Submitted URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Effective URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1...
Submission: On January 16 via manual from GB

Summary

This website contacted 60 IPs in 8 countries across 47 domains to perform 318 HTTP transactions. The main IP is 2606:4700::6811:7863, located in United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is www.darkreading.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on December 6th 2019. Valid for: 6 months.
This is the only time www.darkreading.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 199.15.215.8 53580 (MARKETO)
1 11 2606:4700::68... 13335 (CLOUDFLAR...)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
12 2606:4700:303... 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
3 2606:4700:30:... 13335 (CLOUDFLAR...)
3 2606:4700:20:... 13335 (CLOUDFLAR...)
48 2606:4700:30:... 13335 (CLOUDFLAR...)
5 2606:4700:30:... 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 216.58.205.226 15169 (GOOGLE)
9 2606:2800:234... 15133 (EDGECAST)
2 2600:9000:20e... 16509 (AMAZON-02)
1 2606:2800:133... 15133 (EDGECAST)
2 52.211.89.62 16509 (AMAZON-02)
2 2001:4860:480... 15169 (GOOGLE)
13 2a00:1450:400... 15169 (GOOGLE)
2 13.224.196.90 16509 (AMAZON-02)
12 13.224.196.146 16509 (AMAZON-02)
11 172.217.16.194 15169 (GOOGLE)
12 2a00:1450:400... 15169 (GOOGLE)
2 52.31.190.58 16509 (AMAZON-02)
1 1 66.117.28.86 15224 (OMNITURE)
1 4 23.45.99.242 20940 (AKAMAI-ASN1)
5 2a03:2880:f02... 32934 (FACEBOOK)
2 46.105.202.39 16276 (OVH)
9 2a00:1450:400... 15169 (GOOGLE)
2 2620:1ec:c11:... 8068 (MICROSOFT...)
1 52.50.81.152 16509 (AMAZON-02)
2 2606:4700:30:... 13335 (CLOUDFLAR...)
1 2 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2 2600:9000:21f... 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
4 2a03:2880:f12... 32934 (FACEBOOK)
1 2a00:1450:400... 15169 (GOOGLE)
37 23.210.250.213 16625 (AKAMAI-AS)
1 18.196.22.144 16509 (AMAZON-02)
1 216.58.205.230 15169 (GOOGLE)
3 9 52.215.103.126 16509 (AMAZON-02)
1 3.10.14.242 16509 (AMAZON-02)
2 172.217.22.34 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
34 13.224.196.37 16509 (AMAZON-02)
3 2.18.232.7 16625 (AKAMAI-AS)
1 2620:103::192... 19994 (RACKSPACE)
15 2606:2800:134... 15133 (EDGECAST)
1 2 104.244.42.8 13414 (TWITTER)
9 52.206.101.225 14618 (AMAZON-AES)
1 2a02:26f0:f1:... 20940 (AKAMAI-ASN1)
2 104.99.233.143 16625 (AKAMAI-AS)
1 23.45.108.93 20940 (AKAMAI-ASN1)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 4 23.210.248.216 16625 (AKAMAI-AS)
1 3 52.30.34.11 16509 (AMAZON-02)
1 34.206.149.41 14618 (AMAZON-AES)
1 1 23.5.109.152 16625 (AKAMAI-AS)
1 1 35.190.72.21 15169 (GOOGLE)
2 2 52.51.104.248 16509 (AMAZON-02)
2 2 54.246.172.91 16509 (AMAZON-02)
2 3 3.124.210.90 16509 (AMAZON-02)
318 60
Apex Domain
Subdomains
Transfer
48 deusm.com
img.deusm.com
458 KB
44 celtra.com
ads.celtra.com
cache-ssl.celtra.com
track.celtra.com
449 KB
38 moatads.com
z.moatads.com
geo.moatads.com
px.moatads.com
769 KB
19 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
221 KB
16 doubleclick.net
securepubads.g.doubleclick.net
googleads.g.doubleclick.net
stats.g.doubleclick.net
ad.doubleclick.net
googleads4.g.doubleclick.net
118 KB
15 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
ton.twimg.com
137 KB
13 googletagservices.com
www.googletagservices.com
301 KB
12 boltdns.net
cf-images.us-east-1.prod.boltdns.net
53 KB
12 twimgs.com
twimgs.com
78 KB
11 twitter.com
platform.twitter.com
syndication.twitter.com
112 KB
11 darkreading.com
www.darkreading.com
56 KB
10 ml314.com
ml314.com
in.ml314.com
17 KB
8 ubm-us.net
i.ubm-us.net
dsimg.ubm-us.net
1 MB
6 adroll.com
s.adroll.com
d.adroll.com
46 KB
6 teads.tv
a.teads.tv
t.teads.tv
sync.teads.tv
191 KB
5 facebook.com
www.facebook.com
staticxx.facebook.com
400 B
4 facebook.net
connect.facebook.net
