec 2021 17:26:31 GMT
X-Trans-Id
txfa7dc5cec0fb446a92b65-0061e498ccdfw1
ETag
e162c3c3f95f3b6c1e785418c9855748
Content-Type
image/jpeg
X-Timestamp
1639675590.23129
Cache-Control
public, max-age=22761
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
138450
Expires
Sun, 13 Feb 2022 20:57:06 GMT
simplified-ransomware-mitigation-showcase_image-6-a-18103.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
285 KB
286 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/simplified-ransomware-mitigation-showcase_image-6-a-18103.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3a37e67fc102871e10893fdf1e9836e5b010f3b7ae20beb82c309fe2da970abf

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 10 Dec 2021 20:33:33 GMT
X-Trans-Id
tx95d230bcec7b426294063-0061e53e36dfw1
ETag
baa45a06c4980a222806056dceb423ed
Content-Type
image/jpeg
X-Timestamp
1639168412.71807
Cache-Control
public, max-age=84804
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
291959
Expires
Mon, 14 Feb 2022 14:11:09 GMT
cyber-threat-survival-guide-how-to-prepare-for-future-threats-pdf-6-w-9519.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
167 KB
168 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/cyber-threat-survival-guide-how-to-prepare-for-future-threats-pdf-6-w-9519.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a3265899c157cb416985416064d06044d2b803d9d46963d4a89ee4a3799c48da

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 05 Jan 2022 14:57:19 GMT
X-Trans-Id
txe65b42ccca804dd383f6f-0061d5ba46dfw1
ETag
d7728775a815d237310a6a96fc320684
Content-Type
image/jpeg
X-Timestamp
1641394638.36325
Cache-Control
public, max-age=78872
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
171491
Expires
Mon, 14 Feb 2022 12:32:17 GMT
primer-to-help-mssps-evaluate-xdr-vendor-approaches-native-vs-open-vs-hybrid-showcase_image-10-w-3751.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
120 KB
120 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/primer-to-help-mssps-evaluate-xdr-vendor-approaches-native-vs-open-vs-hybrid-showcase_image-10-w-3751.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
eb30dbfbcd5aba454c297e8ad1a86f22f1692d9a39caa60cf384d2720f675b90

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 24 Jan 2022 06:50:34 GMT
X-Trans-Id
tx2ec03d80e9654466a77ea-0061f30816dfw1
ETag
6e300ca137cd2bceac0e79a0a3286cd4
Content-Type
image/jpeg
X-Timestamp
1643007033.84330
Cache-Control
public, max-age=76489
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
122521
Expires
Mon, 14 Feb 2022 11:52:34 GMT
phishing-ebook-pdf-7-w-9478.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
216 KB
217 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/phishing-ebook-pdf-7-w-9478.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
da15c6ae4c11722781e418f3b064b0bc4955c5240611eb4f6690cd51367c00d1

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Wed, 22 Dec 2021 15:06:33 GMT
X-Trans-Id
txb0a2d624656d416f9503f-0061c3a64ddfw1
ETag
6b76c6c8bf4e4abdb8682d2a3887482f
Content-Type
image/jpeg
X-Timestamp
1640185592.22525
Cache-Control
public, max-age=40841
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
221507
Expires
Mon, 14 Feb 2022 01:58:26 GMT
12-immutable-rules-for-observability-pdf-1-w-8135.jpg
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/
116 KB
116 KB
Image
General
Full URL
https://dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com/12-immutable-rules-for-observability-pdf-1-w-8135.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8bc2c2844601c45b0a406ed7d8f7ead7a68cb075bd9754b6e4d3d83c43f46bc3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Sat, 22 May 2021 18:32:40 GMT
X-Trans-Id
txd818f412ed344d9f9c0ec-0061baa091dfw1
ETag
d667f505bb7312d24b7143637474a930
Content-Type
image/jpeg
X-Timestamp
1621708359.41746
Cache-Control
public, max-age=24856
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
118333
Expires
Sun, 13 Feb 2022 21:32:01 GMT
live-webinar-3-biggest-challenges-security-teams-have-and-how-to-overcome-them-showcase_image-4-w-3753.jpg
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/
67 KB
68 KB
Image
General
Full URL
https://75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com/live-webinar-3-biggest-challenges-security-teams-have-and-how-to-overcome-them-showcase_image-4-w-3753.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9c364c20f2663f303f39345b7654ce1814ef5af1820688319682b742ad129070

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 27 Jan 2022 21:33:43 GMT
X-Trans-Id
tx8e2c0e12ad774a7cb47eb-0061f32964dfw1
ETag
a14260c38b4d2ae5750581fde188ee89
Content-Type
image/jpeg
X-Timestamp
1643319222.20558
Cache-Control
public, max-age=54015
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
69088
Expires
Mon, 14 Feb 2022 05:38:00 GMT
us-lawmakers-continue-push-for-stablecoin-regulations-showcase_image-7-a-18494.jpg
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/
52 KB
53 KB
Image
General
Full URL
https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/us-lawmakers-continue-push-for-stablecoin-regulations-showcase_image-7-a-18494.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8ec651881e95dca2e4e951f88d684d6d86b2e3dd7b519a1ea9fe8a7112093e74

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 22:27:48 GMT
X-Trans-Id
txc888292bf499433ba75fa-006206a119dfw1
ETag
44eb9458d9f2f20c3ca9c526dd7e7fc9
Content-Type
image/jpeg
X-Timestamp
1644532067.34368
Cache-Control
public, max-age=82538
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
53377
Expires
Mon, 14 Feb 2022 13:33:23 GMT
brand-narratives-awareness-in-cybersecurity-showcase_image-8-i-5015.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
24 KB
24 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/brand-narratives-awareness-in-cybersecurity-showcase_image-8-i-5015.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
443c73abdaa7a826afba82dd1272ebe33fc087ad86bb71e108bb588d6d0c5dc3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Mon, 24 Jan 2022 17:30:39 GMT
X-Trans-Id
tx5054f64364604bd4aec67-0061efc661dfw1
ETag
3f27c903d6014cdb2c14a48a997b02a6
Content-Type
image/jpeg
X-Timestamp
1643045438.29944
Cache-Control
public, max-age=9497
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
24436
Expires
Sun, 13 Feb 2022 17:16:02 GMT
health-data-breach-trends-latest-ups-downs-showcase_image-8-i-5023.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
116 KB
116 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/health-data-breach-trends-latest-ups-downs-showcase_image-8-i-5023.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
288d1f467713b25de8b5787c6568bfd1f211f520d8ae476797541220cd8847f6

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 10 Feb 2022 19:14:19 GMT
X-Trans-Id
txaeb68895374741f5bfe6c-00620585acdfw1
ETag
f52df94f97f82d747ddd8583d9a37578
Content-Type
image/jpeg
X-Timestamp
1644520458.50171
Cache-Control
public, max-age=13903
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
118792
Expires
Sun, 13 Feb 2022 18:29:28 GMT
preparing-entire-workforce-for-devastating-cyberattacks-showcase_image-5-i-5021.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/preparing-entire-workforce-for-devastating-cyberattacks-showcase_image-5-i-5021.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2fbeae136b8ecebf72cd90fab662653a31ee0b8a1a886ae64c0c0401ceb7c07c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 08 Feb 2022 19:04:20 GMT
X-Trans-Id
txe30a5e77eba948e289464-006202dd5cdfw1
ETag
dc93ca87d349ccb9663343f0e6d50a64
Content-Type
image/jpeg
X-Timestamp
1644347059.38411
Cache-Control
public, max-age=72627
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
57808
Expires
Mon, 14 Feb 2022 10:48:12 GMT
all-worlds-stage-russia-arrests-ransomware-suspects-showcase_image-4-i-5016.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
95 KB
95 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/all-worlds-stage-russia-arrests-ransomware-suspects-showcase_image-4-i-5016.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
94a8ac94d156f7f6667214f865f4cafe6559017134516749a5d90ec953865a61

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Thu, 27 Jan 2022 16:23:34 GMT
X-Trans-Id
txaeec841bb12c41ec9b374-0061f3b306dfw1
ETag
2d53f2c264b5c75ebc2e3d72865f5bcd
Content-Type
image/jpeg
X-Timestamp
1643300613.60639
Cache-Control
public, max-age=27903
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
97226
Expires
Sun, 13 Feb 2022 22:22:48 GMT
cyberattacks-are-number-1-health-tech-danger-in-2022-showcase_image-7-i-5019.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
96 KB
96 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/cyberattacks-are-number-1-health-tech-danger-in-2022-showcase_image-7-i-5019.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
030b164bbd7ce2535c7e23cb92f6ad7216816bcf66746e04d08e1d21c9abd5ee

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 01 Feb 2022 19:17:29 GMT
X-Trans-Id
tx6ee25568f2814c5da2b57-0061f99bdcdfw1
ETag
429c04c1fe73f599101f1e3d96700dd4
Content-Type
image/jpeg
X-Timestamp
1643743048.77964
Cache-Control
public, max-age=19713
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
97820
Expires
Sun, 13 Feb 2022 20:06:18 GMT
vetting-security-risks-open-source-code-in-healthcare-showcase_image-9-i-5017.jpg
0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/
62 KB
62 KB
Image
General
Full URL
https://0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com/vetting-security-risks-open-source-code-in-healthcare-showcase_image-9-i-5017.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
aad1fe936a4e01fcb9aa3ff2516185ce0df2a753d41b4ef24192ab8e3fa06b6f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 28 Jan 2022 18:43:54 GMT
X-Trans-Id
tx9f48f7c027254cc38c77f-0061f467a8dfw1
ETag
f8ae6dc85191f0360a22b7413bd9f007
Content-Type
image/jpeg
X-Timestamp
1643395433.09226
Cache-Control
public, max-age=63332
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
63337
Expires
Mon, 14 Feb 2022 08:13:17 GMT
logo-ismg-with-text.png
www.bankinfosecurity.com/images-responsive/
4 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logo-ismg-with-text.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4e2db1bef009e01901b4083a153f1607301428277a76f508e659dc2849cefa04
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=92
Content-Length
4175
logo-ismg-print.png
www.bankinfosecurity.com/images-responsive/
5 KB
6 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images-responsive/logo-ismg-print.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
5133e2e1a213ca44a8adb1f42f103a2d2e495849dfa4d42bf67c04fcc962e577
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
5598
ondemand-preview-w-255.jpg
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
56 KB
57 KB
Image
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3059f92e36a564c5cbcedc195f764e3c55c8cf919c84129c5f202870e7026b61

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 05 Jul 2013 12:55:26 GMT
X-Trans-Id
txb699e8a84815421eba4c5-0062088c2adfw1
ETag
7aece0902995efedc289b7c24037434b
Content-Type
image/jpeg
X-Timestamp
1373028925.94439
Cache-Control
public, max-age=36
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
57633
Expires
Sun, 13 Feb 2022 14:38:21 GMT
ron-ross-smallImage-a-558.jpg
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/
10 KB
11 KB
Image
General
Full URL
https://6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com/ron-ross-smallImage-a-558.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9c8bb391a723e088d163b560afa73f709c42a69df5647c4fefce9d16e4226895

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Fri, 01 Nov 2013 13:09:25 GMT
X-Trans-Id
txadef3dcf9d904055a6504-00610649e3dfw1
ETag
fac8c56390d084c4f1dfaa9b24a58c33
Content-Type
image/jpeg
X-Timestamp
1383311364.81114
Cache-Control
public, max-age=17170
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10640
Expires
Sun, 13 Feb 2022 19:23:55 GMT
modernizr.js
www.bankinfosecurity.com/javascripts-responsive/vendor/
0
0
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/vendor/modernizr.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=63072000

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=63072000
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=97
Expires
Thu, 19 Nov 1981 08:52:00 GMT
ismg-user-ip
worker.ismgcorp.com/
12 B
198 B
XHR
General
Full URL
https://worker.ismgcorp.com/ismg-user-ip
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1644763064.2986
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.130.251.6 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
e9360d6d9a9736c8a435e7aeef3ff384d434f91d7716d7f5c68d6d2e4ec85b30

Request headers

Accept
*/*
Referer
https://www.bankinfosecurity.com/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:45 GMT
content-encoding
gzip
server
Apache
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
access-control-allow-origin
*
cache-control
no-cache, private
content-length
32
gpt.js
www.googletagservices.com/tag/js/
80 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4ae689a5b37c61962b7f8702568778b5fe5afa464b5d7e21646cd6e75cdd0153
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
27131
x-xss-protection
0
server
sffe
etag
"1130 / 89 of 1000 / last-modified: 1644620882"
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Sun, 13 Feb 2022 14:37:45 GMT
munchkin.js
munchkin.marketo.net/
1 KB
1 KB
Script
General
Full URL
https://munchkin.marketo.net/munchkin.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1644763064.2986
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.234.67 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-234-67.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
4bf3aca933aa233702f890083af601fb16149ec8a17f8c1b90d30450562bde08

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Last-Modified
Fri, 29 Oct 2021 01:24:07 GMT
Server
AkamaiNetStorage
ETag
"461ce1cffaadfebf2e7659745618ba8e:1635470647.434977"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
753
gtm.js
www.googletagmanager.com/
513 KB
62 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
2dc98d78f4692713df31778c9bd0801db2701fe05e067af7e6da808222e05fd8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
63732
x-xss-protection
0
last-modified
Sun, 13 Feb 2022 12:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sun, 13 Feb 2022 14:37:46 GMT
gtm.js
www.googletagmanager.com/
73 KB
29 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-T8C2JFW
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
03e84faefa27bb50cc4e3fc30a61e77daa0204a204715bf9e283c6494c26756a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:45 GMT
content-encoding
br
vary
Accept-Encoding
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29571
x-xss-protection
0
last-modified
Sun, 13 Feb 2022 12:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Sun, 13 Feb 2022 14:37:45 GMT
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v27/
44 KB
44 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v27/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
88915cdc03fc5b9a20aec966fe93ee38aa3fd76bfef296e41d305271b3541c96
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.bankinfosecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Fri, 11 Feb 2022 09:58:52 GMT
x-content-type-options
nosniff
age
189533
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
44656
x-xss-protection
0
last-modified
Thu, 28 Oct 2021 00:30:43 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Sat, 11 Feb 2023 09:58:52 GMT
serverComponent.php
nexus.ensighten.com/choozle/12567/
274 B
416 B
Script
General
Full URL
https://nexus.ensighten.com/choozle/12567/serverComponent.php?r=873.155419802879&namespace=Bootstrapper&staticJsPath=nexus.ensighten.com/choozle/12567/code/&publishedOn=Mon%20Mar%2001%2015:40:45%20GMT%202021&ClientID=923&PageID=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/12567/Bootstrap.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
18.195.42.228 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-195-42-228.eu-central-1.compute.amazonaws.com
Software
nginx /
Resource Hash
1a585c1697f147f0eed50dedb859e9a66aad3db5a86c1f58b5e41ee1c993e3a3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:45 GMT
cache-control
no-cache, no-store
server
nginx
content-type
text/javascript
content-length
274
expires
Sun, 13 Feb 2022 14:37:44 GMT
fontawesome-webfont.woff
www.bankinfosecurity.com/css-responsive/fonts/
43 KB
44 KB
Font
General
Full URL
https://www.bankinfosecurity.com/css-responsive/fonts/fontawesome-webfont.woff?v=4.2.0
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1644763064.2986
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
0fd28fece9ebd606b8b071460ebd3fc2ed7bc7a66ef91c8834f11dfacab4a849
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://www.bankinfosecurity.com/css-responsive/vendor/font-awesome.min.css?s=1644763064.2986
Origin
https://www.bankinfosecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Last-Modified
Tue, 01 Feb 2022 19:21:44 GMT
Server
Apache
ETag
"ad90-5d6f9cfc386b5"
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/font-woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=95
Content-Length
44432
moatframe.js
z.moatads.com/addthismoatframe568911941483/
2 KB
1 KB
Script
General
Full URL
https://z.moatads.com/addthismoatframe568911941483/moatframe.js
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.235.40 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-235-40.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
05090f9390f5bc0cd23fe5f432037cc92d7cbce1ced9bfe8faf3d1c9abae85cd

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:45 GMT
content-encoding
gzip
last-modified
Fri, 08 Nov 2019 20:13:52 GMT
server
AmazonS3
x-amz-request-id
D5503D14AA2F06AA
etag
"f14b4e1f799b14f798a195f43cf58376"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=48567
accept-ranges
bytes
content-length
948
x-amz-id-2
JgalEtxvSAtZmM7+naGfrhsdf0JFS0gJW8lypWF8Tp90EkcPp4c3eAnpK+RDOIL1ltWgpx8wc3s=
main.js
www.bankinfosecurity.com/javascripts-responsive/
42 KB
10 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/main.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
378e1773698b5938e8009e8a9b8986b924adb0c2e636188da39164210b4f7b03
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
9798
media-transcript-navigation.js
www.bankinfosecurity.com/javascripts-responsive/
26 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/media-transcript-navigation.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
ae3c472ff47a96820c1acdf9574b231a88f62a006b84d320eb313af40f32f2db
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
6519
bis-hdr.r1.js
www.bankinfosecurity.com/javascripts-responsive/
1 KB
840 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/bis-hdr.r1.js?s=1644763064.2986
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4c92262ff23b2116bad93fc1e36f1a597dc713ad8b3cd03d56f8e49bec4cb186
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
455
jquery.browser.js
www.bankinfosecurity.com/javascripts-responsive/
2 KB
1 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/jquery.browser.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
bbe0aa82dca8a36f677fb17025c3baa011d355bd7cb42d4aacea1b0265855d6e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
1022
jquery.prettyPhoto.js
www.bankinfosecurity.com/javascripts-responsive/
24 KB
7 KB
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/jquery.prettyPhoto.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
1edbdbe7dd4c59e2fef20ef8dc4615a18d116fdf43daf018dce46a93e6cb153e
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
6459
7e3bcccbe9be6061a65a6eb142929580.js
nexus.ensighten.com/choozle/12567/code/
2 KB
549 B
Script
General
Full URL
https://nexus.ensighten.com/choozle/12567/code/7e3bcccbe9be6061a65a6eb142929580.js?conditionId0=421905
Requested by
Host: nexus.ensighten.com
URL: https://nexus.ensighten.com/choozle/12567/Bootstrap.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
18.195.42.228 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-195-42-228.eu-central-1.compute.amazonaws.com
Software
nginx /
Resource Hash
9186ad0839410bf3d20f3c5b242b36027562baac85ffb8cba18b50b6e4d7945d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:45 GMT
content-encoding
gzip
last-modified
Mon, 01 Mar 2021 15:40:46 GMT
server
nginx
etag
W/"603d0afe-746"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
cache-control
max-age=315360000
memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
fonts.gstatic.com/s/opensans/v27/
47 KB
47 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v27/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,700italic,800italic,400,300,600,700,800
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f57a038a716263766ff4d7f7d8a6ea13b22701ae6fc91e8b1b52fd8784844d23
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.bankinfosecurity.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Fri, 11 Feb 2022 09:52:07 GMT
x-content-type-options
nosniff
age
189938
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
47836
x-xss-protection
0
last-modified
Thu, 28 Oct 2021 00:32:23 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Sat, 11 Feb 2023 09:52:07 GMT
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
0
0

embed.js
bankinfosecurity.disqus.com/
77 KB
25 KB
Script
General
Full URL
https://bankinfosecurity.disqus.com/embed.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.196.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
openresty /
Resource Hash
515601df1b5063e3f11063021657391daeb74f8a1c01c7e85202c179f37ed2f0
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
openresty
Age
80
Vary
Accept-Encoding
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Strict-Transport-Security
max-age=300; includeSubdomains
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
25352
Cross-Origin-Resource-Policy
cross-origin
analytics.js
www.google-analytics.com/
49 KB
20 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
a1925038db769477ab74b4df34350c35688a795bb718727b0f4292a4a78a6210
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 02 Nov 2021 17:39:06 GMT
server
Golfe2
age
3771
date
Sun, 13 Feb 2022 13:34:54 GMT
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=7200
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
20006
expires
Sun, 13 Feb 2022 15:34:54 GMT
tag.aspx
ml314.com/
27 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?1312022
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.208.138.90 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-208-138-90.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
e0eb74c400dded823098e4cdb9f71e9b360a3f33cad9b346879205851e70f887