202 KB
4 scorecardresearch.com
sb.scorecardresearch.com
3 KB
4 flipboard.com
cdn.flipboard.com
fpn.flipboard.com
6 KB
3 eyeota.net
ps.eyeota.net
898 B
3 gstatic.com
www.gstatic.com
fonts.gstatic.com
109 KB
3 techweb.com
ins.techweb.com
ng.techweb.com
2 KB
3 demdex.net
dpm.demdex.net
ubm.demdex.net
2 KB
3 ubmcanon.com
epromos.ubmcanon.com
67 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1 KB
2 adsrvr.org
match.adsrvr.org
906 B
2 consensu.org
cmp.teads.mgr.consensu.org
d.adroll.mgr.consensu.org
136 B
2 google-analytics.com
www.google-analytics.com
18 KB
2 bing.com
bat.bing.com
8 KB
2 heatmap.it
u.heatmap.it
11 KB
2 omtrdc.net
ubmtech.d3.sc.omtrdc.net
753 B
2 google.de
adservice.google.de
www.google.de
938 B
2 lightreading.com
img.lightreading.com
13 KB
2 google.com
www.google.com
826 B
2 googleapis.com
fonts.googleapis.com
922 B
1 rlcdn.com
idsync.rlcdn.com
391 B
1 bluekai.com
tags.bluekai.com
686 B
1 ytimg.com
s.ytimg.com
10 KB
1 youtube.com
www.youtube.com
1 KB
1 2mdn.net
s0.2mdn.net
121 KB
1 everesttech.net
cm.everesttech.net
554 B
1 linkedin.com
platform.linkedin.com
55 KB
1 googleadservices.com
www.googleadservices.com
10 KB
1 googletagmanager.com
www.googletagmanager.com
28 KB
1 adsnative.com
static.adsnative.com
1 bootstrapcdn.com
maxcdn.bootstrapcdn.com
7 KB
1 pulsesecure.net
go.pulsesecure.net
949 B
318 47
Domain Requested by
48 img.deusm.com www.darkreading.com
securepubads.g.doubleclick.net
www.google-analytics.com
34 cache-ssl.celtra.com ads.celtra.com
www.darkreading.com
go.pulsesecure.net
29 px.moatads.com www.darkreading.com
13 www.googletagservices.com www.darkreading.com
securepubads.g.doubleclick.net
www.googletagservices.com
ad.doubleclick.net
12 cf-images.us-east-1.prod.boltdns.net www.darkreading.com
12 twimgs.com www.darkreading.com
securepubads.g.doubleclick.net
11 pbs.twimg.com www.darkreading.com
platform.twitter.com
11 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
go.pulsesecure.net
11 www.darkreading.com 1 redirects go.pulsesecure.net
www.darkreading.com
10 pagead2.googlesyndication.com www.darkreading.com
9 track.celtra.com www.darkreading.com
9 ml314.com 3 redirects z.moatads.com
ml314.com
9 tpc.googlesyndication.com securepubads.g.doubleclick.net
ad.doubleclick.net
tpc.googlesyndication.com
www.darkreading.com
www.googletagservices.com
9 platform.twitter.com www.darkreading.com
platform.twitter.com
8 z.moatads.com securepubads.g.doubleclick.net
5 dsimg.ubm-us.net www.darkreading.com
4 s.adroll.com 1 redirects www.darkreading.com
s.adroll.com
4 www.facebook.com www.darkreading.com
connect.facebook.net
4 connect.facebook.net www.darkreading.com
connect.facebook.net
4 sb.scorecardresearch.com 1 redirects www.darkreading.com
3 ps.eyeota.net 2 redirects
3 ton.twimg.com platform.twitter.com
www.darkreading.com
3 a.teads.tv securepubads.g.doubleclick.net
a.teads.tv
3 epromos.ubmcanon.com www.darkreading.com
3 i.ubm-us.net www.darkreading.com
2 sync.crwdcntrl.net 2 redirects
2 match.adsrvr.org 2 redirects
2 d.adroll.com
2 t.teads.tv www.darkreading.com
2 syndication.twitter.com 1 redirects www.darkreading.com
2 googleads4.g.doubleclick.net ad.doubleclick.net
2 fpn.flipboard.com 1 redirects www.darkreading.com
2 fonts.gstatic.com securepubads.g.doubleclick.net
go.pulsesecure.net
2 www.google-analytics.com 1 redirects www.googletagmanager.com
2 ins.techweb.com www.darkreading.com
ins.techweb.com
2 bat.bing.com www.darkreading.com
2 u.heatmap.it www.darkreading.com
u.heatmap.it
2 ubmtech.d3.sc.omtrdc.net epromos.ubmcanon.com
2 img.lightreading.com www.darkreading.com
2 www.google.com dsimg.ubm-us.net
www.darkreading.com
2 dpm.demdex.net epromos.ubmcanon.com
www.darkreading.com
2 cdn.flipboard.com www.darkreading.com
2 fonts.googleapis.com www.darkreading.com
go.pulsesecure.net
1 idsync.rlcdn.com 1 redirects
1 tags.bluekai.com 1 redirects