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
public, max-age=86400
transfer-encoding
chunked
Connection
keep-alive
insight.min.js
sjs.bizographics.com/
5 KB
2 KB
Script
General
Full URL
https://sjs.bizographics.com/insight.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a03:5f80:a::b212:e7d1 , Russian Federation, ASN50952 (DATAIX-AS Peering Ltd., RU),
Reverse DNS
Software
/
Resource Hash
fed785a6a8ca96fb67230fec5d85f9c508db49f4075aa0ef284af56cd89813e3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Last-Modified
Wed, 29 Sep 2021 19:17:49 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=46109
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2036
insight.min.js
snap.licdn.com/li.lms-analytics/
5 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a03:5f80:a::b212:e7d1 , Russian Federation, ASN50952 (DATAIX-AS Peering Ltd., RU),
Reverse DNS
Software
/
Resource Hash
fed785a6a8ca96fb67230fec5d85f9c508db49f4075aa0ef284af56cd89813e3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Last-Modified
Wed, 29 Sep 2021 19:17:49 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=38939
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2036
6si.min.js
j.6sc.co/
27 KB
9 KB
Script
General
Full URL
https://j.6sc.co/6si.min.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.233.140 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-233-140.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
2707e48726a3f7ec48a1d1aec9738f20b36bac1535cfa9de2e4d92310c4e7e7a
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Connection
keep-alive
Vary
Accept-Encoding
Content-Length
8575
Pragma
no-cache
Last-Modified
Thu, 07 Oct 2021 17:17:43 GMT
Server
nginx/1.14.0 (Ubuntu)
ETag
"615f2bb7-6a5f"
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET,POST
Content-Type
application/javascript
Access-Control-Allow-Origin
Cache-Control
private, no-cache, proxy-revalidate
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Sun, 13 Feb 2022 14:37:46 GMT
2682.js
dnn506yrbagrg.cloudfront.net/pages/scripts/0021/
309 B
821 B
Script
General
Full URL
https://dnn506yrbagrg.cloudfront.net/pages/scripts/0021/2682.js?456878
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.98.204 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-98-204.zrh50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6caf904d3dfc096ae3b4e40aed43181686bdf1bac4722b3dd2a775ab6d2a9992

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Thu, 18 Nov 2021 07:48:51 GMT
Via
1.1 7e81b1a3e22ce96cdfb0b6c2db121d58.cloudfront.net (CloudFront)
Connection
keep-alive
Last-Modified
Tue, 03 Mar 2020 19:14:28 GMT
Server
AmazonS3
Age
7541336
ETag
"53b0291ca3900aca920ad48e9790c1b7"
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Cache-Control
max-age=31536000
X-Amz-Cf-Pop
ZRH50-C1
Accept-Ranges
bytes
Content-Length
309
X-Amz-Cf-Id
B506luOjGr2mPKi72OEX9U1w8AAs67ZJi76SIgkNWM08O0g4RgeRxw==
ajax.php
www.bankinfosecurity.com/
6 KB
1 KB
XHR
General
Full URL
https://www.bankinfosecurity.com/ajax.php?json=twitterWidget
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1644763064.2986
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
4c400ce13448b0cb40ca98bf9ee1a3074acfdd3d0b7a15702b8685bdab0be04e

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
X-Requested-With
XMLHttpRequest
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=93
Expires
Thu, 19 Nov 1981 08:52:00 GMT
_ate.track.config_resp
v1.addthisedge.com/live/boost/ra-4fd21f2b39b17192/
166 B
325 B
Script
General
Full URL
https://v1.addthisedge.com/live/boost/ra-4fd21f2b39b17192/_ate.track.config_resp
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
184.30.24.121 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-24-121.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4cf8b4da854cac70fb514c2d255e93904353bda1fcc7229de2f59d5971d83028

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
etag
659743217
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
public, max-age=60, s-maxage=86400
content-disposition
attachment; filename=1.txt
content-length
154
300lo.json
m.addthis.com/live/red_lojson/
89 B
249 B
Script
General
Full URL
https://m.addthis.com/live/red_lojson/300lo.json?si=620917b9d9a10142&bkl=0&bl=1&pdt=546&sid=620917b9d9a10142&pub=ra-4fd21f2b39b17192&rev=v8.28.8-wp&ln=en&pc=men&cb=0&ab=-&dp=www.bankinfosecurity.com&dr=links.ismgcorp.com&fp=44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&fr=&of=0&pd=0&irt=0&vcl=0&md=0&ct=1&tct=0&abt=0&cdn=0&pi=1&rb=4&gen=100&chr=UTF-8&mk=Blockchain%2CCross-chain%20platform%2CMeter%2CEth%2CBSC&colc=1644763065707&jsl=1&uvs=620917b9da013fd1000&skipb=1&callback=addthis.cbs.jsonp__23102557599673480
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
184.30.24.121 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-24-121.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
65b23811251ff1caf4d73a1cdf0faf60709db0c2362d1f28ab07e34cb9aaef28

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
cache-control
max-age=0, no-cache, no-store, no-transform
content-disposition
attachment; filename=1.txt
content-length
89
content-type
application/javascript;charset=utf-8
sh.f48a1a04fe8dbf021b4cda1d.html
s7.addthis.com/static/ Frame 797E
0
0

sh.f48a1a04fe8dbf021b4cda1d.html
s7.addthis.com/static/ Frame 5A89
71 KB
26 KB
Document
General
Full URL
https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html
Requested by
Host: s7.addthis.com
URL: https://s7.addthis.com/js/250/addthis_widget.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
184.30.24.121 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-24-121.deploy.static.akamaitechnologies.com
Software
nginx/1.15.8 /
Resource Hash
7b6bfa13f0778c40bb2a00af9819bea2f07afcb4d071e7e4f436196953a5db4d
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

server
nginx/1.15.8
content-type
text/html
last-modified
Mon, 26 Oct 2020 18:11:48 GMT
etag
W/"5f971164-11adc"
timing-allow-origin
*
cache-control
public, max-age=86313600
p3p
CP="NON ADM OUR DEV IND COM STA"
strict-transport-security
max-age=15724800; includeSubDomains
content-encoding
gzip
content-length
26421
date
Sun, 13 Feb 2022 14:37:45 GMT
vary
Accept-Encoding
x-host
s7.addthis.com
ondemand-preview-w-255.mp4
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/
3 MB
0
Media
General
Full URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.bankinfosecurity.com/
Accept-Encoding
identity;q=1, *;q=0
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Range
bytes=0-

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Last-Modified
Fri, 05 Jul 2013 12:56:36 GMT
X-Trans-Id
txc725be19ec3b4f1baeed1-0061e02f1adfw1
ETag
e5d65b36cc2f1ee7de6cc53cd6609280
Content-Type
video/mp4
Content-Range
bytes 0-10621769/10621770
X-Timestamp
1373028995.98411
Cache-Control
public, max-age=130
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
10621770
Expires
Sun, 13 Feb 2022 14:39:56 GMT
VDsX0ds__normal.jpg
pbs.twimg.com/profile_images/621725343494356992/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/621725343494356992/VDsX0ds__normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CED) /
Resource Hash
2b9abd5f6bfe1ce1d085dfffbc24128238f1048e6b6baecdfbb3c90c95314a99
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
age
184299
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
content-length
1579
x-response-time
137
surrogate-key
profile_images profile_images/bucket/4 profile_images/621725343494356992
last-modified
Thu, 16 Jul 2015 16:55:27 GMT
server
ECS (mil/6CED)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
acdf322b59143dbb4c7f07ce77aa5ec578c9c4a84efc66739b9f5b69093b4333
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
E7SM48YL_normal.png
pbs.twimg.com/profile_images/1106588967879757825/
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1106588967879757825/E7SM48YL_normal.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE0) /
Resource Hash
5dbdd9c0d47a2091fb42590d6cf9cae11014473dc367672f87d1f453f34b2b48
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
age
410428
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
content-length
4923
x-response-time
115
surrogate-key
profile_images profile_images/bucket/7 profile_images/1106588967879757825
last-modified
Fri, 15 Mar 2019 16:10:24 GMT
server
ECS (mil/6CE0)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
66c72cc2d4902f6af9a74dd9e31f3cbac511488ff44ad40affb586a7c99b652d
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
GjV7JWMk_normal.jpg
pbs.twimg.com/profile_images/710735123876982784/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/710735123876982784/GjV7JWMk_normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE9) /
Resource Hash
e72bbdf7e3d8178ae3264b3c8c9ee995f8825c64f3555f098e702fa6fcab1c43
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
age
293685
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
content-length
2187
x-response-time
111
surrogate-key
profile_images profile_images/bucket/4 profile_images/710735123876982784
last-modified
Fri, 18 Mar 2016 07:48:33 GMT
server
ECS (mil/6CE9)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
5c2ebf9a73c39a74a6526636e9435640f047baa8c673f9db309e5361c8f30764
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
8svI-1EO_normal.jpg
pbs.twimg.com/profile_images/1197135188473475074/
2 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1197135188473475074/8svI-1EO_normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF8) /
Resource Hash
4794b419ca0e88c4548ac9436c2e787de43aa7a2faca1d71c95d70a3175608f3
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
age
111612
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ,edge;dur=1
content-length
2415
x-response-time
115
surrogate-key
profile_images profile_images/bucket/5 profile_images/1197135188473475074
last-modified
Wed, 20 Nov 2019 12:48:45 GMT
server
ECS (mil/6CF8)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ, VZ"
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
cc253db2cbaa395088999357feff539a34c6a8114e291d3bfa0b07db726e6a8d
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
qZfmGf68_normal.jpg
pbs.twimg.com/profile_images/1357672004631941120/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1357672004631941120/qZfmGf68_normal.jpg
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CED) /
Resource Hash
cfbc483053538ff935a68ddadb175cf0d9ee08de22d88aaecb47844c92e03dd8
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
age
36254
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=2
content-length
2187
x-response-time
115
surrogate-key
profile_images profile_images/bucket/2 profile_images/1357672004631941120
last-modified
Fri, 05 Feb 2021 12:44:44 GMT
server
ECS (mil/6CED)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
a313dae213de5208e4daa6fe4fed0bf77e91fcf08b22009e9fa20f29c9a6ee9b
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
ajax.php
www.bankinfosecurity.com/
5 B
388 B
XHR
General
Full URL
https://www.bankinfosecurity.com/ajax.php?json=notificationCookies&action=getNotifications
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1644763064.2986
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa

Request headers

Accept
*/*
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
X-Requested-With
XMLHttpRequest
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=95
Expires
Thu, 19 Nov 1981 08:52:00 GMT
lounge.7ab903feba7624935283ca4c7d8c7203.css
c.disquscdn.com/next/embed/styles/
0
26 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Tue, 07 Dec 2021 23:27:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
5843439
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
26065
x-xss-protection
1; mode=block
x-served-by
static-web-2
access-control-allow-origin
*
surrogate-key
next
last-modified
Tue, 07 Dec 2021 22:32:35 GMT
server
nginx
etag
"61afe103-65d1"
content-type
text/css; charset=utf-8
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
expires
Wed, 07 Dec 2022 23:27:07 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
Tt9Jo8UavZofxEjhg0nkEu6QtHRbEME-HWjZCT29Zmf0w1Lu7xPjSA==
x-cache-hits
0
common.bundle.f612a596225060ba8aa2aa903e502caf.js
c.disquscdn.com/next/embed/
0
93 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.f612a596225060ba8aa2aa903e502caf.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 26 Jan 2022 22:25:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1527108
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
94749
x-xss-protection
1; mode=block
x-served-by
static-web-2
access-control-allow-origin
*
surrogate-key
next
last-modified
Wed, 26 Jan 2022 21:59:14 GMT
server
nginx
etag
"61f1c432-1721d"
content-type
application/javascript; charset=utf-8
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
expires
Thu, 26 Jan 2023 22:25:58 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
ymXrVlfgXJr7srzBemyxMmaoRPW0Ks98depb2xfrW5r7v5eFtBwsAA==
x-cache-hits
0
lounge.bundle.f0599c2118b43a53a7ddae9c471ea77c.js
c.disquscdn.com/next/embed/
0
121 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.f0599c2118b43a53a7ddae9c471ea77c.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 26 Jan 2022 22:25:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1527108
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
122940
x-xss-protection
1; mode=block
x-served-by
static-web-2
access-control-allow-origin
*
surrogate-key
next
last-modified
Wed, 26 Jan 2022 21:59:14 GMT
server
nginx
etag
"61f1c432-1e03c"
content-type
application/javascript; charset=utf-8
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
expires
Thu, 26 Jan 2023 22:25:58 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
Jqcm-F4ZvWmolFCPsZixJ4DnytlY_yzVZ7PEJASIj8iZVEKrZoYnrA==
x-cache-hits
0
config.js
disqus.com/next/
0
15 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
X-Content-Type-Options
nosniff
Content-Type
application/javascript; charset=UTF-8
Server
nginx
Age
43
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
14600
X-XSS-Protection
1; mode=block
collect
www.google-analytics.com/j/
4 B
24 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j96&a=564765193&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&dr=http%3A%2F%2Flinks.ismgcorp.com%2F&ul=en-us&de=UTF-8&dt=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEABAAAAAC~&jid=1504138557&gjid=156987619&cid=1308156471.1644763066&tid=UA-212197-2&_gid=1754965902.1644763066&_r=1&_slc=1&z=537500135
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
aec60bc104db041b1512185839f18f52986df7e569e5445f740dd60f763fbca8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/j/
4 B
24 B
XHR
General
Full URL
https://www.google-analytics.com/j/collect?v=1&_v=j96&a=564765193&t=pageview&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&dr=http%3A%2F%2Flinks.ismgcorp.com%2F&ul=en-us&de=UTF-8&dt=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEDAAEABAAAAAC~&jid=866896643&gjid=185354030&cid=1308156471.1644763066&tid=UA-212197-36&_gid=1754965902.1644763066&_r=1&_slc=1&cd1=cat%3D483%26cat%3D327%26cat%3D574%26cat%3D409%26cat%3D40%26cat%3D467%26cat%3D444%26assetID%3D18467%26assetType%3Darticle%26key%3Dblockchain%26key%3Dcross-chain%20platform%26key%3Dmeter%26key%3Deth%26key%3Dbsc%26key%3D&z=817730203
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
aec60bc104db041b1512185839f18f52986df7e569e5445f740dd60f763fbca8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
55 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j96&a=564765193&t=event&_s=2&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&dr=http%3A%2F%2Flinks.ismgcorp.com%2F&ul=en-us&de=UTF-8&dt=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=dailyemailupdates&ea=impression&el=&_u=IEDAAEABAAAAAC~&jid=&gjid=&cid=1308156471.1644763066&tid=UA-212197-2&_gid=1754965902.1644763066&z=1800354229
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 12:14:19 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
8607
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
pubads_impl_2022020801.js
securepubads.g.doubleclick.net/gpt/
357 KB
119 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
sffe /
Resource Hash
8f4b70778aa21c1c093c6acbad70c70b2e69d4d22e47d9405ee137db16ca050b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:32:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
339
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
122244
x-xss-protection
0
last-modified
Tue, 08 Feb 2022 09:34:27 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Mon, 13 Feb 2023 14:32:07 GMT
ppub_config
securepubads.g.doubleclick.net/pagead/
43 B
695 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.bankinfosecurity.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
fe500099f1544f169516460cb4f49b3b58afa06253c943ebbd55405c7dac3fac
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private, max-age=3600, stale-while-revalidate=3600
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
59
x-xss-protection
0
expires
Sun, 13 Feb 2022 14:37:46 GMT
munchkin.js
munchkin.marketo.net/161/
11 KB
5 KB
Script
General
Full URL
https://munchkin.marketo.net/161/munchkin.js
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.234.67 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-234-67.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
c2aee78040b4ed46c2377e6825db12a9691a2eb584adf338e77312c8978d8537

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Last-Modified
Wed, 08 Sep 2021 00:38:21 GMT
Server
AkamaiNetStorage
ETag
"0e0eefac8daf874e8b1aa34aeb160c52:1631061501.737429"
Vary
Accept-Encoding
P3P
policyref="http://www.marketo.com/w3c/p3p.xml", CP="NOI DSP COR NID CURi OUR NOR"
Cache-Control
max-age=8640000
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
application/x-javascript
Content-Length
4681
Expires
Tue, 24 May 2022 14:37:46 GMT
collect
stats.g.doubleclick.net/j/
4 B
449 B
XHR
General
Full URL
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j96&tid=UA-212197-2&cid=1308156471.1644763066&jid=1504138557&gjid=156987619&_gid=1754965902.1644763066&_u=IEBAAEAAAAAAAC~&z=478993817
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c08::9c Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
84e01419bd81f32ac6df0f75f49c604fda9172000a3ae432b3c47b2a6a712d80
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Sun, 13 Feb 2022 14:37:46 GMT
content-type
text/plain
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
stats.g.doubleclick.net/j/
1 B
69 B
XHR
General
Full URL
https://stats.g.doubleclick.net/j/collect?t=dc&aip=1&_r=3&v=1&_v=j96&tid=UA-212197-36&cid=1308156471.1644763066&jid=866896643&gjid=185354030&_gid=1754965902.1644763066&_u=IEDAAEABAAAAAC~&z=616974904
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c08::9c Brussels, Belgium, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.bankinfosecurity.com/
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
date
Sun, 13 Feb 2022 14:37:46 GMT
content-type
text/plain
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1
expires
Fri, 01 Jan 1990 00:00:00 GMT
getuidj
secure.adnxs.com/
11 B
696 B
XHR
General
Full URL
https://secure.adnxs.com/getuidj
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
37.252.172.36 Frankfurt am Main, Germany, ASN29990 (ASN-APPNEX, US),
Reverse DNS
692.bm-nginx-loadbalancer.mgmt.fra1.adnexus.net
Software
nginx/1.17.9 /
Resource Hash
31b45c462302ac175bfa43f9e5591491db780ca094f6ecdd2907f25ad578448d
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 13 Feb 2022 14:37:46 GMT
X-Proxy-Origin
217.64.151.6; 217.64.151.6; 692.bm-nginx-loadbalancer.mgmt.fra1; adnxs.com
AN-X-Request-Uuid
e14f2dd2-783b-4486-929c-79c010e6ec49
Server
nginx/1.17.9
P3P
policyref="http://cdn.adnxs-simple.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.bankinfosecurity.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json; charset=utf-8
Content-Length
11
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
/
c.6sc.co/
47 B
380 B
XHR
General
Full URL
https://c.6sc.co/
Requested by
Host: j.6sc.co
URL: https://j.6sc.co/6si.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.233.140 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-233-140.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d1dd6b6cf8f3d8e639b731a212d81b800a2617cad9183d10ecceb7e3c3da4f33

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET,POST
Content-Type
text/plain
Access-Control-Allow-Origin
https://www.bankinfosecurity.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
*
Content-Length
47
2682.js
script.crazyegg.com/pages/scripts/0021/
5 KB
2 KB
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0021/2682.js
Requested by
Host: dnn506yrbagrg.cloudfront.net
URL: https://dnn506yrbagrg.cloudfront.net/pages/scripts/0021/2682.js?456878
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6f979bcc8023ac8e8f0ed842617288e5b6ff7370f30b54bd3b5193aef0adc4dc

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
cf-cache-status
HIT
age
437368
cf-polished
origSize=4899
cf-ray
6dcecbec0a4159bf-MXP
ce-version
11.1.376
last-modified
Tue, 08 Feb 2022 13:08:18 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
timing-allow-origin
*
cf-bgj
minify
js
www.googletagmanager.com/gtag/
167 KB
62 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=G-XJ8Q4QGGRH&l=dataLayer&cx=c
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:808::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
bfdf5803187e614b79b26c1a7d0453d3ef8c59ae891ed55a3dab1dba3e2d10b6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31536000; includeSubDomains
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
63086
x-xss-protection
0
expires
Sun, 13 Feb 2022 14:37:46 GMT
conversion_async.js
www.googleadservices.com/pagead/
39 KB
15 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion_async.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.186.162 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s08-in-f2.1e100.net
Software
cafe /
Resource Hash
083ec931e5517a4ab713afbe9561e72b9186cb54e21b8b1eface9caefb54a966
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14879
x-xss-protection
0
server
cafe
etag
17635014576153706337
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Sun, 13 Feb 2022 14:37:46 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
774 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=null&session=6f685451-d3ec-4c5e-8034-6f3ed5c4d5a9&event=a_pageload&q=%7B%22pageLoadTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A46%20GMT%22%7D&isIframe=false&m=%7B%22description%22%3A%22Meter%2C%20a%20blockchain%20infrastructure%20company%20that%20provides%20multi-chain%20bridging%20and%20allows%20users%20to%20trade%20multiple%20cryptocurrencies%20across%20Ethereum%20and%20other%20public%22%2C%22keywords%22%3A%22Blockchain%2C%20Cross-chain%20platform%2C%20Meter%2C%20Eth%2C%20BSC%22%2C%22title%22%3A%22%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited%22%7D&cb=&r=http%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&pageViewId=a259b793-94db-439c-840f-e847a436535d&an_uid=0
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.233.140 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-233-140.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
X-Content-Type-Options
nosniff
Connection
keep-alive
Content-Length
43
Pragma
no-cache
Last-Modified
Sat, 05 Jun 2021 07:56:05 GMT
Server
nginx/1.14.0 (Ubuntu)
ETag
"60bb2e15-2b"
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
Cache-Control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 19 Apr 2000 11:43:00 GMT
utsync.ashx
ml314.com/
62 B
572 B
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=57819&ct=js&pi=&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&pv=1644763066084_8lbcqn33e&bl=en-us&cb=3575717&return=&ht=&d=&dc=&si=1644763066084_8lbcqn33e&cid=&s=1600x1200&rp=http%3A%2F%2Flinks.ismgcorp.com%2F
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1312022
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.208.138.90 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-208-138-90.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
5a1ba6ff6db12f791bbbfc4da3cb389e06f0cd53eede09ef3eb3ceb074089ef1