1 in.ml314.com ml314.com
1 d.adroll.mgr.consensu.org 1 redirects
1 s.ytimg.com www.youtube.com
1 www.youtube.com go.pulsesecure.net
1 sync.teads.tv a.teads.tv
1 cmp.teads.mgr.consensu.org a.teads.tv
1 cdn.syndication.twimg.com platform.twitter.com
1 ng.techweb.com twimgs.com
1 s0.2mdn.net www.darkreading.com
1 geo.moatads.com z.moatads.com
1 ad.doubleclick.net www.googletagservices.com
1 staticxx.facebook.com connect.facebook.net
1 ads.celtra.com www.darkreading.com
1 www.google.de www.darkreading.com
1 stats.g.doubleclick.net www.darkreading.com
1 www.gstatic.com www.google.com
1 ubm.demdex.net epromos.ubmcanon.com
1 googleads.g.doubleclick.net www.googleadservices.com
1 cm.everesttech.net 1 redirects
1 adservice.google.de www.googletagservices.com
1 platform.linkedin.com www.darkreading.com
1 www.googleadservices.com www.darkreading.com
1 www.googletagmanager.com www.darkreading.com
1 static.adsnative.com www.darkreading.com
1 maxcdn.bootstrapcdn.com www.darkreading.com
1 go.pulsesecure.net
318 71
Subject Issuer Validity Valid
ssl764998.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-12-06 -
2020-06-13
6 months crt.sh
*.bootstrapcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-09-14 -
2020-10-13
a year crt.sh
sni136658.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2020-01-01 -
2020-07-09
6 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
sni136530.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-10-05 -
2020-04-12
6 months crt.sh
ssl378091.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-22 -
2020-05-30
6 months crt.sh
sni137786.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-18 -
2020-03-26
6 months crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2019-10-31 -
2020-10-09
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
www.googleadservices.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.flipboard.com
DigiCert SHA2 High Assurance Server CA
2019-11-02 -
2021-11-15
2 years crt.sh
platform.linkedin.com
DigiCert SHA2 Secure Server CA
2019-10-10 -
2021-10-14
2 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
www.google.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
img.lightreading.com
Amazon
2019-02-21 -
2020-03-21
a year crt.sh
*.prod.boltdns.net
Amazon
2019-12-19 -
2021-01-19
a year crt.sh
*.google.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.d3.sc.omtrdc.net
DigiCert SHA2 High Assurance Server CA
2019-04-23 -
2020-04-14
a year crt.sh
*.scorecardresearch.com
Sectigo RSA Organization Validation Secure Server CA
2019-12-16 -
2020-12-25
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-12-06 -
2020-03-05
3 months crt.sh
*.heatmap.it
Sectigo RSA Domain Validation Secure Server CA
2019-06-14 -
2020-06-26
a year crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
www.bing.com
Microsoft IT TLS CA 2
2019-04-30 -
2021-04-30
2 years crt.sh
sni244864.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-12-26 -
2020-07-03
6 months crt.sh
www.google.de
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.celtra.com
Go Daddy Secure Certificate Authority - G2
2018-05-15 -
2020-06-15
2 years crt.sh
*.doubleclick.net
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.ml314.com
Amazon
2019-03-16 -
2020-04-16
a year crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
teads.tv
Let's Encrypt Authority X3
2020-01-08 -
2020-04-07
3 months crt.sh
ng.techweb.com
Let's Encrypt Authority X3
2019-12-30 -
2020-03-29
3 months crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
teads.mgr.consensu.org
Let's Encrypt Authority X3
2019-12-05 -
2020-03-04
3 months crt.sh
*.adroll.com
DigiCert SHA2 Secure Server CA
2018-12-19 -
2020-03-19
a year crt.sh
adroll.mgr.consensu.org
Amazon
2019-11-06 -
2020-12-06
a year crt.sh
*.eyeota.net
Let's Encrypt Authority X3
2019-12-02 -
2020-03-01
3 months crt.sh

This page contains 22 frames:

Primary Page: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Frame ID: 32C7CCBE71017CE73AE0CBC764F2999A
Requests: 203 HTTP requests in this frame

Frame: https://ubm.demdex.net/dest5.html?d_nsid=0
Frame ID: 27F615FB70467DA663C10A4BC9C5F99E
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvRwB5UxbOPSjVgkiu1-3YsY2byiUl0G5loYv9HGiy4vqdMlCk7i0B329klTjM44T-ccgwL8h8X9v8k76AFWLRJggBz0B7YDpvpqKA_fhpMVaNo3tQ8pq9J9k7suD_ptj3uCuyKgsMOTIBhp5xOwflbxxQtrcki_UJy4FV_Bbco9G1tuwWoL-yQZyTTru2AhzMmBfa4g_fn8KYcmz6OzdNyOPtB3YuxBbeHOe14L0sd70wqakGbaDS3ccCcNsc89UdnlESGfu1kZcH3BKAXU20Z2ex3w7-ZpfOg7j7lW_yQJt6NQzZdgwp3fkObOXyq4YLnfw&sai=AMfl-YRJtfnYOPntAgDSKkVTog1FmEBEAeT2qrBp0fz99Xm7pfPkm-1FPBzXdI8TyOpTNSE7Sgrm_DX6RrCNav_eOF-4iogR5zLp-osThV9JwA&sig=Cg0ArKJSzFncUQLMPJfFEAE&urlfix=1&adurl=
Frame ID: C2005728A094F1CD388B2D44A708D91C
Requests: 13 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssbc_zEB22sv7wglPjUcnIfbHYC8dOu0a5L8gup6PzoJB1tHRcCXnjLbL88tbMHTGZwqYnhl6ktDpn1Zdbl8uEDEWCzPcyj1xSE0XhZ4P8GhBBXLJvyiuPYVJ6SH5sS9WB0SE5Vv-FOahL-ZTn8RU-Xr6nM8e15PZhgu4SbeWfbJ022jLhMCE8mZzdlZ0UoakZENPoThCg3HipWkCk4ViYfENmOYXduSttwfrrOB1sl01tjT_D2m2Oq9nrBt8-p1saz0ZPkVmAxrTtBUiyl-9XJTwzWkampRnl_&sai=AMfl-YR4ZJeTj21l5Syl8hduwvxeqEmjCFzL3R2csHF4VUr_yEFQwLkygNps9I3qeg0tCb0xA93A5yQppfoaxDxAhTqw5MvrSs0zOdZXEemQew&sig=Cg0ArKJSzDytvjs8nJ9OEAE&urlfix=1&adurl=
Frame ID: 0D2514EF52ADF5C763D136A308A8C7F5
Requests: 8 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssd5hD9L5mhVw4NeCTyyBJ7CnEny9oZsU7aEcrbkjAFjlO_6TAULCbjx262r68zYAbAP3aE2PFbQdEy4kLeZSx4BPf9HGE0mnOUZaqQguUZi9lv0nlHqjMG2SaPIPDR5Yl7lDNtCQ_SqXmpy_CLNBPdMe4gRMp2wj_Rqu1LyCUDTNw0mJL-gNq8kr6-gLuPHoABvJ2GgbOqcQYkGa0wksba1uzFYqB7jIhE4HrkXh55KuKNotgTCvyqiAjzWNuqhId3f5b-BGA35RDSLL5EERe5zhugybm6xuHD&sai=AMfl-YTgOSYbj2N9nDMXtKsIVzfwJMRWP8oIqnoqbzg9AXF3IcFvrBpHVihH5TXChR9eYfx-HWkVhyEZFavwN8hJpcZgwUIGnK7ZbQrBYfYZzw&sig=Cg0ArKJSzAhVn8kUH7jpEAE&adurl=
Frame ID: 4C61639FBD8E4D024A6A35D211865140
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssLdExTCeGPgvSfs-jhdmuzur1497sBh8QH8JlG6hDNPd7I_gvaZmF575hBjOvR97dpsfFHgklbTzblJvkdjJTQgMFn_QP1kff7Kbe_ypoKhxpq3oxLfFKNHh__tjYCpHnUSeBFIHawpmTGlOohDyn3V24q8kCfP2u9QrpfMFbN1fE9HvUbxNOnPjaD-Vd8zgh5YapX_hsSaNo9CPIRf0C8dFM_9FU9lW6LGQ_pG7e77SZNbNladQv_QjG5hRJ8ee5KSEzvSH--9tgIyvjW33H8_VMAVboFwRUCRh9c&sai=AMfl-YSwD2t87XwPV2FZfMqQMwhBPcS_s4UlWSYifEV3v64Q4TP8BeLTWgApU1BilFblB8ri9-7PVoGRwmqoTvR8-Xz6KqDsHPYsxR1ex1or5Q&sig=Cg0ArKJSzGd6sfxF4Bx9EAE&urlfix=1&adurl=
Frame ID: ED9EA15B092A6DAD76983B23FCAAE90B
Requests: 5 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstT1-tuwkFTJVmBFrXpFc7ytC-jqo8ickpnV8NE5BRVgPS-qJ-lstZEE1S-qKs5ODJThlClH6DU2o9n7EiWC1rPog2oX9dvxwNfaPqA0iACfof7JQ6eJlGm6lPdTo2IuHhxZ01zRv4ksVHw7qpb7-UyorJtd5KGPF15pEKkEXABErG4l9MibHapeOHKwgadH38kzP5HXkUMJsC9QlqxQqaBGYl8T31ApYvKlDO2GssdJW5Ul7MFOoqzk3EYpBYJ4i3EesCj-GjZwB3OafyIOrfkLzKYMvM&sai=AMfl-YS9kWaRgD-b6BnU0t77lEvIMNuCn7gGtjHI1CDxSTXxwOgGuOjdSOVyOiQD1Q2fiQ1sVA8NUKANSeOnOJZz-esp8uI9Wb0xWFsEVgJiHg&sig=Cg0ArKJSzARuqpC00BI4EAE&urlfix=1&adurl=
Frame ID: 6E57B5DBBF118E1930C995EA9AF88962
Requests: 14 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsttXiR5mjhrjCsiQTsc_i60qAYEyyngVjti_e3qwyXwwEGex7cC6jHXDbiDacpKnHPxeJpHAxQA6uyWEcsSPWo-9vBV_XYMe9gc4DDG0jZgoHclEOVwO2PIrDxvRyNy73l-V65wigHF9qY-4yf0PD92FosbhUD0lhCp6MtgIked7x4R7zMtcKM3b-atHx-aEXB4F34ibF_2PW7cLvxerUn0ADo_w1XF_tkFLOuc-rw0UajFSKH0BOHxFOgQeghRKTLhtpBvQOgzJPI4PUgvB1Pfsn6LPyoCOtc&sai=AMfl-YTab4ZCicf7e52l8fyGHbS-TL_dHIzMbByJyNoPMxvu_SrBnfndqSblp1zX5jWWUcKP5upObc0euQh8IhyB0O1R8EflV-P1iE57qr57zA&sig=Cg0ArKJSzI62EsW1V3CPEAE&urlfix=1&adurl=
Frame ID: 3A9CA5BAC721EABD1921C2CCA123D417
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstBua9vLe5flZ1emd5fp1D9lddCGaiOVElRiVDKAaOR63Io6CTACT1gyJza1lz46akUaJr0FzeqOf9SUaPLQJ9LIM73AqM5q62cWg1b3RLennAX7pIfOk0Cq9tgbHlnunylnhp5EzNsKn524nHZ5-5HZ1z5Hn3P3ZiS5rRLS3PQRbCGbd02MP6y7vfLfrzlAlP_r_j9TzRMN6824d_zcBDoalmVqO4Eb8jIpMMO3s6h4HO0nPmUgrpcpttVNKiGMejGPHpozMZNrYrYAiA11_rDXQeroZA&sai=AMfl-YSPsz8WLfQamTE_2C1uNKyvIjX-QlY0G-dB8jE2PMgmjUxJxVr3E8gt5IjaxaFbzfaScANkkW1e0fO5Ylid74rufSLgPTBxEF5v1xH4oA&sig=Cg0ArKJSzGAz_eK_0ncSEAE&adurl=
Frame ID: 99A3567AB866B1478255646107FD1030
Requests: 6 HTTP requests in this frame