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 13 Feb 2022 14:37:45 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
147
Expires
0
ud.ashx
in.ml314.com/
20 B
482 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=1312022
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1312022
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.150.209 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-72-150-209.compute-1.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public
Connection
keep-alive
Content-Length
138
Expires
Mon, 14 Feb 2022 14:37:46 GMT
ga-audiences
www.google.com/ads/
42 B
501 B
Image
General
Full URL
https://www.google.com/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j96&tid=UA-212197-2&cid=1308156471.1644763066&jid=1504138557&_u=IEBAAEAAAAAAAC~&z=777310839
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
42 B
501 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?t=sr&aip=1&_r=4&slf_rd=1&v=1&_v=j96&tid=UA-212197-2&cid=1308156471.1644763066&jid=1504138557&_u=IEBAAEAAAAAAAC~&z=777310839
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
disqus.com/embed/comments/ Frame 7B1C
6 KB
4 KB
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
9d5960af14d1b866285235d77e11643e97f1592927259c88b511ce0a57416eaa
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

Connection
keep-alive
Content-Length
2768
Server
nginx
Content-Type
text/html; charset=utf-8
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ https://apis.google.com https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ 'unsafe-inline' https://com-disqus.netmng.com:* https://www.google.com/recaptcha/ https://cf.ignitionone.com:* https://disqus.com
Last-Modified
Sat, 12 Feb 2022 16:13:49 GMT
ETag
W/"lounge:view:9009490302.7a1aa29d37979eebadc16bbd0a3b5f5c.2"
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Referrer-Policy
no-referrer-when-downgrade
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Encoding
gzip
Date
Sun, 13 Feb 2022 14:37:46 GMT
Age
0
Vary
Accept-Encoding
Cross-Origin-Resource-Policy
cross-origin
Strict-Transport-Security
max-age=300; includeSubdomains
widget_iframe.4e067713e19d4fff483536ddc4df18b9.html
platform.twitter.com/widgets/ Frame B02D
319 KB
104 KB
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.4e067713e19d4fff483536ddc4df18b9.html?origin=https%3A%2F%2Fwww.bankinfosecurity.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF0) /
Resource Hash
c6d03b7a5561687268e57b13d9d4a6a4c71ee570ea74718040ce9227676e3e5e

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
415739
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Sun, 13 Feb 2022 14:37:46 GMT
Etag
"8321d7cf58d70200c1423dfa0bca40f6+gzip"
Last-Modified
Tue, 01 Feb 2022 20:00:09 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (mil/6CF0)
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Vary
Accept-Encoding
X-Cache
HIT
x-tw-cdn
VZ
Content-Length
105433
collect
www.google-analytics.com/g/
0
17 B
Ping
General
Full URL
https://www.google-analytics.com/g/collect?v=2&tid=G-XJ8Q4QGGRH&gtm=2oe290&_p=564765193&sr=1600x1200&ul=en-us&cid=1308156471.1644763066&_s=1&dl=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&dr=http%3A%2F%2Flinks.ismgcorp.com%2F&dt=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&sid=1644763066&sct=1&seg=0&en=page_view&_fv=1&_ss=1&ep.asset_type=article18467
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=G-XJ8Q4QGGRH&l=dataLayer&cx=c
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
server
Golfe2
content-type
text/plain
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
integrator.js
adservice.google.de/adsid/
107 B
792 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.bankinfosecurity.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:831::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3="googleads.g.doubleclick.net:443"; ma=2592000,h3=":443"; ma=2592000,h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
107 B
549 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.bankinfosecurity.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
343 KB
32 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?pvsid=3124794741368768&correlator=3690919001306488&output=ldjh&eid=31061815%2C31064540%2C44758228&output=ldjh&gdfp_req=1&vrg=2022020801&ptt=17&impl=fifs&sc=1&sfv=1-0-38&ecs=20220213&iu_parts=4444691%2CBIS_TOP_728x90%2CBIS_MID_RB_300x250%2CBIS_MID_RB_2_300x250%2CBIS_MID_RB_3_300x250%2CBIS_MID_RB_300x600%2CBIS_MID_L_180x150%2CBIS_MID_R_180x150%2CBIS_MID2_L_180x150%2CBIS_MID2_R_180x150%2CBIS_TEXT_1%2CBIS_TEXT_2%2CBIS_BOTTOM_728x90%2CBIS_MID_728x90%2CBIS_Interstitial%2CBIS_TOP_320x50%2CBIS_BOTTOM_320x50%2CBIS_MID_320x50%2CBIS_CAT_LOGO&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3%2C%2F0%2F4%2C%2F0%2F5%2C%2F0%2F6%2C%2F0%2F7%2C%2F0%2F8%2C%2F0%2F9%2C%2F0%2F10%2C%2F0%2F11%2C%2F0%2F12%2C%2F0%2F13%2C%2F0%2F14%2C%2F0%2F15%2C%2F0%2F16%2C%2F0%2F17%2C%2F0%2F18&prev_iu_szs=728x90%2C300x250%2C300x250%2C300x250%2C300x600%2C180x150%2C180x150%2C180x150%2C180x150%2C280x70%2C280x70%2C728x90%2C728x90%2C640x480%2C320x50%2C320x50%2C320x50%2C216x54&cust_params=category%3D%255B483%252C327%252C574%252C409%252C40%252C467%252C444%255D%26gated%3Dn&cookie_enabled=1&bc=31&abxe=1&dt=1644763066216&lmt=1644763066&dlt=1644763064442&idt=1736&frm=20&biw=1600&bih=1200&oid=2&adxs=615%2C1025%2C1025%2C-9%2C1010%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C15%2C-9%2C-12245933%2C-12245933%2C-12245933%2C-9%2C-12245933&adys=71%2C584%2C2893%2C-9%2C1921%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C5390%2C-9%2C-12245933%2C-12245933%2C-12245933%2C-9%2C-12245933&adks=606436291%2C592806581%2C4037182823%2C700692632%2C585369811%2C2214922354%2C1142555781%2C3687202745%2C1536889060%2C1397140349%2C824892936%2C1158310571%2C1554130010%2C3082656849%2C1657167512%2C3519266287%2C3120678580%2C3463778582&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd%7Ce%7Cf%7Cg%7Ch%7Ci&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&dmc=8&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&ref=http%3A%2F%2Flinks.ismgcorp.com%2F&vis=1&scr_x=0&scr_y=0&psz=800x1%7C360x0%7C360x0%7C0x-1%7C390x0%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1600x1%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C780x5031&msz=770x0%7C360x1%7C360x1%7C0x-1%7C390x1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C1570x0%7C0x-1%7C0x-1%7C0x0%7C0x0%7C0x-1%7C236x36&ga_vid=1308156471.1644763066&ga_sid=1644763066&ga_hid=564765193&ga_fc=true&fws=0%2C0%2C0%2C2%2C0%2C2%2C2%2C2%2C2%2C2%2C2%2C0%2C2%2C644%2C128%2C128%2C2%2C128&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C1600%2C0%2C0%2C0%2C0&btvi=0%7C0%7C1%7C-1%7C2%7C-1%7C-1%7C-1%7C-1%7C-1%7C-1%7C3%7C-1%7C-1%7C-1%7C-1%7C-1%7C-1&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIixbXV0.&nvt=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
6709610471d3db0ee6b4f2914e15f45a3a9d4583329325e8dc7892008b9cd224
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
32456
x-xss-protection
0
google-lineitem-id
5918389174,5918389174,5918389174,5853279584,5918389174,-2,-2,-2,-2,-2,-2,5918389174,5918389174,5897206021,-2,-2,-2,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138380790686,138381308680,138381308614,138374265827,138381308665,-2,-2,-2,-2,-2,-2,138381308587,138380790845,138378875553,-2,-2,-2,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.bankinfosecurity.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
6834b78e8a2b9d8c124bd62b8aeb9bd1.safeframe.googlesyndication.com/safeframe/1-0-38/html/ Frame C4B8
6 KB
4 KB
Document
General
Full URL
https://6834b78e8a2b9d8c124bd62b8aeb9bd1.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
timing-allow-origin
*
content-length
3108
date
Sun, 13 Feb 2022 14:37:46 GMT
expires
Mon, 13 Feb 2023 14:37:46 GMT
cache-control
public, immutable, max-age=31536000
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
311 B
Ping
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1644763066244&_mchCn=&_mchId=051-ZXI-237&_mchTk=_mch-bankinfosecurity.com-1644763066243-47824&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&_mchHo=www.bankinfosecurity.com&_mchPo=&_mchRu=%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&_mchPc=https%3A&_mchVr=161&_mchEcid=&_mchHa=&_mchRe=http%3A%2F%2Flinks.ismgcorp.com%2F&_mchQp=rf%3D2022-02-12__ACQ_DBT__Slot5_ART18467__-__mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/161/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.147.68 , United States, ASN15224 (OMNITURE, US),
Reverse DNS
Software
nginx /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
Content-Type
text/plain; charset=UTF-8
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Request-Id
f4fc296d-8769-45f4-8e86-c4945ae93dd6
visitWebPage
051-zxi-237.mktoresp.com/webevents/
2 B
311 B
Ping
General
Full URL
https://051-zxi-237.mktoresp.com/webevents/visitWebPage?_mchNc=1644763066244&_mchRu=%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26amp%3Bmkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&_mchQp=cat%3D483%26cat%3D327%26cat%3D574%26cat%3D409%26cat%3D40%26cat%3D467%26cat%3D444%26assetID%3D18467%26assetType%3Darticle%26key%3Dblockchain%26key%3Dcross-chain%20platform%26key%3Dmeter%26key%3Deth%26key%3Dbsc%26key%3D&_mchId=051-ZXI-237&_mchTk=_mch-bankinfosecurity.com-1644763066243-47824&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&_mchHo=www.bankinfosecurity.com&_mchPo=&_mchPc=https%3A&_mchVr=161&_mchEcid=&_mchRe=http%3A%2F%2Flinks.ismgcorp.com%2F
Requested by
Host: munchkin.marketo.net
URL: https://munchkin.marketo.net/161/munchkin.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.28.147.68 , United States, ASN15224 (OMNITURE, US),
Reverse DNS
Software
nginx /
Resource Hash
565339bc4d33d72817b583024112eb7f5cdf3e5eef0252d6ec1b9c9a94e12bb3

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Server
nginx
Transfer-Encoding
chunked
Content-Type
text/plain; charset=UTF-8
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Request-Id
02ab64b8-15fc-4c24-9441-c2eaba11fa12
settings
syndication.twitter.com/ Frame B02D
232 B
447 B
Fetch
General
Full URL
https://syndication.twitter.com/settings?session_id=6828223e1dd061803109a2c3727c7c2538fb4fee
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets/widget_iframe.4e067713e19d4fff483536ddc4df18b9.html?origin=https%3A%2F%2Fwww.bankinfosecurity.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.72 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
726906ee6ce6dfe1b6e35ddad151196c50277e31520de30e916e9cd9affc0ef3
Security Headers
Name Value
Strict-Transport-Security max-age=631138519

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-response-time
117
date
Sun, 13 Feb 2022 14:37:45 GMT
content-encoding
gzip
last-modified
Sun, 13 Feb 2022 14:37:46 GMT
server
tsa_o
vary
Origin
strict-transport-security
max-age=631138519
content-type
application/json; charset=utf-8
access-control-allow-origin
https://platform.twitter.com
cache-control
must-revalidate, max-age=600
access-control-allow-credentials
true
x-connection-hash
ac906bc89b00a2bba54f952bdeb4449414c256567ed48a1e8107c529a04033f4
content-length
166
collect
px4.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1644763066283&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3F...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D749%252C2330930%26time%3D1644763066283%26url%3Dhttps%253A%252F%252Fwww.bankinfose...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1644763066283&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3F...
  • https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1644763066283&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3...
0
155 B
Image
General
Full URL
https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1644763066283&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&liSync=true&e_ipv6=AQKId3mKN6ye_AAAAX7zhLHKwJb2BtAAn9FD77oxjLNvRZq7-CzGwCOUJqmDDkIGIWz29VG3xg22QuB2h1UUe558whq11w
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Server
108.174.10.14 , United States, ASN14413 (LINKEDIN, US),
Reverse DNS
108-174-10-14.fwd.linkedin.com
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
server
Play
linkedin-action
1
x-li-fabric
prod-lor1
x-li-proto
http/2
x-li-pop
prod-lva1
content-type
application/javascript
content-length
0
x-li-uuid
J7Pzlktf0xZgmrzm7yoAAA==

Redirect headers

date
Sun, 13 Feb 2022 14:37:46 GMT
x-li-pop
afd-prod-lor1-x
x-msedge-ref
Ref A: 8B0BCE451A7842E8A588113CA6D66AB8 Ref B: FRAEDGE0918 Ref C: 2022-02-13T14:37:46Z
linkedin-action
1
x-cache
CONFIG_NOCACHE
x-li-fabric
prod-lor1
location
https://px4.ads.linkedin.com/collect?v=2&fmt=js&pid=749%2C2330930&time=1644763066283&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&liSync=true&e_ipv6=AQKId3mKN6ye_AAAAX7zhLHKwJb2BtAAn9FD77oxjLNvRZq7-CzGwCOUJqmDDkIGIWz29VG3xg22QuB2h1UUe558whq11w
x-li-proto
http/2
content-length
0
x-li-uuid
AAXX5z5WPGVWA8LEI0zmoQ==
/
googleads.g.doubleclick.net/pagead/viewthroughconversion/969635388/
3 KB
2 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/969635388/?random=1644763066285&cv=9&fst=1644763066285&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=3&u_nmime=4&gtm=2wg290&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&ref=http%3A%2F%2Flinks.ismgcorp.com%2F&tiba=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&hn=www.googleadservices.com&async=1&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion_async.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
fc73a0a9c680505b643cc4ea93ba7a8279bea17fb2f3e9ca3739d81cc0b2511e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1282
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
2682.json
script.crazyegg.com/pages/data-scripts/0021/
752 B
604 B
XHR
General
Full URL
https://script.crazyegg.com/pages/data-scripts/0021/2682.json?t=1
Requested by
Host: script.crazyegg.com
URL: https://script.crazyegg.com/pages/scripts/0021/2682.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3ec422caf03c1066f60a0fa5ec1c4ad8443370023c7e487c7d97537775d52ab5

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
cf-cache-status
HIT
age
436769
ce-version
11.1.376
content-length
258
timing-allow-origin
*
last-modified
Tue, 08 Feb 2022 13:18:17 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CE-Version
cache-control
public, max-age=300, s-maxage=1209600
accept-ranges
bytes
cf-ray
6dcecbecef070f62-MXP
/
www.google.com/pagead/1p-user-list/969635388/
42 B
154 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/969635388/?random=1644763066285&cv=9&fst=1644760800000&num=1&bg=ffffff&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=3&u_nmime=4&gtm=2wg290&sendb=1&frm=0&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&ref=http%3A%2F%2Flinks.ismgcorp.com%2F&tiba=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&async=1&fmt=3&is_vtc=1&random=3887321517&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/969635388/
42 B
154 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/969635388/?random=1644763066285&cv=9&fst=1644760800000&num=1&bg=ffffff&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=0&u_java=false&u_nplug=3&u_nmime=4&gtm=2wg290&sendb=1&frm=0&url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&ref=http%3A%2F%2Flinks.ismgcorp.com%2F&tiba=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&async=1&fmt=3&is_vtc=1&random=3887321517&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, no-store, must-revalidate
cross-origin-resource-policy
cross-origin
content-security-policy
script-src 'none'; object-src 'none'
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame BB82
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstKYdMff8HIiZVf9U0eDw8FIzu63fsu4ZNW6wRs31a3fn4XnWUUpg-_pXESza4NcBZRLkWzyOIzftGqH8EwXR-VHuL-4nN0hIQgX-Z3owfBaklZLjsdUC-vn7TizE6BFuhElrQniM3Rjb-yGC1epjOKJdSFIdP-44K1tEJIgkN7gJqbo6RiTCKpAd9Aj5Xq3WQuGk6Gf4nuv_7lVWu0riS4iy3BerrHUMjYmJnC1ZDkmDxt3nRuJ-HGu9zkxcmGRTPE1Sl-EMOo78rz1oN6trTHeO6dd8onEd9ikZnMibrKrrOTyC8o33oo2sGnIiCljWle9A&sai=AMfl-YR8GFdJ2nsFMNgSjfGmD1xpXLIGDAbq-76dqIs0rKvzoEMFFjcGpJybQM6vD48YsLkBgKKWeb2K7NzXQCXFiPiwCKQumRU3d10FpOlLlWJrAU5GBCWxruHlmPIk9oCs&sig=Cg0ArKJSzKZtZ6UclDkjEAE&uach_m=[UACH]&adurl=
Requested by
Host: links.ismgcorp.com
URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
abg_lite_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/ Frame BB82
19 KB
8 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/abg_lite_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3a22b29e11f6ad3ed458e71525b4edfaf0b9ab4cd962ae9a239b9509c106c826
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:31:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
374
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7817
x-xss-protection
0
server
cafe
etag
7051432691878289762
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:31:32 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/ Frame BB82
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
144822a1b5316a4e9a06ffbf5802b8c1cbbc0a3f230d81b98f362f7fe4c128c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:36:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
90
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1205
x-xss-protection
0
server
cafe
etag
18074202747124231361
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:36:16 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame BB82
124 KB
38 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
096ebe5196b95f66c1c0b9f3dcea9e6e3f40f2d55cd5933af5e4942adb232593
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38562
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1644410386637351"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Sun, 13 Feb 2022 14:37:46 GMT
5136639709638783649
tpc.googlesyndication.com/simgad/ Frame BB82
35 KB
35 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/5136639709638783649
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a8368833f64e026a193d73924a070d3c8b28f2fe5999bfa7ff4a977a4790c736
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Thu, 10 Feb 2022 20:38:15 GMT
x-content-type-options
nosniff
age
237571
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35966
x-xss-protection
0
last-modified
Thu, 10 Feb 2022 19:17:52 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Fri, 10 Feb 2023 20:38:15 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 65EA
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuWTtIilj9sbkG5SLWBxuncCFak02aGwRTc2bXaVhCQ8MPJixjJA6nnGEeEE7lJEwKV1rxGWA71hdUjRyWUOjLC9VWJIz3bSCdDeIi3llrcgw6H-pcQ4opT_gdIqnaeyj4KlAb4p6bmJoNdlO4M_dHtWv8ypNvdtUVzXJTh46fA7bE8XaRUJ3uvOfKCWRaNu2_74JRdgkUnSr1NrW38F3NFEv2lCju2RC4z1WU5QI2Wi247utv4r1F7rxJjo7r5kF7wbce6_G1XCjqbCMDLWYIk4XdbNh6eRqN2rkUVOloS3kx4rVamOtnQKkcc5DacAXaLWHcy4M8&sai=AMfl-YRJ5ytgvmjafukDE7KQygqBc9_5SFhcsB8GjWM5mr_uVUyVtV63ZMeCiyV7GiZGGD9OC0NJnq2ALAr9_J9tQNB0cLwj5rgkmBD7_7tAY-N46nBIfKTb1k8uUGvcQ3Pe&sig=Cg0ArKJSzEfFWc4xcyguEAE&uach_m=[UACH]&adurl=
Requested by
Host: links.ismgcorp.com
URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
abg_lite_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/ Frame 65EA
19 KB
8 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/abg_lite_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3a22b29e11f6ad3ed458e71525b4edfaf0b9ab4cd962ae9a239b9509c106c826
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:31:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
374
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7817
x-xss-protection
0
server
cafe
etag
7051432691878289762
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:31:32 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/ Frame 65EA
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
144822a1b5316a4e9a06ffbf5802b8c1cbbc0a3f230d81b98f362f7fe4c128c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:36:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
90
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1205
x-xss-protection
0
server
cafe
etag
18074202747124231361
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:36:16 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 65EA
124 KB
38 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
096ebe5196b95f66c1c0b9f3dcea9e6e3f40f2d55cd5933af5e4942adb232593
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38562
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1644410386637351"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Sun, 13 Feb 2022 14:37:46 GMT
l
www.google.com/ads/measurement/ Frame 65EA
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaSgaEh4vrWfqjL64t6CkehhQK_mRShqVFIj2V4N9NEbxXhzlxr_6Pcg5RJvXZWWqyfGJ6rvvkaGUTLO753SODwJhqBhZg
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