Frame: https://staticxx.facebook.com/connect/xd_arbiter.php?version=45
Frame ID: 80B1C26C431CEF42300DF7869B743EF8
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Frame ID: 64B8D81A5D547135EC7917DD332606DA
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuf_OwS0SQC1pHJ_pxE2c2ZZPX8mDimPohXSvUbl3W5-dG1P2lx_9AJi3CArOgZ3endQIy2W66bEPd0WsmrQcE82PY9HPdKMQrrxXIqHqBZELnzRJhqIREmddCSs6soDnHhfGPZmhjWmTff_fVxAw-iZZw75j2m0E0RBhXFluhuxZjfn4gkHn_HPAyiJdL25dkQFOMr3AqVJBkCf5ulV2zNpe48M2PZGx1ts6TppAXPoftQlhnoqofS3Z0wAyuybV9TbX9qmI-9mo-050aqAL__YbkItQ&sai=AMfl-YQohlxNXbcwtRoZSoOmJPkvRHmPbncthnql8l0GVDcZxGBTsnGzNDpcgr_4IXMQpqttp5QuVygZBSIExYxKB1ASRfU0hizYboDG1XnrrQ&sig=Cg0ArKJSzNDPePV8t3XMEAE&urlfix=1&adurl=
Frame ID: 0A3867E6AE45BBD8B348D111DA3C668B
Requests: 5 HTTP requests in this frame

Frame: https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Frame ID: 08839D6E782A7E17F0A9CAB58253300C
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html?origin=https%3A%2F%2Fwww.darkreading.com
Frame ID: E666EF74D0C949B79801081A2645A81C
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D45%23cb%3Df32c6a297d8f3a8%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff7d98110fa902c%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Frame ID: 7F81EA76E081188218AF6EE5738B6C3C
Requests: 1 HTTP requests in this frame

Frame: https://ins.techweb.com/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%25253D%25253D&t=P
Frame ID: 67C02CA3AB915543894C81C06C2DF762
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.4f8aea4342a4ada72cba2bdffcff6b4d.en.html
Frame ID: 8D5575ADD1EBB807D4E9627177B34FE1
Requests: 1 HTTP requests in this frame

Frame: https://pbs.twimg.com/card_img/1217099199231250432/JJarF-wj?format=jpg&name=144x144_2
Frame ID: 919E564E2FFCEFC6DC4CE50C3AF12BD9
Requests: 17 HTTP requests in this frame

Frame: https://cmp.teads.mgr.consensu.org/index.html
Frame ID: 0FBC72B239189D87BA49B1762E607A9C
Requests: 1 HTTP requests in this frame

Frame: https://fonts.googleapis.com/css?family=Lato:400&text=%20BCDEGILMORSUVadeor
Frame ID: 3AFF6AF10E0DC75B92671D518A2AB452
Requests: 37 HTTP requests in this frame

Frame: https://sync.teads.tv/iframe?pid=21882&userId=050ac4dc-2aa0-40c6-a001-2a8a91cb9584&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&1579164120753
Frame ID: 475F734CE167C044C263B52E278D88B3
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: DFF515A7BA36C2F1E3B0B1DF6906239C
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q Page URL
  2. https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomw... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • script /\/\/platform\.twitter\.com\/widgets\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

318
Requests

99 %
HTTPS

52 %
IPv6

47
Domains

71
Subdomains

60
IPs

8
Countries

4967 kB
Transfer

10545 kB
Size

34
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q Page URL
  2. https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 90
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1336729&rndserial=13318 HTTP 302
  • https://img.deusm.com/images/spacer.gif
Request Chain 95
  • https://cm.everesttech.net/cm/dd?d_uuid=46218783809276662740980542318954222331 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XiAh1wAAAGL5MVL0
Request Chain 122
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D HTTP 307
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729%25253Fmkt_tok%25253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%2525253D%2525253D&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%25253D%25253D
Request Chain 123
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1579164119865&ns_c=windows-1252&cv=3.1e&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&c9=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1579164119865&ns_c=windows-1252&cv=3.1e&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&c9=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&cs_ak_ss=1
Request Chain 128
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=433056914&t=pageview&_s=1&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&dr=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&ul=en-us&de=windows-1252&dt=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IAhAAUAB~&jid=1890429707&gjid=572506957&cid=1406627327.1579164120&tid=UA-135180592-2&_gid=2082284233.1579164120&_r=1&gtm=2ou181&z=1442448644 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=1406627327.1579164120&jid=1890429707&_gid=2082284233.1579164120&gjid=572506957&_v=j79&z=1442448644
Request Chain 296
  • https://s.adroll.com/j/exp/TQSV74R4GVCSJITSZC2MCP/index.js HTTP 302
  • https://s.adroll.com/j/exp/index.js
Request Chain 297
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/TQSV74R4GVCSJITSZC2MCP?_s=e1b411e7109f8624a4bb7a29115445c1&_b=2 HTTP 302
  • https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=e1b411e7109f8624a4bb7a29115445c1&_b=2
Request Chain 304
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 311
  • https://tags.bluekai.com/site/20486?limit=0&id=3607503481959612454&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=3607503481959612454%26eid=50056 HTTP 302
  • https://ml314.com/csync.ashx?fp=9t0qmMpd99e4zuOK&person_id=3607503481959612454&eid=50056
Request Chain 312
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3607503481959612454 HTTP 307
  • https://ml314.com/csync.ashx?fp=57d9537f7f0bf3d2b560bd07473b9e484099ce952c838ba58d4ca00894f213c0f4cb09cee1a4f8eb&person_id=3607503481959612454&eid=50082
Request Chain 313
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1 HTTP 302
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=bd606477-3b12-432e-9a60-78bd1307bdbb HTTP 302
  • https://ml314.com/csync.ashx?fp=bd606477-3b12-432e-9a60-78bd1307bdbb&person_id=3607503481959612454&eid=53819
Request Chain 314
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3607503481959612454 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3607503481959612454 HTTP 302
  • https://ml314.com/csync.ashx?fp=6f948eae1308f8aa48456acb623e447a&eid=50146&person_id=3607503481959612454
Request Chain 315
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif HTTP 302
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2cNJ8oNYPo_5q5f_zXEYu3FNDL9myAuZ0DhgliS4xzMw&gdpr=1&gdpr_consent=&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil HTTP 302
  • https://ml314.com/csync.ashx?fp=2cNJ8oNYPo_5q5f_zXEYu3FNDL9myAuZ0DhgliS4xzMw&person_id=3607503481959612454&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil HTTP 302
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil

318 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set b0000fNNzSz0Ex7N030Ir4q
go.pulsesecure.net/
663 B
949 B
Document
General
Full URL
http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
HTTP/1.1
Server
199.15.215.8 , United States, ASN53580 (MARKETO - MARKETO, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Host
go.pulsesecure.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:58 GMT
Server
Apache
Cache-Control
private, no-cache, no-store, max-age=0
Connection
close
X-Content-Type-Options
nosniff
Vary
Accept-Encoding
Content-Encoding
gzip
Transfer-Encoding
chunked
Content-Type
text/html
Set-Cookie
BIGipServersj_mailtracking_http=!lHIwsCYgoK3DUQbInuzRy4alk/3R/g+r1IpW7+tJPJYavZzxUjfLmklt67vNIl+jIOaB6c/Yyq+iQaQ=; path=/; Httponly
Primary Request 1336729
www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/
172 KB
31 KB
Document
General
Full URL
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
42800527dfe870af0defcd4a6decd06c99eb1a18f32c7f99334369b12957047e
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

:method
GET
:authority
www.darkreading.com
:scheme
https
:path
/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
navigate
referer
http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q

Response headers

status
200
date
Thu, 16 Jan 2020 08:41:59 GMT
content-type
text/html
set-cookie
__cfduid=db84c79f0b7b689e98385b76ac652d18b1579164118; expires=Sat, 15-Feb-20 08:41:58 GMT; path=/; domain=.darkreading.com; HttpOnly; SameSite=Lax darkreading_lastvisit=1/16/2020 3:41:58 AM; expires=Tue, 16-Jan-2035 07:41:58 GMT; path=/; HttpOnly darkreading_lastvisit=1/16/2020 3:41:58 AM; expires=Tue, 16-Jan-2035 07:41:58 GMT; path=/; HttpOnly cplChannelTagID=; path=/; secure darkreading%2Dmeter=1336729; expires=Fri, 17-Jan-2020 05:00:00 GMT; path=/ darkreading%5Fvisits=2; expires=Tue, 16-Jan-2035 05:00:00 GMT; path=/ gatewayChecked=; path=/; secure
vary
Accept-Encoding
cache-control
private
x-pingback
http://www.staging.new.informationweek.com/xmlrpc.asp
x-powered-by
ASP.NET
x-frame-options
SAMEORIGIN
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
555ecb1c880dc295-FRA
content-encoding
gzip
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/
30 KB
7 KB
Stylesheet
General
Full URL
https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:3b , Netherlands, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
/
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
last-modified
Wed, 12 Dec 2018 18:35:20 GMT
access-control-allow-origin
*
etag
"1544639720"
vary
Accept-Encoding
x-cache
HIT
content-type
text/css; charset=utf-8
status
200
cache-control
public, max-age=31536000
x-hello-human
Say hello back! @getBootstrapCDN on Twitter
accept-ranges
bytes
timing-allow-origin
*
content-length
7050
common-footer.css
twimgs.com/nojitter/css/
9 KB
2 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/common-footer.css?
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3eea91bd1f33507891a2909689d21be3a6e0fb1b688037c2a7d59c042503d910