10123874606765175382
tpc.googlesyndication.com/simgad/ Frame 65EA
35 KB
36 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10123874606765175382
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0e8611ed9cfe123a5dbc7cae5a3a8666164dee727d93a051f9d1e12d753992cf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Thu, 10 Feb 2022 20:38:16 GMT
x-content-type-options
nosniff
age
237570
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
36340
x-xss-protection
0
last-modified
Thu, 10 Feb 2022 19:18:41 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Fri, 10 Feb 2023 20:38:16 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 53D0
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv0hhH64Y3HHicnK0xx7eY3SjEJ4uIvQJ-cdCxxeXv2f0lmjmBnK94Mm-VZ--lagyz_McgG59kc7B_hCzFJGzwB-IGRiU4z9znlhNQ2hpHmVUORFtWrCKBRr13ptKU_A9d4EV0AM4IB9kfmj7Co1xLkgVC64BTNhwZxIEZ8-yrhhDRiQodnLNum1m2Qmje17yoC7uTzmqldqtC9k1MoZP6VgbqUFfqCnPhB7hFzqvxyt74QioHlgec3-CvTbk6WILGOrPpG3gigr8f0Gy63uQFkLajSPNaBFnVeuEg3tHCs6amL08aIMKIzVAKYimZlHCcGQ8PzuaMlRg&sai=AMfl-YR9xtUFFCBk01lbccjQ17PpCsMMQdFB5OFFPdfbOtJpYvc3bfarHFznjRhsH_xQpnzVrbCzo5r10fVyBnlnkHsr5Pdw7qpGioT99uFEkyu68EEf2yPuzmcbYy5sPWS7&sig=Cg0ArKJSzD4Ia3ZhJL3GEAE&uach_m=[UACH]&adurl=
Requested by
Host: links.ismgcorp.com
URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
10123874606765175382
tpc.googlesyndication.com/simgad/ Frame 53D0
35 KB
36 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10123874606765175382
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0e8611ed9cfe123a5dbc7cae5a3a8666164dee727d93a051f9d1e12d753992cf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Thu, 10 Feb 2022 20:38:16 GMT
x-content-type-options
nosniff
age
237570
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
36340
x-xss-protection
0
last-modified
Thu, 10 Feb 2022 19:18:41 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Fri, 10 Feb 2023 20:38:16 GMT
abg_lite_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/ Frame 53D0
19 KB
8 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/abg_lite_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3a22b29e11f6ad3ed458e71525b4edfaf0b9ab4cd962ae9a239b9509c106c826
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:31:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
374
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7817
x-xss-protection
0
server
cafe
etag
7051432691878289762
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:31:32 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/ Frame 53D0
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
144822a1b5316a4e9a06ffbf5802b8c1cbbc0a3f230d81b98f362f7fe4c128c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:36:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
90
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1205
x-xss-protection
0
server
cafe
etag
18074202747124231361
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:36:16 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 53D0
124 KB
38 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
096ebe5196b95f66c1c0b9f3dcea9e6e3f40f2d55cd5933af5e4942adb232593
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38562
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1644410386637351"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Sun, 13 Feb 2022 14:37:46 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 0D36
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuCf23f7PSOPf3ewoLQJ6tUPkEt6hB3dHPMmjKzh9dZKgQjM0cX-0nPzTUmHRNA_ElPWpXdnYWT6v7F3mmHWn2IUckyZB3q6f8S5Hly7d0aPQFOcMtllye89igR7RwUs6M-hfvdQk_iRnbQ9RKJ7i7m4vg_npMgKyK0pAK29jfmHFrKRWu1fdRMWeXtM7kG2AtK0bis_OTnITch5A2AD56p9--Ps309KaWq0Z5grEIpEB1Ee4boIWQ1x6_Ei81ImqK1Rf1mb5qXdrNRJ61NE97fvgc6N4DucxqUBCZjpCBH5da3305N2ADJRKsF0FOkbyoJzpjCbsk&sai=AMfl-YTkksCIQqHj5pt2motj2I4NLAuBCSianQsiX2FCDLcU7veasWFX9ao_qhm7Ck5uRTnrbAncQs6V1vlxyOzqZYus6S2rnNFKfXBhwdZPMYqzxwZaf2m1eNAtCL7_qa2y&sig=Cg0ArKJSzDyGVUsE4WXBEAE&uach_m=[UACH]&adurl=
Requested by
Host: links.ismgcorp.com
URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
abg_lite_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/ Frame 0D36
19 KB
8 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/abg_lite_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3a22b29e11f6ad3ed458e71525b4edfaf0b9ab4cd962ae9a239b9509c106c826
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:31:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
374
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7817
x-xss-protection
0
server
cafe
etag
7051432691878289762
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:31:32 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/ Frame 0D36
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
144822a1b5316a4e9a06ffbf5802b8c1cbbc0a3f230d81b98f362f7fe4c128c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:36:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
90
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1205
x-xss-protection
0
server
cafe
etag
18074202747124231361
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:36:16 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 0D36
124 KB
38 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
096ebe5196b95f66c1c0b9f3dcea9e6e3f40f2d55cd5933af5e4942adb232593
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38562
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1644410386637351"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Sun, 13 Feb 2022 14:37:46 GMT
l
www.google.com/ads/measurement/ Frame 0D36
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaR6XtWSfxXy7TigS4n-2Ywu6X_csk3m1W9Pyu0zkYtonDSt9omxzsubc4DbWFFLZzeRPlV70KbLGj6MCXDdGoAjNcMkmQ
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

3499658867052175115
tpc.googlesyndication.com/simgad/ Frame 0D36
61 KB
61 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/3499658867052175115
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f371095f02c1f1f0658d10b10348d2fb1a32b2248763bd5650b30d7fa357c970
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Thu, 10 Feb 2022 20:38:17 GMT
x-content-type-options
nosniff
age
237569
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
62027
x-xss-protection
0
last-modified
Thu, 10 Feb 2022 19:18:55 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Fri, 10 Feb 2023 20:38:17 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 68BD
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstBuRSeq4zps1M2ifzkKRDqZjz_v_nwWHJ5GIars-6LIt8swo8foJeNZicjyu9Pzr82QLlnMyrP6aV8DGEYxlU--1IGVXYzq6vtDOzHqYBMyDcns2FFPgDYSeqLb_3FIg_ZKD1PRp7KfpStr6QrHSgueVfAZ1aFC8SEph4tYuxe707v_aTn86VuAFdkaRK31dlYv_WcNMBukFXcEbNdGtx-TpkFUMhgi4l0ajgVaCwl4eW88QfSWjQ03nv6TQ45cskFLpkXcK-0Q7iq7Yyy6qrMy3dSKffQleEzhBme4Uql10byj1eXQysG4mvqoNqPGrjh42pnCQ&sai=AMfl-YRPmtCpGJg0BFPWcdh3lDeglIYsB7kmlR08zJoXLZevK4ZQEE7gL-Zpr08029qI4cRwCwLkDmV1NAlGR7evpnG7qXPh65XZLIyZgqHG_2XfqskXwPbpEi1tXKRdn57T&sig=Cg0ArKJSzGc1VJAqOMnoEAE&uach_m=[UACH]&adurl=
Requested by
Host: links.ismgcorp.com
URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
5136639709638783649
tpc.googlesyndication.com/simgad/ Frame 68BD
35 KB
35 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/5136639709638783649
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a8368833f64e026a193d73924a070d3c8b28f2fe5999bfa7ff4a977a4790c736
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Thu, 10 Feb 2022 20:38:15 GMT
x-content-type-options
nosniff
age
237571
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35966
x-xss-protection
0
last-modified
Thu, 10 Feb 2022 19:17:52 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Fri, 10 Feb 2023 20:38:15 GMT
abg_lite_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/ Frame 68BD
19 KB
8 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/abg_lite_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3a22b29e11f6ad3ed458e71525b4edfaf0b9ab4cd962ae9a239b9509c106c826
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:31:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
374
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7817
x-xss-protection
0
server
cafe
etag
7051432691878289762
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:31:32 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/ Frame 68BD
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
144822a1b5316a4e9a06ffbf5802b8c1cbbc0a3f230d81b98f362f7fe4c128c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:36:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
90
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1205
x-xss-protection
0
server
cafe
etag
18074202747124231361
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:36:16 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 68BD
124 KB
38 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
096ebe5196b95f66c1c0b9f3dcea9e6e3f40f2d55cd5933af5e4942adb232593
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38562
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1644410386637351"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Sun, 13 Feb 2022 14:37:46 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 1F3C
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssGGiwZjFCobVj8OePhJA58LIsA0JbSkxfitvTPbHSCGYgk_eTkr9Kwe2b93OkXQGP8XalzLKB0Wc-JhXl_nIzYWs2r2L57fmigpsjWl5-idh2-I0BDlQIYgoaxSSW6wAeyIrIYTgdJMub_3ySIMVczn1sSo-6GvjHt0FUZ2FwBNIMJmYlO2_MmcUKwyRnvBRMgh1RQcHBchNP8uklJQp6Pq9J4P5EQA1wBLZLVDU-KgOHX1FuDtrWI6dBWiHrJu5dX2kwfteRoJsSA6do2nXBUrXOlbVCbltQFubDBtEPIS1VsStscWcij0wdy7QX3OcOQsiHQ&sai=AMfl-YQzG8bk0SSYXUgEnGtomjA5lF82PfNz_yXQlf1cJ-Zbp0FaTqzkvLuiuKbRJjruRwuulBmdsZaUrzJ5oPUu6X1OMwn58O78I59kqw8NQuDheyxusl81BlaVmykuja2-&sig=Cg0ArKJSzA2o8bPqsHhbEAE&uach_m=[UACH]&adurl=
Requested by
Host: links.ismgcorp.com
URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGCjbIUwoInAYGnOigc10AGdI5-WSBE2XReK7XrEDiMk4ro_2VAgXU6Gag2BtLy1m2qdideGXc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
abg_lite_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/ Frame 1F3C
19 KB
8 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/abg_lite_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
3a22b29e11f6ad3ed458e71525b4edfaf0b9ab4cd962ae9a239b9509c106c826
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:31:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
374
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7817
x-xss-protection
0
server
cafe
etag
7051432691878289762
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:31:32 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/ Frame 1F3C
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220209/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
144822a1b5316a4e9a06ffbf5802b8c1cbbc0a3f230d81b98f362f7fe4c128c8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:36:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
90
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1205
x-xss-protection
0
server
cafe
etag
18074202747124231361
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Sun, 27 Feb 2022 14:36:16 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 1F3C
124 KB
38 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
096ebe5196b95f66c1c0b9f3dcea9e6e3f40f2d55cd5933af5e4942adb232593
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
38562
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1644410386637351"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Sun, 13 Feb 2022 14:37:46 GMT
l
www.google.com/ads/measurement/ Frame 1F3C
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaQDc-Zu2ajvNfiHiuEkPWC7zNLQLkWGBoMMWA7CPPmIvyytnvffV0rLg-7AhAHzHIAwmrfGA18zYrQ8rJr8j_EGvIVE0A
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

18197735830566851623
tpc.googlesyndication.com/simgad/ Frame 1F3C
172 KB
172 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/18197735830566851623
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
49a6f6bf5d69ee59a90b08a618964a08b1abf52c184f51034b76ecb3c4942ab7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 09 Feb 2022 10:36:02 GMT
x-content-type-options
nosniff
age
360104
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
175948
x-xss-protection
0
last-modified
Mon, 24 Jan 2022 17:15:33 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Thu, 09 Feb 2023 10:36:02 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame BB82
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstt1XEfHYtePCF_nmi4QWs5szGYrAqUj9zll_uduFVVCaOAQlXAqf1tweSSHFnuqDo0S3B1LB1fRZ3zGmCvMsIbhgG_4KpiFZdBbaomRity-L0sA7cjZUF1IeVSSk9S3KWxQ4qddxa5QADsQO_68KzP2-AjzFAeYyD6D7OOKnZBmL8dO3UK3I1tclgZt6bJr8Vd5abwOyGpt3dw2wvQxIk-fhuqKdYyongLqdQAOMvojw4q2o0nwiZhAXYn8ZNuOSH-8ivIsbC7KD55JZXddKsIb-JqN3Zshf6LNAeS3RC-giTx26DzV7qqgJIpa0x8R2REvFv5&sai=AMfl-YRSyFplX5tKUG8cCMANWc6lKwZ6ZqUNqGQSmaDTJ8Gr3b6xMeaa4TVOrhFFt-l1t2mss1Fo9FJrk6A6oz7o75nXN883uaxdWNS8fLU5D2SnQHrxc7BEGGKnxISPRUAR&sig=Cg0ArKJSzOHzUhZwmVclEAE&uach_m=[UACH]&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
truncated
/ Frame BB82
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
760e35907309c64b29266486d09d3539df4ae2a46407dca18516f14b02cd55d9

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Content-Type
image/png
horizon_tweet.b9ac0a13a4a1d52c80651179f4fe9b68.js
platform.twitter.com/js/
7 KB
3 KB
Script
General
Full URL
https://platform.twitter.com/js/horizon_tweet.b9ac0a13a4a1d52c80651179f4fe9b68.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE9) /
Resource Hash
f277cc840da33f2e4731e6b3e5403d7bdcaa299304aa61452deb63e297a8523b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415742
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
2473
x-tw-cdn
VZ
Last-Modified
Tue, 01 Feb 2022 19:59:50 GMT
Server
ECS (mil/6CE9)
Etag
"29cf2e2367fd80ea2a4908fe0d316028+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
view
securepubads.g.doubleclick.net/pcs/ Frame 65EA
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssGYlgXQUeJOULv5nruxDx9aHRCmhvfCDUJw4dSW5TnD_bC--VIo9YzL3SruqTfZyXkiZbaa6vzNr6sO-uVTxREWj2F81_5l_t8S1qj3Ha4zd3dU5tf2AtzgOZRaXj4sSAi8GfJzemsZk60ayaIrazVaA7FsNEpHYpJlM2WkOjtWDXkgCR4gmTKH4OS8hk7-2Xgu6Z2iRO1SuN8QiJ9Ratw4FmuJ2BbwjgfDz_J8MZ-xwaKXcd-bOSA-3Dzz1P_aVpCA_7ATGZ9AGbbasKhgGhnZUA-mX-sDmLZ0A31EiGWGFrMSiikclxQPnI-ITy7yX99ygvRwri3og&sai=AMfl-YRFtZjBEOvE3383hUpeKPovzMk2lBqEwMkMJWWf7KkdUfRbvsjotWG8T39SJLjjdLS_8TBbiBzXSlmQsUUfXmKncA73M7uD9pN2ucNBxEqc5_8Qb8Gwb998hP4ej6zY&sig=Cg0ArKJSzPrhA1MLe65OEAE&uach_m=[UACH]&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
truncated
/ Frame 65EA
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3a0fad61844cb8577ee2727b8230cd7291de92f78fbf7f63ad5d9b608962677d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 0D36
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssOig-tptb9dSJ8eQgb3SXOLZJnT61ZPWZIbyplSjLamcUXriMW3DTUw8tpnjr0o4JL8d0s9y8QVVEdkvoJRukvRXieAIg3PVb_vWFA3-ibrt0SBNHq9iuF8WUMvthOjeXb6151lXQvRaRspW1QJnOy7bXKbMnOCUyT4I_XXPbLci1UQiVc6TmSSYtHO3zP9CT2N-ADe061JYJzNwFy1Go6a9BxaX9HZm2YuEQ6ONC9dGAj7kI33z8qaQ4Lqa0yaqUloOVwoe1EsQScD2MWCzTZwHd1I7zmoPBrmu9GNPsaeubrraif1Tz7PtdKmCHBdhlRLSBKUZ8EQQ&sai=AMfl-YR_2-e63dOkiQyaOJKWBI6QjiAzOAqdOzpHjIc7T47PUYIjn9n6mjZYoW_ZkC80GxFA7LU3vcaFYv3m8H68wDsMk1-Wccup6sGNSmHH4h3zjsuqbEJVd_XkzejqFd47&sig=Cg0ArKJSzGNHfrj7Jq74EAE&uach_m=[UACH]&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
truncated
/ Frame 0D36
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f807dfc0747b6cde1bb339f28d35e635edb9f956b8213d8967baba00de55586d

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 53D0
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssUhVkg3iIwDTVQTQz6OjSBzC3cvdI6uuS_KsybvbTmCP6WoPrCNwyYKqMpB8WltCQoo4hS3ckFRVee_QP2_HoiP0yvKLqKyLIgq7w_M_itY5EigAHAgQmJMrbsO389hoPUrwoj2R4o6ijiVx2Cx8PZYgwHDnqRdh6YFGLohwLZ0kRaP0bObxf9AY70d0-aokL12uCD9BLECQ5lhe_xG1pr-S5JtbrsHgng3-xyYfkIA3J3xsxqnFDOq76h8n7YcAbw2NbIuCG21490NYtVRXtLru0UjpvkuCv8X3Nby51UZ7zmHGbVhYmfRDg70HDqo6aNchi0PHA8jnDA&sai=AMfl-YRG9BC5TvvT2-IfuHgGiqPrtGOOZaVcvhBMnvCqa_8CqGt4pzbcxlCfS6lbQa6DEmTuBkA1LluvCYAM0yCqEPbKYe_2VLgcT5wZNe1GZXhx_wABe-7S8Mfn5bIqNL2T&sig=Cg0ArKJSzE8JIT-0xw83EAE&uach_m=[UACH]&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
truncated
/ Frame 53D0
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ceacf3861341328e92a7b4ffed87b64a447ea1c2b265061ebb800c566ebe797

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 1F3C
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuEbxAEuGzyr9bVYDqy1SyM5abEVEs2MOmEuEEMuoXjQlXf2awcGsl4dMEFr66mpY6UcLwsV7fashOjmFASKrAPXiIXi1z_4fGVO2o6fd5GlwXBgegstf1viLbNkNvdLYa3tfrTKLEXj__GLAnY2Fb_8tYctWsNyCPoDgdt-de8D2YutMhcx4t_Ms2focks8_UlOvVhky4Z52z6hVVep0kX4aCUE5aL-aELUy_bCOHG1uKrVdxCOv860oZGpn0dRhnpvOGcF7Zw9y6InR7_mbvKiCRIqGnVvCOeATcBtKGD1ose8jGhoctoqN17kS37dfrHALQA-2U&sai=AMfl-YSPIhGSBLU6YegfwMEFDSYER6m_WXNmUxZyqOaI_a2hFsWgOnvqso1dsNVMgqCm72WuKGoMpDel8lqi95_8EissGkd3NGxASRnH4w6Oh87TWZYWaOj_DyEP6ex58Z6w&sig=Cg0ArKJSzNAMTHUMek4aEAE&uach_m=[UACH]&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 68BD
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuCnKdcFPKr1a_i7OO1HS7UZvs78kgsCRqo3HWpdmuU7NFuJdBdntye8HFA5286dvaBLWyWx8Z4P5BRsBH2v64ZeNZ3ZuzwUuZbBn5awd5L5ySmM087eQGOpLyZ1ocaIjZMs_akFAKuy_Z4ISQnqP6I0QRdFNwA5lGo0LQGT_ZjayDGzZk0HQmnbnY6scwGxPFmIEZ7Jv78PYNo00CuO8IoVRpm7B4lDqigSQOBtj5VDmrYjRcztX5RmikAiEG84QQXtXnuFzWYdaEtnzP20VZyxCKQTYSymGSsHCf9OMR3Zexvr49fgEJDUm2-_JodNYN5PkpwY02v&sai=AMfl-YSRxMtVYIn16306j0UCMLg6H8AfQUdHAyge30ejJT1OHE8B7eWPGngpigKzjJZO_OO1pUG2hp-jJICWc9ilKX2T5RRlThcTrESKW3GZN9mVB-BgL4Is0YcC1UxO6u5u&sig=Cg0ArKJSzPy5ZiMtN8d0EAE&uach_m=[UACH]&adurl=
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.184.226 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s12-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
accept-ch
Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Model, Sec-CH-UA-Full-Version
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
server
cafe
expires
Sun, 13 Feb 2022 14:37:46 GMT
truncated
/ Frame 68BD
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
eb7a3b7b4cc3b1895355805d0bf62facb93c2c1747d707222eddf88624091940

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Content-Type
image/png
lounge.load.36d86d847b1173b5b939b94bc7be6e80.js
c.disquscdn.com/next/embed/ Frame 7B1C
958 B
1 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/lounge.load.36d86d847b1173b5b939b94bc7be6e80.js
Requested by
Host: disqus.com
URL: https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
1e1353002b44ad3d5704624b3c310d98a6707c019fa96b331d73baa37f3aca2d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
Origin
https://disqus.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 26 Jan 2022 22:25:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1527107
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
493
x-xss-protection
1; mode=block
x-served-by
static-web-1
access-control-allow-origin
*
surrogate-key
next
last-modified
Wed, 26 Jan 2022 21:59:14 GMT
server
nginx
etag
"61f1c432-1ed"
content-type
application/javascript; charset=utf-8
via
1.1 a63182cf51dce7998774e112bf9ee7c6.cloudfront.net (CloudFront)
expires
Thu, 26 Jan 2023 22:25:59 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
SsrQDRsh1JxXn3NvnBAfJKarQDwF5Fjx_Vvcc-0mEdJqXoX17bT_FQ==
x-cache-hits
0
Tweet.html
platform.twitter.com/embed/ Frame 9663
487 B
1 KB
Document
General
Full URL
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CED) /
Resource Hash
5dcbd71fa6aa736e53cc09367e9c9c8b5c9eb1c2c071c694037f084bcc35102d

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
204
Cache-Control
public, max-age=1800
Content-Type
text/html; charset=utf-8
Date
Sun, 13 Feb 2022 14:37:46 GMT
Etag
"da3e10ad6766a4de7e6bd4f093357a91"
Last-Modified
Tue, 08 Feb 2022 18:15:54 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (mil/6CED)
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
X-Cache
HIT
x-tw-cdn
VZ
Content-Length
487
Tweet.html
platform.twitter.com/embed/ Frame BB68
487 B
1 KB
Document
General
Full URL
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CED) /
Resource Hash
5dcbd71fa6aa736e53cc09367e9c9c8b5c9eb1c2c071c694037f084bcc35102d

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
204
Cache-Control
public, max-age=1800
Content-Type
text/html; charset=utf-8
Date
Sun, 13 Feb 2022 14:37:46 GMT
Etag
"da3e10ad6766a4de7e6bd4f093357a91"
Last-Modified
Tue, 08 Feb 2022 18:15:54 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (mil/6CED)
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
X-Cache
HIT
x-tw-cdn
VZ
Content-Length
487
Tweet.html
platform.twitter.com/embed/ Frame 98AA
487 B
1 KB
Document
General
Full URL
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CED) /
Resource Hash
5dcbd71fa6aa736e53cc09367e9c9c8b5c9eb1c2c071c694037f084bcc35102d

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
204
Cache-Control
public, max-age=1800
Content-Type
text/html; charset=utf-8
Date
Sun, 13 Feb 2022 14:37:46 GMT
Etag
"da3e10ad6766a4de7e6bd4f093357a91"
Last-Modified
Tue, 08 Feb 2022 18:15:54 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (mil/6CED)
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
X-Cache
HIT
x-tw-cdn
VZ
Content-Length
487
common.bundle.f612a596225060ba8aa2aa903e502caf.js
c.disquscdn.com/next/embed/ Frame 7B1C
282 KB
93 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.f612a596225060ba8aa2aa903e502caf.js
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/lounge.load.36d86d847b1173b5b939b94bc7be6e80.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
92215904788ed593f4a23943a44c1c218c205ab34e6c9acac411bb6cc795f5d2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 26 Jan 2022 22:25:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1527108
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
94749
x-xss-protection
1; mode=block
x-served-by
static-web-2
access-control-allow-origin
*
surrogate-key
next
last-modified
Wed, 26 Jan 2022 21:59:14 GMT
server
nginx
etag
"61f1c432-1721d"
content-type
application/javascript; charset=utf-8
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
expires
Thu, 26 Jan 2023 22:25:58 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
dkmE_hGcKPQ1QQ3VDar4VNO47nOsbEgTPtXYVLp-9xR7_QmHKWSZ4A==
x-cache-hits
0
lounge.7ab903feba7624935283ca4c7d8c7203.css
c.disquscdn.com/next/embed/styles/ Frame 7B1C
165 KB
26 KB
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.f612a596225060ba8aa2aa903e502caf.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
9f05592df6a80686d7216adbbc60dd18c978741182ed9e09a863de7374931f0e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Tue, 07 Dec 2021 23:27:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
5843439
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
26065
x-xss-protection
1; mode=block
x-served-by
static-web-2
access-control-allow-origin
*
surrogate-key
next
last-modified
Tue, 07 Dec 2021 22:32:35 GMT
server
nginx
etag
"61afe103-65d1"
content-type
text/css; charset=utf-8
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
expires
Wed, 07 Dec 2022 23:27:07 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
5yWBGYutll_v9fSLQt_XJ94yN1nKfm9ewVBoQRAUbufo6FZvzdneLA==
x-cache-hits
0
lounge.bundle.f0599c2118b43a53a7ddae9c471ea77c.js
c.disquscdn.com/next/embed/ Frame 7B1C
475 KB
121 KB
Script
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.f0599c2118b43a53a7ddae9c471ea77c.js
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.f612a596225060ba8aa2aa903e502caf.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
8f67a277ad658ed35a5c0347d414b72e032625dc950ec5096a84fd27c9ee8d65
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 26 Jan 2022 22:25:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1527108
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
122940
x-xss-protection
1; mode=block
x-served-by
static-web-2
access-control-allow-origin
*
surrogate-key
next
last-modified
Wed, 26 Jan 2022 21:59:14 GMT
server
nginx
etag
"61f1c432-1e03c"
content-type
application/javascript; charset=utf-8
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
expires
Thu, 26 Jan 2023 22:25:58 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
6WiYh-2qxS7aEKjxCWXAYmCaJ3zG9X-M3wAv5d0VySfKUJBDumkhFA==
x-cache-hits
0
config.js
disqus.com/next/ Frame 7B1C
14 KB
15 KB
Script
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.f612a596225060ba8aa2aa903e502caf.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
1aee3bb80cae1599e7480fc81df6695bd26311950ff43c76404bcb37b04e3e57
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
X-Content-Type-Options
nosniff
Content-Type
application/javascript; charset=UTF-8
Server
nginx
Age
44
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
14600
X-XSS-Protection
1; mode=block
embed.runtime.6a8d3a3f6a0e9e6a44ef.js
platform.twitter.com/embed/ Frame 9663
10 KB
5 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CED) /
Resource Hash
ab4d8500f5fe45d937a98a395617fb6d4098cde2e73ca20bed20990d18f629a4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415742
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
4452
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CED)
Etag
"a989389fe358765e06fffc25571d6a29+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.modules.3930b6915f1483544ebe.js
platform.twitter.com/embed/ Frame 9663
520 KB
166 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.modules.3930b6915f1483544ebe.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF0) /
Resource Hash
8f5ce7aae161d92ba4fd45db79b62d2736e15a62f54ddfe9bca7817a1975310c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415739
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
169242
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF0)
Etag
"75ca6fa88f03ed2c3d6a2702f2d188dc+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.i18n.af5dcec662979be25e3f.js
platform.twitter.com/embed/ Frame 9663
2 KB
1 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.i18n.af5dcec662979be25e3f.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE7) /
Resource Hash
0c590833c3efc6b446f99216bab1bf86915f31bc42f523819d3516d5af16d93f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415740
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
794
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE7)
Etag
"892af46a16830e93daf8866448d2bcec+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.Tweet.71d94e673276137b4cf6.js
platform.twitter.com/embed/ Frame 9663
15 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.Tweet.71d94e673276137b4cf6.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CEF) /
Resource Hash
5ef0b7a46885148981da71691a184d0f5b159d0a437f80ffa17a32544f91e482

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415742
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
5557
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CEF)
Etag
"389e8e50cb805950b0b8950dfab0180a+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
details
disqus.com/api/3.0/forums/ Frame 7B1C
3 KB
3 KB
XHR
General
Full URL
https://disqus.com/api/3.0/forums/details?forum=bankinfosecurity&attach=forumFeatures&api_key=E8Uh5l5fHZ6gD8U3KycjAIAk46f68Zw7C6eW8WSjZvCLXebZ7p0r1yrYDrLilk2F
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.f612a596225060ba8aa2aa903e502caf.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
c7e011034eadabc92cd31c1a7ca38b95dc8d179fc5255e0633beacec0ac35dd8
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
X-Requested-With
XMLHttpRequest
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
X-Content-Type-Options
nosniff
Server
nginx
Age
80
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Content-Type
application/json
Vary
Origin, Cookie
Content-Length
3089
X-XSS-Protection
1; mode=block
embed.runtime.6a8d3a3f6a0e9e6a44ef.js
platform.twitter.com/embed/ Frame BB68
10 KB
5 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CED) /
Resource Hash
ab4d8500f5fe45d937a98a395617fb6d4098cde2e73ca20bed20990d18f629a4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415742
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
4452
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CED)
Etag
"a989389fe358765e06fffc25571d6a29+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.modules.3930b6915f1483544ebe.js
platform.twitter.com/embed/ Frame BB68
520 KB
166 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.modules.3930b6915f1483544ebe.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF0) /
Resource Hash
8f5ce7aae161d92ba4fd45db79b62d2736e15a62f54ddfe9bca7817a1975310c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415739
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
169242
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF0)
Etag
"75ca6fa88f03ed2c3d6a2702f2d188dc+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.i18n.af5dcec662979be25e3f.js
platform.twitter.com/embed/ Frame BB68
2 KB
1 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.i18n.af5dcec662979be25e3f.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE7) /
Resource Hash
0c590833c3efc6b446f99216bab1bf86915f31bc42f523819d3516d5af16d93f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415740
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
794
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE7)
Etag
"892af46a16830e93daf8866448d2bcec+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.Tweet.71d94e673276137b4cf6.js
platform.twitter.com/embed/ Frame BB68
15 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.Tweet.71d94e673276137b4cf6.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CEF) /
Resource Hash
5ef0b7a46885148981da71691a184d0f5b159d0a437f80ffa17a32544f91e482

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415742
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
5557
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CEF)
Etag
"389e8e50cb805950b0b8950dfab0180a+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
threadDetails.json
disqus.com/api/3.0/embed/ Frame 7B1C
36 B
463 B
XHR
General
Full URL
https://disqus.com/api/3.0/embed/threadDetails.json?thread=9009490302&api_key=E8Uh5l5fHZ6gD8U3KycjAIAk46f68Zw7C6eW8WSjZvCLXebZ7p0r1yrYDrLilk2F
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/common.bundle.f612a596225060ba8aa2aa903e502caf.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.64.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
89f4889eebc36f4ad79abb20ba84c4e8b0dac9bce1c0dfbe779ac8d5022572bd
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
X-Requested-With
XMLHttpRequest
X-Disqus-Publisher-API-Key
kgLGW0evKY3stsTyDzF6Uv5Etlrt7MzZ7AWQESkvyZPev49GJCrbtByseVYlfQj6
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
X-Disqus-Remote-Auth
W10= 9342dabb690e11bc0c77e058bc9e7c6644705e94 1644763064

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
X-Content-Type-Options
nosniff
Server
nginx
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Content-Type
application/json
Vary
Origin, Cookie
Content-Length
36
X-XSS-Protection
1; mode=block
noavatar92.png
a.disquscdn.com/1643141191/images/ Frame 7B1C
2 KB
2 KB
Image
General
Full URL
https://a.disquscdn.com/1643141191/images/noavatar92.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.198.49 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
36ef66124133ca33c8b44c487293c3180e5ab681ff3cad3c728ea4f894ec3444
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
last-modified
Fri, 26 Feb 2021 20:50:09 GMT
server
nginx
age
1532133
etag
"60395f01-66c"
strict-transport-security
max-age=300; includeSubdomains
content-type
image/png
x-xss-protection
1; mode=block
cache-control
max-age=2592000
cross-origin-resource-policy
cross-origin
x-amz-cf-pop
FRA53-C1
content-length
1644
x-amz-cf-id
upNZYmxnynWnsgeaawDd_c7hwBxbYZOM0WphjItNP-kv4Yka-jv6Zg==
expires
Fri, 25 Feb 2022 21:02:13 GMT
disqus-sso-login.png
www.bankinfosecurity.com/images/ Frame 7B1C
4 KB
4 KB
Image
General
Full URL
https://www.bankinfosecurity.com/images/disqus-sso-login.png
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
c15d7c72b50d4cad5e7a1fcbd75c78ded4c75eaf3ec382783a1903f88e6db1cf
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
image/png
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
3979
svg-sprite.4da5413f5086c5755b46094b813dbfcd.svg
c.disquscdn.com/next/embed/assets/img/ Frame 7B1C
13 KB
13 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/svg-sprite.4da5413f5086c5755b46094b813dbfcd.svg
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
3270642c89180c12db93775e2a774b6dadd9bd98cffc963075c85afd2c17b6e4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 28 Apr 2021 14:37:41 GMT
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
x-content-type-options
nosniff
age
25142405
x-cache
Hit from cloudfront
content-length
13079
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Tue, 27 Apr 2021 21:01:56 GMT
server
nginx
etag
"60887bc4-3317"
content-type
image/svg+xml; charset=utf-8
access-control-allow-origin
*
expires
Thu, 28 Apr 2022 14:37:41 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
r7XDaYh_xRdzG-yXVoVdl1XyFO5on26P1LqN57LETeAUX1WWj8TQwA==
x-cache-hits
0
loader.ba7c86e8b4b6135bb668d05223f8f127.gif
c.disquscdn.com/next/embed/assets/img/ Frame 7B1C
3 KB
3 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/loader.ba7c86e8b4b6135bb668d05223f8f127.gif
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
4c4491dcfa94cb46fb73742fc2caf49a1cd59027304af1830c7dc6ce1889857c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Thu, 03 Feb 2022 04:58:07 GMT
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
x-content-type-options
nosniff
age
898779
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
2971
x-xss-protection
1; mode=block
x-served-by
static-web-2
surrogate-key
next
last-modified
Wed, 26 Jan 2022 21:59:15 GMT
server
nginx
etag
"61f1c433-b9b"
content-type
image/gif
access-control-allow-origin
*
expires
Fri, 03 Feb 2023 04:58:07 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
hRfSmdVZDQ-EmF5uBsq72H0yFGz-Yg-U7ogO7ZwIhnHahi3zTFsgWQ==
x-cache-hits
0
sprite.ad630a07080a45451f139a7487853ff8.png
c.disquscdn.com/next/embed/assets/img/ Frame 7B1C
2 KB
2 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/sprite.ad630a07080a45451f139a7487853ff8.png
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
9714221c828961b20f45a782c3281c0596f6652cfe1299bee18097f98e8fb7b3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 22 Sep 2021 19:47:48 GMT
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
x-content-type-options
nosniff
age
12422998
x-cache
Hit from cloudfront
content-length
1763
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Wed, 22 Sep 2021 19:30:27 GMT
server
nginx
etag
"614b8453-6e3"
content-type
image/png
access-control-allow-origin
*
expires
Thu, 22 Sep 2022 19:47:48 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
eY9mtRLh1wx6rLdWeOHcsm8U5iDPN9GxjJSebaxWLFoLnqx1pwfBjw==
x-cache-hits
0
icons.4cc7a703d2fdfe684151ff8ac24d45f1.woff2
c.disquscdn.com/next/embed/assets/font/ Frame 7B1C
8 KB
8 KB
Font
General
Full URL
https://c.disquscdn.com/next/embed/assets/font/icons.4cc7a703d2fdfe684151ff8ac24d45f1.woff2
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
f2a341fc815d45c21da726d4c843c2c5d3e1f333465347c3c75d040d556df4e5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
Origin
https://disqus.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 01 Sep 2021 09:58:18 GMT
via
1.1 a63182cf51dce7998774e112bf9ee7c6.cloudfront.net (CloudFront)
x-content-type-options
nosniff
age
14272768
x-cache
Hit from cloudfront
content-length
7900
x-xss-protection
1; mode=block
x-served-by
static-web-2
surrogate-key
next
last-modified
Tue, 24 Aug 2021 21:06:44 GMT
server
nginx
etag
"61255f64-1edc"
content-type
application/octet-stream
access-control-allow-origin
*
expires
Thu, 01 Sep 2022 09:58:18 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
bHOMQBwBeH8p_tlQ5SARtKbcHKYkNtbb65S1zuUPQPe3WNbwxiedPw==
x-cache-hits
0
realtime.b23ff3c36dd0169627f8e54ca1621eca.css
c.disquscdn.com/next/embed/styles/ Frame 8960
337 B
839 B
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/realtime.b23ff3c36dd0169627f8e54ca1621eca.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
c284dcb06ef882b1b45e11e0a16baa223b4117eca94e243c8e725c4ce3f909b3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Tue, 02 Nov 2021 19:05:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
8883157
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
244
x-xss-protection
1; mode=block
x-served-by
static-web-2
access-control-allow-origin
*
surrogate-key
next
last-modified
Tue, 02 Nov 2021 18:16:01 GMT
server
nginx
etag
"61818061-f4"
content-type
text/css; charset=utf-8
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
expires
Wed, 02 Nov 2022 19:05:09 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
kfsMougUf2xRoWAMVgN1zMOWUlF1Az-rh7k2iqIFo3pm1gEyyQmYAw==
x-cache-hits
0
realtime.b23ff3c36dd0169627f8e54ca1621eca.css
c.disquscdn.com/next/embed/styles/ Frame D598
337 B
840 B
Stylesheet
General
Full URL
https://c.disquscdn.com/next/embed/styles/realtime.b23ff3c36dd0169627f8e54ca1621eca.css
Requested by
Host: bankinfosecurity.disqus.com
URL: https://bankinfosecurity.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
c284dcb06ef882b1b45e11e0a16baa223b4117eca94e243c8e725c4ce3f909b3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Tue, 02 Nov 2021 19:05:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
8883157
x-cache
Hit from cloudfront
cross-origin-resource-policy
cross-origin
content-length
244
x-xss-protection
1; mode=block
x-served-by
static-web-2
access-control-allow-origin
*
surrogate-key
next
last-modified
Tue, 02 Nov 2021 18:16:01 GMT
server
nginx
etag
"61818061-f4"
content-type
text/css; charset=utf-8
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
expires
Wed, 02 Nov 2022 19:05:09 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
timing-allow-origin
*
x-amz-cf-id
jlfJyLPS-FokoAnNxIaXg1E2qnNFxLpF-D0fW8KzeFccp2KIRl6A8Q==
x-cache-hits
0
svg-sprite.4da5413f5086c5755b46094b813dbfcd.svg
c.disquscdn.com/next/embed/assets/img/ Frame 7B1C
13 KB
13 KB
Image
General
Full URL
https://c.disquscdn.com/next/embed/assets/img/svg-sprite.4da5413f5086c5755b46094b813dbfcd.svg
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2190:3e00:6:8656:f5c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
3270642c89180c12db93775e2a774b6dadd9bd98cffc963075c85afd2c17b6e4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://c.disquscdn.com/next/embed/styles/lounge.7ab903feba7624935283ca4c7d8c7203.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 28 Apr 2021 14:37:41 GMT
via
1.1 6b0e09b8a7d995016df1513b4b11c17e.cloudfront.net (CloudFront)
x-content-type-options
nosniff
age
25142405
x-cache
Hit from cloudfront
content-length
13079
x-xss-protection
1; mode=block
x-served-by
static-web-1
surrogate-key
next
last-modified
Tue, 27 Apr 2021 21:01:56 GMT
server
nginx
etag
"60887bc4-3317"
content-type
image/svg+xml; charset=utf-8
access-control-allow-origin
*
expires
Thu, 28 Apr 2022 14:37:41 GMT
cache-control
max-age=31536000, public, immutable, no-transform
x-amz-cf-pop
ZRH50-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
NkH1-f7FcNhybiFm1LFE9JOT-IOXS-f0UCSFkJgIzcX0RH9utRn0mg==
x-cache-hits
0
embed.runtime.6a8d3a3f6a0e9e6a44ef.js
platform.twitter.com/embed/ Frame 98AA
10 KB
5 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CED) /
Resource Hash
ab4d8500f5fe45d937a98a395617fb6d4098cde2e73ca20bed20990d18f629a4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415742
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
4452
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CED)
Etag
"a989389fe358765e06fffc25571d6a29+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.modules.3930b6915f1483544ebe.js
platform.twitter.com/embed/ Frame 98AA
520 KB
166 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.modules.3930b6915f1483544ebe.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF0) /
Resource Hash
8f5ce7aae161d92ba4fd45db79b62d2736e15a62f54ddfe9bca7817a1975310c

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415739
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
169242
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF0)
Etag
"75ca6fa88f03ed2c3d6a2702f2d188dc+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.i18n.af5dcec662979be25e3f.js
platform.twitter.com/embed/ Frame 98AA
2 KB
1 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.i18n.af5dcec662979be25e3f.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE7) /
Resource Hash
0c590833c3efc6b446f99216bab1bf86915f31bc42f523819d3516d5af16d93f

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415740
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
794
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE7)
Etag
"892af46a16830e93daf8866448d2bcec+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.Tweet.71d94e673276137b4cf6.js
platform.twitter.com/embed/ Frame 98AA
15 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.Tweet.71d94e673276137b4cf6.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CEF) /
Resource Hash
5ef0b7a46885148981da71691a184d0f5b159d0a437f80ffa17a32544f91e482

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:46 GMT
Content-Encoding
gzip
Age
415742
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
5557
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CEF)
Etag
"389e8e50cb805950b0b8950dfab0180a+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
noavatar92.png
a.disquscdn.com/1643141191/images/ Frame 7B1C
2 KB
2 KB
Image
General
Full URL
https://a.disquscdn.com/1643141191/images/noavatar92.png
Requested by
Host: c.disquscdn.com
URL: https://c.disquscdn.com/next/embed/lounge.bundle.f0599c2118b43a53a7ddae9c471ea77c.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.198.49 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
36ef66124133ca33c8b44c487293c3180e5ab681ff3cad3c728ea4f894ec3444
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:46 GMT
x-content-type-options
nosniff
last-modified
Fri, 26 Feb 2021 20:50:09 GMT
server
nginx
age
1532133
etag
"60395f01-66c"
strict-transport-security
max-age=300; includeSubdomains
content-type
image/png
x-xss-protection
1; mode=block
cache-control
max-age=2592000
cross-origin-resource-policy
cross-origin
x-amz-cf-pop
FRA53-C1
content-length
1644
x-amz-cf-id
upNZYmxnynWnsgeaawDd_c7hwBxbYZOM0WphjItNP-kv4Yka-jv6Zg==
expires
Fri, 25 Feb 2022 21:02:13 GMT
embed.vendors~ondemand.en-js.122b9fbba4c2bb33b5d0.js
platform.twitter.com/embed/ Frame 9663
38 KB
13 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.en-js.122b9fbba4c2bb33b5d0.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE9) /
Resource Hash
8b8fd42428fc23cb3e05286969a166064c0d301ff369b598dbb456abf969f679