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 09 Jan 2020 06:37:35 GMT
server
cloudflare
age
2768
etag
W/"23cf-59baf3e93a9c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
555ecb22ccf09710-FRA
css
fonts.googleapis.com/
2 KB
602 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
05eefbc28891b7d7ccb5564f27132a6ddb5f7c7dff3ba19ae376b35e356b05ed
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Thu, 16 Jan 2020 08:41:59 GMT
server
ESF
access-control-allow-origin
*
date
Thu, 16 Jan 2020 08:41:59 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
darkreading.css
twimgs.com/nojitter/css/
17 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/darkreading.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cf167be72549318f78f8c03d0d93b923f8e8e290acec47b870a1cede920e859b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 09:38:14 GMT
server
cloudflare
age
4988
etag
W/"45f8-54e22b7428d80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
555ecb22ccf19710-FRA
pano-framework.css
www.darkreading.com/styles/
128 KB
10 KB
Stylesheet
General
Full URL
https://www.darkreading.com/styles/pano-framework.css?v1.27
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
e9b216c18a520089ac2a2bbb7881baf067da96f01ba42284ec42e096c0e13ef4
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
age
3677
x-powered-by
ASP.NET
status
200
last-modified
Tue, 07 Jan 2020 07:22:15 GMT
server
cloudflare
etag
W/"352ed22f2bc5d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/css
cache-control
public, max-age=7200
cf-ray
555ecb22aa19c295-FRA
expires
Thu, 16 Jan 2020 10:41:59 GMT
styles.css
www.darkreading.com/styles/
292 B
307 B
Stylesheet
General
Full URL
https://www.darkreading.com/styles/styles.css?v7
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
a8fc74838ba253a4076b8eb46aeed79c10341380609dcfe11bed40d974d1fd10
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
age
3677
x-powered-by
ASP.NET
status
200
last-modified
Mon, 03 Apr 2017 14:07:01 GMT
server
cloudflare
etag
W/"d632e39083acd21:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/css
cache-control
public, max-age=7200
cf-ray
555ecb22aa1dc295-FRA
expires
Thu, 16 Jan 2020 10:41:59 GMT
dr_nativead.css
i.ubm-us.net/oas/nativead/css/
2 KB
929 B
Stylesheet
General
Full URL
https://i.ubm-us.net/oas/nativead/css/dr_nativead.css?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5932acd6c5f2796f354dedc5e8dfe30e206787365186bbf0f9789d083472a75

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 06 Feb 2019 18:48:56 GMT
server
cloudflare
age
4368
etag
W/"861-5813e2d913600"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-polished
origSize=2145
cf-ray
555ecb22d8806383-FRA
cf-bgj
minify
nativead.js
i.ubm-us.net/oas/nativead/js/
1 KB
469 B
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/nativead.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
984cd1fa5dd20c2b1b8fd77b6bb876a3a211cdf14aaaed6bc1481e3c98027544

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 30 Jul 2015 14:31:41 GMT
server
cloudflare
age
85760
cf-polished
origSize=1373
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
555ecb22d8826383-FRA
cf-bgj
minify
dr_nativead.js
i.ubm-us.net/oas/nativead/js/
8 KB
1 KB
Script
General
Full URL
https://i.ubm-us.net/oas/nativead/js/dr_nativead.js?v3
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7875 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b309c9c4a6c27c7cfc64ab2bc7f545e8d7b41a795c46202ab2a9c633f7128287

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 06 Oct 2017 16:50:20 GMT
server
cloudflare
age
59640
cf-polished
origSize=8434
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
555ecb22d8836383-FRA
cf-bgj
minify
respond.min.js
www.darkreading.com/script/
4 KB
2 KB
Script
General
Full URL
https://www.darkreading.com/script/respond.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
cf7bdb0487590885c13a3cc0a2a1450b3ac649a465de267af12f552be8bcb5fe
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
age
4369
x-powered-by
ASP.NET
status
200
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
555ecb22aa26c295-FRA
expires
Thu, 16 Jan 2020 10:41:59 GMT
jquery.mobile.custom.min.js
www.darkreading.com/script/
8 KB
3 KB
Script
General
Full URL
https://www.darkreading.com/script/jquery.mobile.custom.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
b4cf7d6d50b6a36f070f6c49e975198a9a8930838695b64e480bf1f6199f0572
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
age
3677
x-powered-by
ASP.NET
status
200
last-modified
Mon, 22 Sep 2014 21:04:30 GMT
server
cloudflare
etag
W/"03ccda8d6cf1:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
555ecb22aa2ac295-FRA
expires
Thu, 16 Jan 2020 10:41:59 GMT
complete.js
twimgs.com/nojitter/js/
45 KB
9 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/complete.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8420f59cd348cf0e10e05482724523ad6b83f88467bbfacf6826eaadd3a03985