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
12556
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE9)
Etag
"c808ad8bb9ff9ba3781e238c509a1178+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.en-js.0c604bbafcc050df96c5.js
platform.twitter.com/embed/ Frame 9663
4 KB
2 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.en-js.0c604bbafcc050df96c5.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF4) /
Resource Hash
14c155b40179c2a5a62195fb7b2fa398583b3dd193fae110594f175df1854601

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
1777
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF4)
Etag
"6ce9b1b3124e63e1e1164af529d92df5+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.i18n.en-js.1cb75b8b2bc0b5cea102.js
platform.twitter.com/embed/ Frame 9663
4 KB
2 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.i18n.en-js.1cb75b8b2bc0b5cea102.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CEF) /
Resource Hash
61babe734333a19f2229ad4aa4c36a539922fa80fe1f11a546419f583b447828

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
1777
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CEF)
Etag
"348431255eee75f7ec5d320bef889de1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
ajax.php
www.bankinfosecurity.com/
16 B
534 B
XHR
General
Full URL
https://www.bankinfosecurity.com/ajax.php?json=marketoContactIdentification
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/jquery.min.js?s=1644763064.2986
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
7cbe0f08ecfaae9f608237302eed00beab7ca27391ddbea6e5eae37299b91dfa

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
X-Requested-With
XMLHttpRequest
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Transfer-Encoding
chunked
Connection
Keep-Alive
Keep-Alive
timeout=5, max=93
Expires
Thu, 19 Nov 1981 08:52:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
774 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=36bb1002701f0000ba1709621800000046a10500&session=6f685451-d3ec-4c5e-8034-6f3ed5c4d5a9&event=active_time_track&q=%7B%22currentTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A47%20GMT%22%2C%22lastTrackTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A46%20GMT%22%2C%22timeSpent%22%3A%221003%22%2C%22totalTimeSpent%22%3A%221003%22%7D&isIframe=false&m=%7B%22description%22%3A%22Meter%2C%20a%20blockchain%20infrastructure%20company%20that%20provides%20multi-chain%20bridging%20and%20allows%20users%20to%20trade%20multiple%20cryptocurrencies%20across%20Ethereum%20and%20other%20public%22%2C%22keywords%22%3A%22Blockchain%2C%20Cross-chain%20platform%2C%20Meter%2C%20Eth%2C%20BSC%22%2C%22title%22%3A%22%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited%22%7D&cb=&r=http%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&pageViewId=a259b793-94db-439c-840f-e847a436535d&an_uid=0
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.233.140 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-233-140.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
X-Content-Type-Options
nosniff
Connection
keep-alive
Content-Length
43
Pragma
no-cache
Last-Modified
Sat, 05 Jun 2021 07:56:05 GMT
Server
nginx/1.14.0 (Ubuntu)
ETag
"60bb2e15-2b"
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
Cache-Control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 19 Apr 2000 11:43:00 GMT
embed.vendors~ondemand.en-js.122b9fbba4c2bb33b5d0.js
platform.twitter.com/embed/ Frame BB68
38 KB
13 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.en-js.122b9fbba4c2bb33b5d0.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE9) /
Resource Hash
8b8fd42428fc23cb3e05286969a166064c0d301ff369b598dbb456abf969f679

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
12556
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE9)
Etag
"c808ad8bb9ff9ba3781e238c509a1178+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.en-js.0c604bbafcc050df96c5.js
platform.twitter.com/embed/ Frame BB68
4 KB
2 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.en-js.0c604bbafcc050df96c5.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF4) /
Resource Hash
14c155b40179c2a5a62195fb7b2fa398583b3dd193fae110594f175df1854601

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
1777
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF4)
Etag
"6ce9b1b3124e63e1e1164af529d92df5+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.i18n.en-js.1cb75b8b2bc0b5cea102.js
platform.twitter.com/embed/ Frame BB68
4 KB
2 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.i18n.en-js.1cb75b8b2bc0b5cea102.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CEF) /
Resource Hash
61babe734333a19f2229ad4aa4c36a539922fa80fe1f11a546419f583b447828

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
1777
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CEF)
Etag
"348431255eee75f7ec5d320bef889de1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
event.gif
referrer.disqus.com/juggler/ Frame 7B1C
43 B
339 B
Image
General
Full URL
https://referrer.disqus.com/juggler/event.gif?abe=0&embed_hidden=0&load_time=275&event=init_embed&thread=9009490302&forum=bankinfosecurity&forum_id=1538940&imp=4cgkjna1g7u6qt&thread_slug=44_million_stolen_from_crypto_firm_multi_bridge_exploited&user_type=anon&referrer=https%3A%2F%2Fwww.bankinfosecurity.com%2F&theme=next&dnt=0&tracking_enabled=0&experiment=network_default_hidden&variant=fallthrough&service=dynamic&promoted_enabled=false&max_enabled=false
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.196.134 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://disqus.com/embed/comments/?base=default&f=bankinfosecurity&t_u=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&t_d=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&t_t=%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited&s_o=default
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
X-Content-Type-Options
nosniff
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Cross-Origin-Resource-Policy
cross-origin
Connection
keep-alive
Content-Length
43
X-XSS-Protection
1; mode=block
embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
platform.twitter.com/embed/ Frame 9663
465 KB
117 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE2) /
Resource Hash
026aecd0848507b52c5b27e4a855285a82ac2a9fed3d09eff0e43f510f431f2b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
119614
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE2)
Etag
"f2ebd90d29aad265c0136328247a3785+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.vendors~ondemand.Tweet.05050a486251dc4a73da.js
platform.twitter.com/embed/ Frame 9663
34 KB
11 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.Tweet.05050a486251dc4a73da.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE6) /
Resource Hash
9b2fb91eb71645da20868d762a670fcfefc4aca65172287f718582139bcb4b85

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
Content-Length
10487
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE6)
Etag
"6c56c0e275c15a9e65aa1f05da808da4+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.95fc2d4639b744c71e7f.js
platform.twitter.com/embed/ Frame 9663
22 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.95fc2d4639b744c71e7f.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF8) /
Resource Hash
97f778aaf2370b2b2fe47f084afeab50790575a9b9054ea2d3d0c125754f3ec2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
Content-Length
5838
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF8)
Etag
"32eb3c89c30e48fe8ce94abf6340fc7d+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.Tweet.96067fc3ec620aee2879.js
platform.twitter.com/embed/ Frame 9663
52 KB
13 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.Tweet.96067fc3ec620aee2879.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CDE) /
Resource Hash
134b0f26d6b80881bcb797e0d140ea14365c0a3adb84f01b325e0a51194aa027

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103309834674177&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
12318
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CDE)
Etag
"3baac9e2c2248ecbfc25bfb61ada23ba+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.vendors~ondemand.en-js.122b9fbba4c2bb33b5d0.js
platform.twitter.com/embed/ Frame 98AA
38 KB
13 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.en-js.122b9fbba4c2bb33b5d0.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE9) /
Resource Hash
8b8fd42428fc23cb3e05286969a166064c0d301ff369b598dbb456abf969f679

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
12556
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE9)
Etag
"c808ad8bb9ff9ba3781e238c509a1178+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.en-js.0c604bbafcc050df96c5.js
platform.twitter.com/embed/ Frame 98AA
4 KB
2 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.en-js.0c604bbafcc050df96c5.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF4) /
Resource Hash
14c155b40179c2a5a62195fb7b2fa398583b3dd193fae110594f175df1854601

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
1777
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF4)
Etag
"6ce9b1b3124e63e1e1164af529d92df5+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.i18n.en-js.1cb75b8b2bc0b5cea102.js
platform.twitter.com/embed/ Frame 98AA
4 KB
2 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.i18n.en-js.1cb75b8b2bc0b5cea102.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CEF) /
Resource Hash
61babe734333a19f2229ad4aa4c36a539922fa80fe1f11a546419f583b447828

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
1777
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CEF)
Etag
"348431255eee75f7ec5d320bef889de1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
platform.twitter.com/embed/ Frame BB68
465 KB
117 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE2) /
Resource Hash
026aecd0848507b52c5b27e4a855285a82ac2a9fed3d09eff0e43f510f431f2b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
119614
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE2)
Etag
"f2ebd90d29aad265c0136328247a3785+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.vendors~ondemand.Tweet.05050a486251dc4a73da.js
platform.twitter.com/embed/ Frame BB68
34 KB
11 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.Tweet.05050a486251dc4a73da.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE6) /
Resource Hash
9b2fb91eb71645da20868d762a670fcfefc4aca65172287f718582139bcb4b85

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
Content-Length
10487
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE6)
Etag
"6c56c0e275c15a9e65aa1f05da808da4+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.95fc2d4639b744c71e7f.js
platform.twitter.com/embed/ Frame BB68
22 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.95fc2d4639b744c71e7f.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF8) /
Resource Hash
97f778aaf2370b2b2fe47f084afeab50790575a9b9054ea2d3d0c125754f3ec2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
Content-Length
5838
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF8)
Etag
"32eb3c89c30e48fe8ce94abf6340fc7d+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.Tweet.96067fc3ec620aee2879.js
platform.twitter.com/embed/ Frame BB68
52 KB
13 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.Tweet.96067fc3ec620aee2879.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CDE) /
Resource Hash
134b0f26d6b80881bcb797e0d140ea14365c0a3adb84f01b325e0a51194aa027

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-1&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103313521524738&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
12318
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CDE)
Etag
"3baac9e2c2248ecbfc25bfb61ada23ba+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
platform.twitter.com/embed/ Frame 98AA
465 KB
117 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE2) /
Resource Hash
026aecd0848507b52c5b27e4a855285a82ac2a9fed3d09eff0e43f510f431f2b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
119614
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE2)
Etag
"f2ebd90d29aad265c0136328247a3785+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.vendors~ondemand.Tweet.05050a486251dc4a73da.js
platform.twitter.com/embed/ Frame 98AA
34 KB
11 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.vendors~ondemand.Tweet.05050a486251dc4a73da.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE6) /
Resource Hash
9b2fb91eb71645da20868d762a670fcfefc4aca65172287f718582139bcb4b85

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
Content-Length
10487
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CE6)
Etag
"6c56c0e275c15a9e65aa1f05da808da4+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.95fc2d4639b744c71e7f.js
platform.twitter.com/embed/ Frame 98AA
22 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.95fc2d4639b744c71e7f.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CF8) /
Resource Hash
97f778aaf2370b2b2fe47f084afeab50790575a9b9054ea2d3d0c125754f3ec2

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
Content-Length
5838
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CF8)
Etag
"32eb3c89c30e48fe8ce94abf6340fc7d+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
embed.ondemand.Tweet.96067fc3ec620aee2879.js
platform.twitter.com/embed/ Frame 98AA
52 KB
13 KB
Script
General
Full URL
https://platform.twitter.com/embed/embed.ondemand.Tweet.96067fc3ec620aee2879.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.runtime.6a8d3a3f6a0e9e6a44ef.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CDE) /
Resource Hash
134b0f26d6b80881bcb797e0d140ea14365c0a3adb84f01b325e0a51194aa027

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/embed/Tweet.html?creatorScreenName=BnkInfoSecurity&dnt=false&embedId=twitter-widget-2&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1490103308421255168&lang=en&origin=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467&sessionId=6828223e1dd061803109a2c3727c7c2538fb4fee&siteScreenName=BnkInfoSecurity&theme=light&widgetsVersion=0a8eea3%3A1643743420422&width=550px
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Age
415743
X-Cache
HIT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server-Timing
"x-cache;desc= HIT,x-tw-cdn;desc=",edge;dur=1
Content-Length
12318
x-tw-cdn
VZ
Last-Modified
Tue, 08 Feb 2022 18:15:53 GMT
Server
ECS (mil/6CDE)
Etag
"3baac9e2c2248ecbfc25bfb61ada23ba+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
tweet
cdn.syndication.twimg.com/ Frame BB68
2 KB
1 KB
XHR
General
Full URL
https://cdn.syndication.twimg.com/tweet?features=tfw_experiments_cookie_expiration%3A1209600%3Btfw_horizon_tweet_embed_9555%3Ahte%3Btfw_space_card%3Aoff&id=1490103313521524738&lang=en
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.modules.3930b6915f1483544ebe.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
tsa_f / Express
Resource Hash
8a8b7a0d9850b4a8f47fc172885cb9e13c95c078073829db51a527207bf56837
Security Headers
Name Value
Content-Security-Policy connect-src 'self'; default-src 'self'; frame-src 'self'; font-src 'self'; form-action 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'self'; style-src 'self'; report-uri https://twitter.com/i/csp_report?a=O5RXE%3D%3D%3D&ro=false
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

content-security-policy
connect-src 'self'; default-src 'self'; frame-src 'self'; font-src 'self'; form-action 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'self'; style-src 'self'; report-uri https://twitter.com/i/csp_report?a=O5RXE%3D%3D%3D&ro=false
content-encoding
gzip
etag
W/"71a-DPcdZQ/MXT72jd8D7HiV3iF829g"
x-powered-by
Express
access-control-allow-methods
GET
server-timing
"x-cache;desc= ,x-tw-cdn;desc=VZ",edge;dur=181
strict-transport-security
max-age=631138519
x-xss-protection
0
x-response-time
154
server
tsa_f
x-frame-options
SAMEORIGIN
date
Sun, 13 Feb 2022 14:37:47 GMT
vary
Origin, Accept-Encoding
x-tw-cdn
VZ, VZ
content-type
application/json; charset=utf-8
access-control-allow-origin
https://platform.twitter.com
cache-control
must-revalidate, max-age=60
access-control-allow-credentials
true
x-connection-hash
77302122578cd8a091237988d8c294e208b250a8e8bbedcdfbd8dc9cc3568f91
x-content-type-options
nosniff
access-contol-allow-origin
platform.twitter.com
tweet
cdn.syndication.twimg.com/ Frame 9663
2 KB
843 B
XHR
General
Full URL
https://cdn.syndication.twimg.com/tweet?features=tfw_experiments_cookie_expiration%3A1209600%3Btfw_horizon_tweet_embed_9555%3Ahte%3Btfw_space_card%3Aoff&id=1490103309834674177&lang=en
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.modules.3930b6915f1483544ebe.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
tsa_f / Express
Resource Hash
b3427995de6269ede4295a0e11e8df708f81c123c593a7532f462d5649ce3dac
Security Headers
Name Value
Content-Security-Policy connect-src 'self'; default-src 'self'; frame-src 'self'; font-src 'self'; form-action 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'self'; style-src 'self'; report-uri https://twitter.com/i/csp_report?a=O5RXE%3D%3D%3D&ro=false
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

content-security-policy
connect-src 'self'; default-src 'self'; frame-src 'self'; font-src 'self'; form-action 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'self'; style-src 'self'; report-uri https://twitter.com/i/csp_report?a=O5RXE%3D%3D%3D&ro=false
content-encoding
gzip
etag
W/"61f-kadL1qwitw2N0/BmoYUEFTNRPjo"
x-powered-by
Express
access-control-allow-methods
GET
server-timing
"x-cache;desc= ,x-tw-cdn;desc=VZ",edge;dur=174
strict-transport-security
max-age=631138519
x-xss-protection
0
x-response-time
149
server
tsa_f
x-frame-options
SAMEORIGIN
date
Sun, 13 Feb 2022 14:37:47 GMT
vary
Origin, Accept-Encoding
x-tw-cdn
VZ, VZ
content-type
application/json; charset=utf-8
access-control-allow-origin
https://platform.twitter.com
cache-control
must-revalidate, max-age=60
access-control-allow-credentials
true
x-connection-hash
2161ad4a9034c701d529f2569c2c4318bc1ecd56d2833b047b9b0d56a2578e4d
x-content-type-options
nosniff
access-contol-allow-origin
platform.twitter.com
tweet
cdn.syndication.twimg.com/ Frame 98AA
717 B
665 B
XHR
General
Full URL
https://cdn.syndication.twimg.com/tweet?features=tfw_experiments_cookie_expiration%3A1209600%3Btfw_horizon_tweet_embed_9555%3Ahte%3Btfw_space_card%3Aoff&id=1490103308421255168&lang=en
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.modules.3930b6915f1483544ebe.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
tsa_f / Express
Resource Hash
bb056bfa0f807ec6265af3abda2230e1b46e6acb8af51775c783dad9345f9fdb
Security Headers
Name Value
Content-Security-Policy connect-src 'self'; default-src 'self'; frame-src 'self'; font-src 'self'; form-action 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'self'; style-src 'self'; report-uri https://twitter.com/i/csp_report?a=O5RXE%3D%3D%3D&ro=false
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

content-security-policy
connect-src 'self'; default-src 'self'; frame-src 'self'; font-src 'self'; form-action 'self'; img-src 'self'; media-src 'self'; object-src 'none'; script-src 'self'; style-src 'self'; report-uri https://twitter.com/i/csp_report?a=O5RXE%3D%3D%3D&ro=false
content-encoding
gzip
etag
W/"2cd-iHIfXbu6VNqdIEA4o1pmBs6mXlg"
x-powered-by
Express
access-control-allow-methods
GET
server-timing
"x-cache;desc= ,x-tw-cdn;desc=VZ",edge;dur=162
strict-transport-security
max-age=631138519
content-length
497
x-xss-protection
0
x-response-time
136
server
tsa_f
x-frame-options
SAMEORIGIN
date
Sun, 13 Feb 2022 14:37:47 GMT
vary
Origin, Accept-Encoding
x-tw-cdn
VZ, VZ
content-type
application/json; charset=utf-8
access-control-allow-origin
https://platform.twitter.com
cache-control
must-revalidate, max-age=60
access-control-allow-credentials
true
x-connection-hash
2b8e5fdc044daf3c57cb24279f738aefc325da454ff29f4ac1d724a21285e270
x-content-type-options
nosniff
access-contol-allow-origin
platform.twitter.com
bis-hdr.desktop.r2.js
www.bankinfosecurity.com/javascripts-responsive/
2 KB
979 B
Script
General
Full URL
https://www.bankinfosecurity.com/javascripts-responsive/bis-hdr.desktop.r2.js
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.56.167.254 , United States, ASN33070 (RMH-14, US),
Reverse DNS
Software
Apache /
Resource Hash
a952a44375a3d8c869e96f85505fcbae076f4226021f08676a1b4627152252d0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:47 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/javascript
Cache-Control
max-age=86400, private, must-revalidate
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=91
Content-Length
595
sodar
pagead2.googlesyndication.com/getconfig/
13 KB
10 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2022020801&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
075fb6cdb3d92e0f1dcedd5bbdca650bf4172b92c4c2123fc76878f621cdeec4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

timing-allow-origin
*
date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9901
x-xss-protection
0
truncated
/ Frame 1F3C
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a5cdc7359a9913e6987688c846fe5175ec34389102777eaa5917bedcf589dbe4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Content-Type
image/png
up.js
cdn01.basis.net/assets/
2 KB
1 KB
Script
General
Full URL
https://cdn01.basis.net/assets/up.js?um=1
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-T6KM3T
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
178.79.242.16 , United States, ASN22822 (LLNW, US),
Reverse DNS
https-178-79-242-16.fra.llnw.net
Software
AC1.1 /
Resource Hash
5bdf1120c4df8c868092d0bcb7f2540a85456fd94cd1e1a5570c9b63906b1a5b

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
last-modified
Mon, 24 Aug 2020 15:06:26 GMT
server
AC1.1
age
394609
vary
Accept-Encoding
content-type
application/javascript
accept-ranges
bytes
content-length
1041
x-llid
2bdbc348cef33d298328f3149268e150
64ead273d1f41aa7
pixel.sitescout.com/iap/
Redirect Chain
  • https://pixel-a.basis.net/iap/64ead273d1f41aa7
  • https://pixel.sitescout.com/iap/64ead273d1f41aa7
0
191 B
Image
General
Full URL
https://pixel.sitescout.com/iap/64ead273d1f41aa7
Protocol
H2
Server
66.155.71.149 -, , ASN (),
Reverse DNS
Software
AC1.1 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:47 GMT
cache-control
max-age=0,no-cache,no-store
server
AC1.1
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"
expires
Tue, 11 Oct 1977 12:34:56 GMT

Redirect headers

location
https://pixel.sitescout.com/iap/64ead273d1f41aa7
content-length
0
asyncPixelSync
pixel.sitescout.com/dmp/ Frame 0D90
0
0
Document
General
Full URL
https://pixel.sitescout.com/dmp/asyncPixelSync
Requested by
Host: www.bankinfosecurity.com
URL: https://www.bankinfosecurity.com/44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467?rf=2022-02-12__ACQ_DBT__Slot5_ART18467&mkt_tok=MDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.149 -, , ASN (),
Reverse DNS
Software
AC1.1 /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

cache-control
max-age=0,no-cache,no-store
pragma
no-cache
expires
Tue, 11 Oct 1977 12:34:56 GMT
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"
date
Sun, 13 Feb 2022 14:37:46 GMT
server
AC1.1
dabbb58b17f5118e
pixel.sitescout.com/up/
43 B
267 B
Image
General
Full URL
https://pixel.sitescout.com/up/dabbb58b17f5118e?cntr_url=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
66.155.71.149 -, , ASN (),
Reverse DNS
Software
AC1.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:47 GMT
server
AC1.1
p3p
CP="NON DEVa PSAa PSDa OUR NOR NAV",policyref="/w3c/p3p.xml"
cache-control
max-age=0,no-cache,no-store
content-type
image/gif
content-length
43
expires
Tue, 11 Oct 1977 12:34:56 GMT
sodar2.js
tpc.googlesyndication.com/sodar/
17 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022020801.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61c32059a5e94075a7ecff678b33907966fc9cfa384daa01aa057f872da14dbb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6386
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
etag
"1637097310169751"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Sun, 13 Feb 2022 14:37:47 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/225/ Frame BA56
13 KB
5 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
55a119c0394f901a8a297e109c17b5e5402689708b999ab10691c16179f32a4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
cross-origin-resource-policy
cross-origin
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-length
5046
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
date
Sun, 13 Feb 2022 14:25:05 GMT
expires
Mon, 13 Feb 2023 14:25:05 GMT
cache-control
public, max-age=31536000
last-modified
Mon, 21 Jun 2021 20:47:05 GMT
content-type
text/html
age
762
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
aframe
www.google.com/recaptcha/api2/ Frame 3CCF
783 B
533 B
Document
General
Full URL
https://www.google.com/recaptcha/api2/aframe
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
c16aa2c743d49ad94815c0047ec2ef138037206ba63b88efe489e605ef948d1b
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-2+JURIEtMx/TIGipSU+Y1g' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/

Response headers

cross-origin-resource-policy
cross-origin
cross-origin-embedder-policy
require-corp
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
expires
Sun, 13 Feb 2022 14:37:47 GMT
date
Sun, 13 Feb 2022 14:37:47 GMT
cache-control
private, max-age=300
content-type
text/html; charset=utf-8
content-security-policy
script-src 'report-sample' 'nonce-2+JURIEtMx/TIGipSU+Y1g' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
511
server
GSE
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
PUCLGob25V5To4ZA0QrG8QFJpfKRC6B4XbMmUjSZFR8.js
pagead2.googlesyndication.com/bg/ Frame BA56
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/PUCLGob25V5To4ZA0QrG8QFJpfKRC6B4XbMmUjSZFR8.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
3d408b1a86f6e55e53a38640d10ac6f10149a5f2910ba0785db326523499151f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 07:33:43 GMT
content-encoding
br
x-content-type-options
nosniff
age
25444
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13483
x-xss-protection
0
last-modified
Tue, 08 Feb 2022 16:08:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Mon, 13 Feb 2023 07:33:43 GMT
sodar
pagead2.googlesyndication.com/pagead/ Frame 3CCF
0
0
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=225&li=gpt_2022020801&jk=3124794741368768&rc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

26a1.svg
abs-0.twimg.com/emoji/v2/svg/ Frame BB68
451 B
679 B
Image
General
Full URL
https://abs-0.twimg.com/emoji/v2/svg/26a1.svg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.43.131 -, , ASN (),
Reverse DNS
Software
/
Resource Hash
d3a6d0c18f6887f771aa3cd51db375e7a9588e1af63801cc100cd9bcc5bccaac
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

strict-transport-security
max-age=631138519
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT, HIT
server-timing
x-cache;desc=HIT, HIT, x-tw-cdn;desc=FT
content-length
318
etag
"vMpDsceqkdR/YpYs4kIq4Q=="
x-served-by
cache-fty21357-FTY, cache-hhn4042-HHN
last-modified
Wed, 21 Feb 2018 22:32:27 GMT
date
Sun, 13 Feb 2022 14:37:47 GMT
vary
Accept-Encoding
x-tw-cdn
FT
content-type
image/svg+xml
access-control-allow-origin
*
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
expires
Sat, 17 Sep 2022 06:33:30 GMT
jot
syndication.twitter.com/i/ Frame BB68
43 B
380 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1644763067516%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22results%22%2C%22section%22%3A%22main%22%7D%2C%22context%22%3A%22horizon%22%2C%22client_version%22%3A%220a8eea3%3A1643743420422%22%2C%22dnt%22%3Afalse%2C%22widget_id%22%3A%22twitter-widget-1%22%2C%22widget_origin%22%3A%22https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%22%2C%22widget_frame%22%3A%22false%22%2C%22widget_partner%22%3A%22%22%2C%22widget_site_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_site_user_id%22%3A%22%22%2C%22widget_creator_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_creator_user_id%22%3A%22%22%2C%22widget_iframe_version%22%3A%228560430%3A1644275266059%22%2C%22item_ids%22%3A%5B%221490103313521524738%22%5D%2C%22item_details%22%3A%7B%221490103313521524738%22%3A%7B%22item_type%22%3A0%7D%7D%7D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.72 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
125
pragma
no-cache
last-modified
Sun, 13 Feb 2022 14:37:47 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ac906bc89b00a2bba54f952bdeb4449414c256567ed48a1e8107c529a04033f4
x-transaction
1585ec6632e06b6b
expires
Tue, 31 Mar 1981 05:00:00 GMT
26a1.svg
abs-0.twimg.com/emoji/v2/svg/ Frame 98AA
451 B
359 B
Image
General
Full URL
https://abs-0.twimg.com/emoji/v2/svg/26a1.svg
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.modules.3930b6915f1483544ebe.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.43.131 -, , ASN (),
Reverse DNS
Software
/
Resource Hash
d3a6d0c18f6887f771aa3cd51db375e7a9588e1af63801cc100cd9bcc5bccaac
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

strict-transport-security
max-age=631138519
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT, HIT
server-timing
x-cache;desc=HIT, HIT, x-tw-cdn;desc=FT
content-length
318
etag
"vMpDsceqkdR/YpYs4kIq4Q=="
x-served-by
cache-fty21357-FTY, cache-hhn4042-HHN
last-modified
Wed, 21 Feb 2018 22:32:27 GMT
date
Sun, 13 Feb 2022 14:37:47 GMT
vary
Accept-Encoding
x-tw-cdn
FT
content-type
image/svg+xml
access-control-allow-origin
*
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
expires
Sat, 17 Sep 2022 06:33:30 GMT
jot
syndication.twitter.com/i/ Frame 98AA
43 B
124 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1644763067566%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22results%22%2C%22section%22%3A%22main%22%7D%2C%22context%22%3A%22horizon%22%2C%22client_version%22%3A%220a8eea3%3A1643743420422%22%2C%22dnt%22%3Afalse%2C%22widget_id%22%3A%22twitter-widget-2%22%2C%22widget_origin%22%3A%22https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%22%2C%22widget_frame%22%3A%22false%22%2C%22widget_partner%22%3A%22%22%2C%22widget_site_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_site_user_id%22%3A%22%22%2C%22widget_creator_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_creator_user_id%22%3A%22%22%2C%22widget_iframe_version%22%3A%228560430%3A1644275266059%22%2C%22item_ids%22%3A%5B%221490103308421255168%22%5D%2C%22item_details%22%3A%7B%221490103308421255168%22%3A%7B%22item_type%22%3A0%7D%7D%7D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.72 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
109
pragma
no-cache
last-modified
Sun, 13 Feb 2022 14:37:47 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ac906bc89b00a2bba54f952bdeb4449414c256567ed48a1e8107c529a04033f4
x-transaction
4a009cd34173700d
expires
Tue, 31 Mar 1981 05:00:00 GMT
26a1.svg
abs-0.twimg.com/emoji/v2/svg/ Frame 9663
451 B
359 B
Image
General
Full URL
https://abs-0.twimg.com/emoji/v2/svg/26a1.svg
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.modules.3930b6915f1483544ebe.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.43.131 -, , ASN (),
Reverse DNS
Software
/
Resource Hash
d3a6d0c18f6887f771aa3cd51db375e7a9588e1af63801cc100cd9bcc5bccaac
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

strict-transport-security
max-age=631138519
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT, HIT
server-timing
x-cache;desc=HIT, HIT, x-tw-cdn;desc=FT
content-length
318
etag
"vMpDsceqkdR/YpYs4kIq4Q=="
x-served-by
cache-fty21357-FTY, cache-hhn4042-HHN
last-modified
Wed, 21 Feb 2018 22:32:27 GMT
date
Sun, 13 Feb 2022 14:37:47 GMT
vary
Accept-Encoding
x-tw-cdn
FT
content-type
image/svg+xml
access-control-allow-origin
*
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
expires
Sat, 17 Sep 2022 06:33:30 GMT
jot
syndication.twitter.com/i/ Frame 9663
43 B
124 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1644763067593%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22results%22%2C%22section%22%3A%22main%22%7D%2C%22context%22%3A%22horizon%22%2C%22client_version%22%3A%220a8eea3%3A1643743420422%22%2C%22dnt%22%3Afalse%2C%22widget_id%22%3A%22twitter-widget-0%22%2C%22widget_origin%22%3A%22https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%22%2C%22widget_frame%22%3A%22false%22%2C%22widget_partner%22%3A%22%22%2C%22widget_site_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_site_user_id%22%3A%22%22%2C%22widget_creator_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_creator_user_id%22%3A%22%22%2C%22widget_iframe_version%22%3A%228560430%3A1644275266059%22%2C%22item_ids%22%3A%5B%221490103309834674177%22%5D%2C%22item_details%22%3A%7B%221490103309834674177%22%3A%7B%22item_type%22%3A0%7D%7D%7D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.72 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
115
pragma
no-cache
last-modified
Sun, 13 Feb 2022 14:37:47 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ac906bc89b00a2bba54f952bdeb4449414c256567ed48a1e8107c529a04033f4
x-transaction
bb534b38fd906838
expires
Tue, 31 Mar 1981 05:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame BB82
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuWvxdN-6hPBfzY2sPaj4IbSNZBzaJVwk8zBoSBhZDG1-gIfYfkOH4iSwAvxJY1tIacymTl3BCs8TbO1cy6z-ZqIZFRKnTNglJsrX-czKfiQ3SGvZ95&sig=Cg0ArKJSzKRlI-U-M7uAEAE&id=lidar2&mcvt=1075&p=71,636,161,1364&mtos=1075,1075,1075,1075,1075&tos=1075,0,0,0,0&v=20220209&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=3&adk=606436291&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIixbXV0%3D&vs=4&r=v&rst=1644763066408&rpt=104&isd=0&lsd=0&met=mue&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:47 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
VSEvdbW__normal.jpg
pbs.twimg.com/profile_images/1185273550187499521/ Frame BB68
2 KB
3 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1185273550187499521/VSEvdbW__normal.jpg
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE7) /
Resource Hash
0889355496043dca362d3a480fb3a992954e30adc82f0fedc22009fdf89a590e
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
x-content-type-options
nosniff
age
421315
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
content-length
2339
x-response-time
113
surrogate-key
profile_images profile_images/bucket/5 profile_images/1185273550187499521
last-modified
Fri, 18 Oct 2019 19:14:50 GMT
server
ECS (mil/6CE7)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
475f621ebf87992492e745d9766ae7899c1538f9aea0a0e1a16e12c09e538979
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
activeview
pagead2.googlesyndication.com/pcs/ Frame 65EA
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstnD2YdbYxm4JRgV76zp5USIuLS90wCreIX2ahPMUu3iah1g1ttnK2i0EfF0-Dl2K6kfLOvU9Lipmn8Zf8vwlvzC8OlUKN6bpL-Ql3kHlFWOeuXMmcV&sig=Cg0ArKJSzObexTFnUKvQEAE&id=lidar2&mcvt=1051&p=589,1040,839,1340&mtos=1051,1051,1051,1051,1051&tos=1051,0,0,0,0&v=20220209&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=3&adk=592806581&rs=4&la=0&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIixbXV0%3D&vs=4&r=v&rst=1644763066445&rpt=120&isd=0&lsd=0&met=mue&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:47 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
VSEvdbW__normal.jpg
pbs.twimg.com/profile_images/1185273550187499521/ Frame 9663
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1185273550187499521/VSEvdbW__normal.jpg
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE7) /
Resource Hash
0889355496043dca362d3a480fb3a992954e30adc82f0fedc22009fdf89a590e
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
x-content-type-options
nosniff
age
421315
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
content-length
2339
x-response-time
113
surrogate-key
profile_images profile_images/bucket/5 profile_images/1185273550187499521
last-modified
Fri, 18 Oct 2019 19:14:50 GMT
server
ECS (mil/6CE7)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
475f621ebf87992492e745d9766ae7899c1538f9aea0a0e1a16e12c09e538979
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
VSEvdbW__normal.jpg
pbs.twimg.com/profile_images/1185273550187499521/ Frame 98AA
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1185273550187499521/VSEvdbW__normal.jpg
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE7) /
Resource Hash
0889355496043dca362d3a480fb3a992954e30adc82f0fedc22009fdf89a590e
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
x-content-type-options
nosniff
age
421315
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=1
content-length
2339
x-response-time
113
surrogate-key
profile_images profile_images/bucket/5 profile_images/1185273550187499521
last-modified
Fri, 18 Oct 2019 19:14:50 GMT
server
ECS (mil/6CE7)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
475f621ebf87992492e745d9766ae7899c1538f9aea0a0e1a16e12c09e538979
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
VSEvdbW__normal.jpg
pbs.twimg.com/profile_images/1185273550187499521/ Frame 9663
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1185273550187499521/VSEvdbW__normal.jpg
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/embed/embed.vendors~ondemand.TimelineList~ondemand.TimelineProfile~ondemand.Tweet.fea59cc5ec45075e7db5.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE7) /
Resource Hash
0889355496043dca362d3a480fb3a992954e30adc82f0fedc22009fdf89a590e
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
x-content-type-options
nosniff
age
421315
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=6
content-length
2339
x-response-time
113
surrogate-key
profile_images profile_images/bucket/5 profile_images/1185273550187499521
last-modified
Fri, 18 Oct 2019 19:14:50 GMT
server
ECS (mil/6CE7)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
475f621ebf87992492e745d9766ae7899c1538f9aea0a0e1a16e12c09e538979
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
VSEvdbW__normal.jpg
pbs.twimg.com/profile_images/1185273550187499521/ Frame 98AA
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1185273550187499521/VSEvdbW__normal.jpg
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (mil/6CE7) /
Resource Hash
0889355496043dca362d3a480fb3a992954e30adc82f0fedc22009fdf89a590e
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
x-content-type-options
nosniff
age
421315
x-cache
HIT
server-timing
"x-cache;desc= HIT,x-tw-cdn;desc=VZ",edge;dur=6
content-length
2339
x-response-time
113
surrogate-key
profile_images profile_images/bucket/5 profile_images/1185273550187499521
last-modified
Fri, 18 Oct 2019 19:14:50 GMT
server
ECS (mil/6CE7)
strict-transport-security
max-age=631138519
x-tw-cdn
VZ, VZ
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
475f621ebf87992492e745d9766ae7899c1538f9aea0a0e1a16e12c09e538979
accept-ranges
bytes
timing-allow-origin
https://twitter.com, https://mobile.twitter.com
generate_204
tpc.googlesyndication.com/ Frame BA56
0
9 B
Image
General
Full URL
https://tpc.googlesyndication.com/generate_204?Rwk73Q
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82f::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
gen_204
pagead2.googlesyndication.com/pagead/
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=225&t=2&li=gpt_2022020801&jk=3124794741368768&bg=!BAelB0PNAAbAtJCDwLQ7ACkAdvg8WmuCYUllHdwDOEmyGo4oLW5dJIxfxigYOt8to6Vux0x7U_HQagIAAACQUgAAAAJoAQcKAEeX5mWeHuBar9Y_TW7TODcx1Jzm445XynR_-3hsJpGD4cnwajau6ApC6RuN3d7o9sb7JDq01e3QWjVI8Lwej7RHCJSf1ZuAwpkC1wSmDnUssaLIJ_0-3y1jw_ERpRSj73p_aQTDi4SfZKWdWXSmQ8wX9NML7Ou1JxCc0LU7BMjtfEcWpC3mmxTmkhCpow9U0RpFHS3PtL62jEx7EUIQkZ-OJyYJJte4v6DTcBCCOki1sV21xCQHB_9HRNr65rrydFPrTcbuLyzY3ABWKOWZxZOFxLaKWQ0JhvdUSR48hYmOOox46bG872YD63ZanVIQMEca5BdKuEochVEbk_RBZYGzmddUjem3j2V0QkSGblvGquxCW0-XC4cBvMyhl6r9zr_Lo4rRQNL7_4C4HFRZ-wSqBpUQlfWFvMmUxdmdiAxI5iV42BpcKaFOytmGv2VRuCaqbOQGze9AiGuacNH6mn7rmc4AtnLZr28dzAWG8HW6NjghNjYCllnVlSYfy6byVUfQcCR2ttyyWxWSu-hGHSPq0fPXA8Qr_ddWZJJVHdl_Bp0DZb5dYb4Ufx9Hc-EyW35178-hQl2R9w7l6IVG4WGOWRwqw8k-VH0qPfQVbEN5sDTSPqAbBYzDzBjUjnoEq9ab4FRrhJPZDglNySBqoVDrO5iiIEgGf5pInLZruE8EON-F6LV8Jy_GPMttvH2_Mx3OJhKLAA58qc5mjKIYGsDAIIeq1R1VR40l8bcjA6a2HE6IVfkMhlgF2_uO8zeAaaz9L-o59IWmpyVrMcHxhRJPDI9jSVQnKCh7BHxqZhdtYEgC4eqFDSyf0dMSrdM6AipJ0K6alS2N2wD6KmRKdwhUntuIL5ZFPZ_y6fujwtbhfM0eS_ft_VfgN7G8X5FekjLmAJNXRm_WJ0FqeHZjg4ZRpNiTBimFtnfbmIy7xC2RDGZdMs3NECG4yeKvrCQkkTOfBIt8hVy4XRwIrgyAnAqNxt3G7r7IESYsIzlI9C5dEwSKc0G7CLUzpgRqvmxM3z2hb-gouPL4GyqsCjKmAflmsJawTLTyx1fy0IQoPYltchc
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:47 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
jot
syndication.twitter.com/i/ Frame 9663
43 B
120 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1644763067852%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22FCP%22%2C%22component%22%3A%22performance%22%2C%22section%22%3A%22main%22%7D%2C%22context%22%3A%22horizon%22%2C%22client_version%22%3A%220a8eea3%3A1643743420422%22%2C%22dnt%22%3Afalse%2C%22widget_id%22%3A%22twitter-widget-0%22%2C%22widget_origin%22%3A%22https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%22%2C%22widget_frame%22%3A%22false%22%2C%22widget_partner%22%3A%22%22%2C%22widget_site_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_site_user_id%22%3A%22%22%2C%22widget_creator_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_creator_user_id%22%3A%22%22%2C%22widget_iframe_version%22%3A%228560430%3A1644275266059%22%2C%22item_ids%22%3A%5B%221490103309834674177%22%5D%2C%22item_details%22%3A%7B%221490103309834674177%22%3A%7B%22item_type%22%3A0%7D%7D%2C%22duration_ms%22%3A1166.7999992370605%7D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.72 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
117
pragma
no-cache
last-modified
Sun, 13 Feb 2022 14:37:47 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ac906bc89b00a2bba54f952bdeb4449414c256567ed48a1e8107c529a04033f4
x-transaction
8dbe38d4b998b769
expires
Tue, 31 Mar 1981 05:00:00 GMT
jot
syndication.twitter.com/i/ Frame BB68
43 B
124 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1644763067853%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22FCP%22%2C%22component%22%3A%22performance%22%2C%22section%22%3A%22main%22%7D%2C%22context%22%3A%22horizon%22%2C%22client_version%22%3A%220a8eea3%3A1643743420422%22%2C%22dnt%22%3Afalse%2C%22widget_id%22%3A%22twitter-widget-1%22%2C%22widget_origin%22%3A%22https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%22%2C%22widget_frame%22%3A%22false%22%2C%22widget_partner%22%3A%22%22%2C%22widget_site_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_site_user_id%22%3A%22%22%2C%22widget_creator_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_creator_user_id%22%3A%22%22%2C%22widget_iframe_version%22%3A%228560430%3A1644275266059%22%2C%22item_ids%22%3A%5B%221490103313521524738%22%5D%2C%22item_details%22%3A%7B%221490103313521524738%22%3A%7B%22item_type%22%3A0%7D%7D%2C%22duration_ms%22%3A1166.5%7D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.72 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
111
pragma
no-cache
last-modified
Sun, 13 Feb 2022 14:37:47 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ac906bc89b00a2bba54f952bdeb4449414c256567ed48a1e8107c529a04033f4
x-transaction
9c3f395398b9431c
expires
Tue, 31 Mar 1981 05:00:00 GMT
jot
syndication.twitter.com/i/ Frame 98AA
43 B
124 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?l=%7B%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1644763067853%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22FCP%22%2C%22component%22%3A%22performance%22%2C%22section%22%3A%22main%22%7D%2C%22context%22%3A%22horizon%22%2C%22client_version%22%3A%220a8eea3%3A1643743420422%22%2C%22dnt%22%3Afalse%2C%22widget_id%22%3A%22twitter-widget-2%22%2C%22widget_origin%22%3A%22https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%22%2C%22widget_frame%22%3A%22false%22%2C%22widget_partner%22%3A%22%22%2C%22widget_site_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_site_user_id%22%3A%22%22%2C%22widget_creator_screen_name%22%3A%22BnkInfoSecurity%22%2C%22widget_creator_user_id%22%3A%22%22%2C%22widget_iframe_version%22%3A%228560430%3A1644275266059%22%2C%22item_ids%22%3A%5B%221490103308421255168%22%5D%2C%22item_details%22%3A%7B%221490103308421255168%22%3A%7B%22item_type%22%3A0%7D%7D%2C%22duration_ms%22%3A1166.1999988555908%7D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.244.42.72 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://platform.twitter.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Sun, 13 Feb 2022 14:37:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
116
pragma
no-cache
last-modified
Sun, 13 Feb 2022 14:37:47 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=631138519
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
ac906bc89b00a2bba54f952bdeb4449414c256567ed48a1e8107c529a04033f4
x-transaction
952511ba4978bfc4
expires
Tue, 31 Mar 1981 05:00:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
774 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=36bb1002701f0000ba1709621800000046a10500&session=6f685451-d3ec-4c5e-8034-6f3ed5c4d5a9&event=active_time_track&q=%7B%22currentTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A48%20GMT%22%2C%22lastTrackTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A47%20GMT%22%2C%22timeSpent%22%3A%221002%22%2C%22totalTimeSpent%22%3A%222005%22%7D&isIframe=false&m=%7B%22description%22%3A%22Meter%2C%20a%20blockchain%20infrastructure%20company%20that%20provides%20multi-chain%20bridging%20and%20allows%20users%20to%20trade%20multiple%20cryptocurrencies%20across%20Ethereum%20and%20other%20public%22%2C%22keywords%22%3A%22Blockchain%2C%20Cross-chain%20platform%2C%20Meter%2C%20Eth%2C%20BSC%22%2C%22title%22%3A%22%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited%22%7D&cb=&r=http%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&pageViewId=a259b793-94db-439c-840f-e847a436535d&an_uid=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.233.140 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-233-140.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:48 GMT
X-Content-Type-Options
nosniff
Connection
keep-alive
Content-Length
43
Pragma
no-cache
Last-Modified
Fri, 21 Feb 2020 18:57:20 GMT
Server
nginx/1.14.0 (Ubuntu)
ETag
"5e502810-2b"
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
Cache-Control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 19 Apr 2000 11:43:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 1F3C
42 B
64 B
Fetch
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstBxVRDgPAGbnnKi8siSJfKjgMCd36DWPKn0mGOxl28KewRPGZwAkcJ0gzTZm7Z1N2Z0uNgvR_WDzJ4ie5nttQ8MLzGN6AaoE4Cjk4hDzybQgtZjl9B&sig=Cg0ArKJSzFEY2-wYdrM0EAE&id=lidar2&mcvt=1000&p=0,0,480,640&mtos=1000,1000,1000,1000,1000&tos=1000,0,0,0,0&v=20220209&bin=7&avms=nio&bs=1600,1200&mc=1&app=0&itpl=3&adk=3082656849&rs=4&la=1&cr=0&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIixbXV0%3D&vs=4&r=v&rst=1644763066467&rpt=130&isd=0&lsd=0&met=mue&wmsd=0
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 13 Feb 2022 14:37:48 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
774 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=36bb1002701f0000ba1709621800000046a10500&session=6f685451-d3ec-4c5e-8034-6f3ed5c4d5a9&event=active_time_track&q=%7B%22currentTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A49%20GMT%22%2C%22lastTrackTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A48%20GMT%22%2C%22timeSpent%22%3A%221002%22%2C%22totalTimeSpent%22%3A%223007%22%7D&isIframe=false&m=%7B%22description%22%3A%22Meter%2C%20a%20blockchain%20infrastructure%20company%20that%20provides%20multi-chain%20bridging%20and%20allows%20users%20to%20trade%20multiple%20cryptocurrencies%20across%20Ethereum%20and%20other%20public%22%2C%22keywords%22%3A%22Blockchain%2C%20Cross-chain%20platform%2C%20Meter%2C%20Eth%2C%20BSC%22%2C%22title%22%3A%22%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited%22%7D&cb=&r=http%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&pageViewId=a259b793-94db-439c-840f-e847a436535d&an_uid=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.233.140 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-233-140.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:49 GMT
X-Content-Type-Options
nosniff
Connection
keep-alive
Content-Length
43
Pragma
no-cache
Last-Modified
Fri, 21 Feb 2020 18:57:20 GMT
Server
nginx/1.14.0 (Ubuntu)
ETag
"5e502810-2b"
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
Cache-Control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 19 Apr 2000 11:43:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
774 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=36bb1002701f0000ba1709621800000046a10500&session=6f685451-d3ec-4c5e-8034-6f3ed5c4d5a9&event=active_time_track&q=%7B%22currentTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A50%20GMT%22%2C%22lastTrackTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A49%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%224008%22%7D&isIframe=false&m=%7B%22description%22%3A%22Meter%2C%20a%20blockchain%20infrastructure%20company%20that%20provides%20multi-chain%20bridging%20and%20allows%20users%20to%20trade%20multiple%20cryptocurrencies%20across%20Ethereum%20and%20other%20public%22%2C%22keywords%22%3A%22Blockchain%2C%20Cross-chain%20platform%2C%20Meter%2C%20Eth%2C%20BSC%22%2C%22title%22%3A%22%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited%22%7D&cb=&r=http%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&pageViewId=a259b793-94db-439c-840f-e847a436535d&an_uid=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.233.140 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-233-140.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:50 GMT
X-Content-Type-Options
nosniff
Connection
keep-alive
Content-Length
43
Pragma
no-cache
Last-Modified
Tue, 05 Oct 2021 22:17:52 GMT
Server
nginx/1.14.0 (Ubuntu)
ETag
"615ccf10-2b"
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
Cache-Control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 19 Apr 2000 11:43:00 GMT
img.gif
b.6sc.co/v1/beacon/
43 B
774 B
Image
General
Full URL
https://b.6sc.co/v1/beacon/img.gif?token=8cde4267f2ac828e1ae5d1fbcd5ef992&svisitor=36bb1002701f0000ba1709621800000046a10500&session=6f685451-d3ec-4c5e-8034-6f3ed5c4d5a9&event=active_time_track&q=%7B%22currentTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A51%20GMT%22%2C%22lastTrackTime%22%3A%22Sun%2C%2013%20Feb%202022%2014%3A37%3A50%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%225009%22%7D&isIframe=false&m=%7B%22description%22%3A%22Meter%2C%20a%20blockchain%20infrastructure%20company%20that%20provides%20multi-chain%20bridging%20and%20allows%20users%20to%20trade%20multiple%20cryptocurrencies%20across%20Ethereum%20and%20other%20public%22%2C%22keywords%22%3A%22Blockchain%2C%20Cross-chain%20platform%2C%20Meter%2C%20Eth%2C%20BSC%22%2C%22title%22%3A%22%244.4%20Million%20Stolen%20From%20Crypto%20Firm%3A%20Multi-Bridge%20Exploited%22%7D&cb=&r=http%3A%2F%2Flinks.ismgcorp.com%2F&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.bankinfosecurity.com%2F44-million-stolen-from-crypto-firm-multi-bridge-exploited-a-18467%3Frf%3D2022-02-12__ACQ_DBT__Slot5_ART18467%26mkt_tok%3DMDUxLVpYSS0yMzcAAAGCjbIUwhQ0tgK9kRp1943abP4o9W0N9Y_trkvVtkSMWqWTZE5eZ6g9CZfZ2lFdUdK6X73VOwdZBy2GW0TOxd_pG9pDGjg-JRPDrAw-yz2hDOYYCZW9uQ&pageViewId=a259b793-94db-439c-840f-e847a436535d&an_uid=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.111.233.140 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-233-140.deploy.static.akamaitechnologies.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bankinfosecurity.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

Date
Sun, 13 Feb 2022 14:37:51 GMT
X-Content-Type-Options
nosniff
Connection
keep-alive
Content-Length
43
Pragma
no-cache
Last-Modified
Fri, 21 Feb 2020 18:57:20 GMT
Server
nginx/1.14.0 (Ubuntu)
ETag
"5e502810-2b"
Access-Control-Max-Age
86400
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
Cache-Control
private, no-cache, no-cache=Set-Cookie, proxy-revalidate
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 19 Apr 2000 11:43:00 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
URL
https://f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com/ondemand-preview-w-255.mp4
Domain
s7.addthis.com
URL
https://s7.addthis.com/static/sh.f48a1a04fe8dbf021b4cda1d.html

Verdicts & Comments Add Verdict or Comment

212 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 object| 7 object| 8 object| 9 object| 10 object| 11 object| 12 object| 13 object| 14 object| 15 object| 16 object| 17 object| 18 object| 19 function| structuredClone function| $ function| jQuery object| jQuery19107097042088252037 object| mejs function| MediaElement object| HtmlMediaElement function| onYouTubePlayerAPIReady function| DefaultPlayer function| MediaElementPlayer number| mce-data-1frpo9aue object| tinyMCE object| tinymce function| des function| des_createKeys function| stringToHex function| hexToString function| readCookie function| disqus_config object| googletag object| top_banner_display object| ensBootstraps object| Bootstrapper object| dataLayer function| atwpjp string| _atd function| _euc function| _duc object| _atc string| _atr object| addthis string| addthis_pub function| emdot object| _ate object| _adr object| addthis_conf function| addthis_open function| addthis_close function| addthis_sendto function| importScript function| cleanExistingScript function| refreshJavascript boolean| __@@##MUH string| base_url string| base_url_auto string| ssl_base string| services_url string| includes_url object| video_intro object| audio_data boolean| rsa_page boolean| ceo_page boolean| interview_page boolean| article_page boolean| is_gatedasset number| videoAskLoginTime number| videoStart boolean| identified_user object| identified_user_data object| gaKeywords string| gaCategories boolean| display_videologin string| current_page string| session_id boolean| user_is_acq object| login_reload_pages object| scrollTopPages string| popup_to_open string| marketo_contact_identification_ajax object| all_states object| all_countries_with_states string| webinar_auto_click_register string| webinar_auto_click_register_slot string| __family__ boolean| exclude_pre_roll object| user_email number| ENTER_KEY object| article_video_caption_id object| highlight number| show_subtitles_speakers string| caption_speakers string| register_source boolean| player_is_running undefined| opened_modal undefined| do_hashchange function| closeCookieTerms function| uncheckGroupInputs function| submitFormPopup function| setMembershipPrices function| updatePriceBox function| forgotPassword function| generateHash2w function| login function| register function| pagination function| scrollTO function| showAlert function| assetPrequalSubmit function| addToBriefcase function| toggleDdlsByValue function| populateStates function| registerFormShowErrors function| recordLead function| initAudio function| initVideos function| initVideoScrolling function| resizeVideoPlayer function| removePlayerFromSidebar function| togglePrePostTime function| jumpSlide function| initVideoEvents function| URLToObj function| timedPopUpCount function| initAutoPopups function| initAJAXpopups function| checkClassicPopupPrequalErrors function| submitPopupAction function| saveToMyJobs function| initEmailSubscriptionsValidation function| emailSubscriptionsUncheckAll function| showPopupOnDemand function| sendAssetEmail function| runStrikesOnMKTLeadIdentification function| mediaMetadataNavigation number| width function| isMobile boolean| isDesktop function| addClassToMenuItem function| addClassToDropDown function| removeClassFromMenuItem function| removeClassFromDropDown function| clearDropDowns function| showDropDown function| hideDropDown function| showDropDown2 function| hideDropDown2 string| disqus_shortname string| disqus_url string| GoogleAnalyticsObject function| ga object| _ml function| CE_READY string| _bizo_data_partner_id string| _linkedin_partner_id object| _linkedin_data_partner_ids function| lintrk object| _6si number| top_banner_display_interval object| jQBrowser boolean| pp_alreadyInitialized boolean| doresize object| scroll_pos string| url boolean| hashtag object| addthis_share object| addthis_config object| DISQUS object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| ggeac object| google_js_reporting_queue object| google_tag_manager function| mktoMunchkinFunction object| Munchkin function| mktoMunchkin boolean| notifications object| oattr object| __twttrll object| twttr object| __twttr function| onYouTubeIframeAPIReady undefined| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken number| google_unique_id object| MunchkinTracker boolean| _already_called_lintrk function| GooglemKTybQhCsO function| google_trackConversion object| GooglebQhCsO boolean| CE_USER_SCRIPT object| CE2 string| CE_USER_DATA_URL string| CE_USER_COMMON_SCRIPT_URL string| CE_USER_THIRDPARTY_SCRIPT_URL object| cntrUpTag object| GoogleGcLKhOms function| showSearch function| hideSearch

29 Cookies

Domain/Path Name / Value
links.ismgcorp.com/ Name: BIGipServersj_mailtracking_http
Value: !ma582Znc4chO9bSPurFYsUVmfdh2KArjh3HAxrPtMO9D4DJnSNBWegbtOJEvxDMqK92ShXHlPGZjW+Y=
www.bankinfosecurity.com/ Name: PHPSESSID
Value: ee4j5o5m6vp2cn9e9k6vgu18vv
www.bankinfosecurity.com/ Name: _advert
Value: false
www.bankinfosecurity.com/ Name: __atuvc
Value: 1%7C7
www.bankinfosecurity.com/ Name: __atuvs
Value: 620917b9da013fd1000
.addthis.com/ Name: uvc
Value: 1%7C7
www.bankinfosecurity.com/ Name: visitorip
Value: 217.64.151.6
.bankinfosecurity.com/ Name: _gid
Value: GA1.2.1754965902.1644763066
.bankinfosecurity.com/ Name: _gat
Value: 1
.bankinfosecurity.com/ Name: _gat_newTracker
Value: 1
.6sc.co/ Name: 6suuid
Value: 36bb1002701f0000ba1709621800000046a10500
www.bankinfosecurity.com/ Name: _an_uid
Value: 0
www.bankinfosecurity.com/ Name: _gd_visitor
Value: ef93746a-b5aa-4e05-835b-40b1db159d9f
www.bankinfosecurity.com/ Name: _gd_session
Value: 6f685451-d3ec-4c5e-8034-6f3ed5c4d5a9
www.bankinfosecurity.com/ Name: _gd_svisitor
Value: 36bb1002701f0000ba1709621800000046a10500
.bankinfosecurity.com/ Name: _ga_XJ8Q4QGGRH
Value: GS1.1.1644763066.1.0.1644763066.0
.bankinfosecurity.com/ Name: _ga
Value: GA1.1.1308156471.1644763066
.bankinfosecurity.com/ Name: _mkto_trk
Value: id:051-ZXI-237&token:_mch-bankinfosecurity.com-1644763066243-47824
.addthis.com/ Name: loc
Value: MDAwMDBFVURFU0wyMjkyMTg2MTAwMzAwMDBDSA==
.bankinfosecurity.com/ Name: __gads
Value: ID=a3eec13f53722c59-22ec09df3ecd00fc:T=1644763066:S=ALNI_MZERZjdSFoGLNiAM9rWd62RMwNNXg
.linkedin.com/ Name: UserMatchHistory
Value: AQJKaYeOP9f3UQAAAX7zhLAmeUMpCHheJJKScMD5-B-_CkaKG8IWcuLwQFd_DeV0-3usOOm43PUmYw
.linkedin.com/ Name: AnalyticsSyncHistory
Value: AQLcmtCIJehIlwAAAX7zhLAm4Dmfvu-OfPNGQaN1kTEKEcKWmc19QDDeToRX83S62sGdiX0Mo1a446fhmY4KKw
.ads.linkedin.com/ Name: lang
Value: v=2&lang=en-us
.linkedin.com/ Name: bcookie
Value: "v=2&6942e35d-294a-496c-8cba-d84858fa0f64"
.linkedin.com/ Name: lidc
Value: "b=OGST00:s=O:r=O:a=O:p=O:g=2651:u=1:x=1:i=1644763066:t=1644849466:v=2:sig=AQH2guJcK1UJWoyuSl223FSwffZSrgnr"
.doubleclick.net/ Name: IDE
Value: AHWqTUkEsOzsvCwArPFeO08anWBqjVyqIGUJrBiCDdyL1XrCD54C-1LkQp19c3IKp3M
.linkedin.com/ Name: lang
Value: v=2&lang=de-de
.www.linkedin.com/ Name: bscookie
Value: "v=1&202202131437460d6fc5fd-5629-41d4-8dae-7ba1fadf0429AQEaJs2t85tB-c2SyGZTy6vYsXJrjUEz"
.linkedin.com/ Name: li_gc
Value: MTswOzE2NDQ3NjMwNjY7MjswMjGzZKD18u/nA32Irsb6LTX/L54B4J2oYH8sKERExWja2A==

2 Console Messages

Source Level URL
Text
network error URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/modernizr.js?s=1644763064.2986
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)
network error URL: https://www.bankinfosecurity.com/javascripts-responsive/vendor/modernizr.js?s=1644763064.2986
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0267f973c7f511eda6a4-193e28812cee85d6e20ea22afb83e185.ssl.cf1.rackcdn.com
051-zxi-237.mktoresp.com
130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com
21aaef15263171502b5a-3fc6a64a094676b060fa7dc8c4490be9.ssl.cf1.rackcdn.com
4a7efb2d53317100f611-1d7064c4f7b6de25658a4199efb34975.ssl.cf1.rackcdn.com
6834b78e8a2b9d8c124bd62b8aeb9bd1.safeframe.googlesyndication.com
6d63d49ccb7c52435540-5070aa97eaa2b8df4eb5a91600e69901.ssl.cf1.rackcdn.com
752b069ec945bee67d86-1021436e05aad7b2347bf3096cc7e309.ssl.cf1.rackcdn.com
75d03c5f1bfbbbb9cc13-369a671ebb934b49b239e372822005c5.ssl.cf1.rackcdn.com
a.disquscdn.com
abs-0.twimg.com
adservice.google.com
adservice.google.de
b.6sc.co
bankinfosecurity.disqus.com
c.6sc.co
c.disquscdn.com
cdn.syndication.twimg.com
cdn01.basis.net
dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com
disqus.com
dnn506yrbagrg.cloudfront.net
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
fa94d5c47256403c613d-7164cafcaac68bfd3318486ab257f999.ssl.cf1.rackcdn.com
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
in.ml314.com
j.6sc.co
links.ismgcorp.com
m.addthis.com
ml314.com
munchkin.marketo.net
nexus.ensighten.com
pagead2.googlesyndication.com
pbs.twimg.com
pixel-a.basis.net
pixel.sitescout.com
platform.twitter.com
px.ads.linkedin.com
px4.ads.linkedin.com
referrer.disqus.com
s7.addthis.com
script.crazyegg.com
secure.adnxs.com
securepubads.g.doubleclick.net
sjs.bizographics.com
snap.licdn.com
stats.g.doubleclick.net
syndication.twitter.com
tpc.googlesyndication.com
v1.addthisedge.com
worker.ismgcorp.com
www.bankinfosecurity.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagmanager.com
www.googletagservices.com
www.linkedin.com
z.moatads.com
f5bd7c2823d8d0533dcb-62d55445ed2ff88556926faa498f48fa.ssl.cf1.rackcdn.com
s7.addthis.com
104.111.233.140
104.111.234.67
104.130.251.6
104.244.42.72
104.244.43.131
108.174.10.14
13.224.98.204
142.250.184.226
142.250.186.162
151.101.64.134
178.79.242.16
18.195.42.228
184.30.24.121
192.28.147.68
199.15.215.8
199.232.196.134
199.232.198.49
2.18.233.88
2.18.235.40
2600:9000:2190:3e00:6:8656:f5c0:93a1
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:234:46c:e8b:1e2f:2bd:694
2606:4700::6813:9408
2620:1ec:21::14
2a00:1450:4001:803::2003
2a00:1450:4001:808::2008
2a00:1450:4001:80f::2002
2a00:1450:4001:80f::2003
2a00:1450:4001:810::2001
2a00:1450:4001:810::2004
2a00:1450:4001:810::200e
2a00:1450:4001:82a::2002
2a00:1450:4001:82b::2002
2a00:1450:4001:82f::2001
2a00:1450:4001:831::2002
2a00:1450:4001:831::200a
2a00:1450:400c:c08::9c
2a03:5f80:a::b212:e7d1
37.252.172.36
50.56.167.254
52.208.138.90
52.72.150.209
66.155.71.149
66.155.71.25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