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:04:53 GMT
server
cloudflare
age
20162
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
555ecb22ccf79710-FRA
jquery-1.11.min.js
twimgs.com/nojitter/js/
94 KB
32 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery-1.11.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 06:05:04 GMT
server
cloudflare
age
83484
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
555ecb22ccf99710-FRA
darkreading.js
twimgs.com/nojitter/darkreading/
27 KB
4 KB
Script
General
Full URL
https://twimgs.com/nojitter/darkreading/darkreading.js?v9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5a37d18a14fb428d01bfe23b0e28db9b7a189e886513a7098683cb01f0929ee

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 23 Apr 2018 13:44:42 GMT
server
cloudflare
age
63038
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
555ecb22ccf59710-FRA
VisitorAPI.js
epromos.ubmcanon.com/
45 KB
15 KB
Script
General
Full URL
https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
aa92b44ae441805b86a9603ffea3890a8df348fb2269d716c557b6970c11e9f4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Tue, 24 Apr 2018 23:42:00 GMT
server
cloudflare
age
4565
etag
W/"1010b6-b435-56aa0b35ea1a3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
max-age=14400
cf-ray
555ecb22ffafd6f1-FRA
at.js
epromos.ubmcanon.com/
106 KB
32 KB
Script
General
Full URL
https://epromos.ubmcanon.com/at.js?ormzkk
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
42eb48be2f9f6fc91fcda10af9802cb6aa0733e2dd007c224570ae6ece3dac33

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 12 Apr 2018 15:42:52 GMT
server
cloudflare
age
4716
etag
W/"1000c4-1a7c1-569a89bca3df7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
max-age=14400
cf-ray
555ecb22ffb2d6f1-FRA
informa-iribbon.css
img.deusm.com/darkreading/
2 KB
1 KB
Stylesheet
General
Full URL
https://img.deusm.com/darkreading/informa-iribbon.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
1ae4b8548f250831a2443bd449af625f6331b7c72e1f408789642a3050596d45

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 25 Apr 2019 07:05:41 GMT
server
cloudflare
age
3310
etag
W/"cea-58755722bdb40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cf-polished
origSize=3306
cf-ray
555ecb230eda9814-FRA
cf-bgj
minify
informa-iribbon.js
img.deusm.com/darkreading/
489 B
291 B
Script
General
Full URL
https://img.deusm.com/darkreading/informa-iribbon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fb295c2a72d39784b18a1d2d5b0c9976807f7cf010fe730b86d43bc55b0ae251

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 25 Apr 2019 07:05:52 GMT
server
cloudflare
age
4986
etag
W/"229-5875572d3b400"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-polished
origSize=553
cf-ray
555ecb230edb9814-FRA
cf-bgj
minify
cookie_banner.js
www.darkreading.com/script/
2 KB
784 B
Script
General
Full URL
https://www.darkreading.com/script/cookie_banner.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
020d8d4a55a5f088527c3c75c3ac4920b8f190393f841071d6f3d00807e07abc
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
age
3677
x-powered-by
ASP.NET
status
200
last-modified
Mon, 06 Jan 2020 08:32:43 GMT
server
cloudflare
etag
W/"b753a1dd6bc4d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
555ecb22aa2cc295-FRA
expires
Thu, 16 Jan 2020 10:41:59 GMT
jplayer.blue.monday.css
twimgs.com/nojitter/css/
12 KB
3 KB
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/jplayer.blue.monday.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0a4f12795a11d0957a7e476cdd2516967e3e00f54841456fbd8c0dd607984d92

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:28:28 GMT
server
cloudflare
age
5524
etag
W/"2f89-54ec1d5e89f00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
555ecb22ccf29710-FRA
style.css
twimgs.com/nojitter/css/
912 B
661 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3a08be5766c0e198ba8171f7decd09065c08a5c850276325cc1792f25e7b356e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 05 May 2017 07:30:36 GMT
server
cloudflare
age
5523
etag
W/"390-54ec1dd89bf00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
555ecb22ccf39710-FRA
jquery.jplayer.min.js
twimgs.com/nojitter/js/
48 KB
11 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.jplayer.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cddbf405266cd4b3e66229592e63666012dbceaaad02635af5da9d303bfd3ed1

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:20:55 GMT
server
cloudflare
age
20162
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
555ecb22ccfb9710-FRA
jquery.tablesorter.min.js
twimgs.com/nojitter/js/
16 KB
5 KB
Script
General
Full URL
https://twimgs.com/nojitter/js/jquery.tablesorter.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b90279154254e108748dc80dd226eab336e2c320e4a40569952b46dc5d785536

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 27 Apr 2017 11:21:05 GMT
server
cloudflare
age
20162
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=86400
cf-ray
555ecb22ccfa9710-FRA
ubm-widget-style.css
dsimg.ubm-us.net/ubm-widget/css/
29 KB
5 KB
Stylesheet
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/css/ubm-widget-style.css
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6414656f939f73a463499bd2c5a8f75793658adf6e05d0e4cd61d1ba36636b94

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 16:31:21 GMT
server
cloudflare
age
6746
etag
W/"7393-569952b4c0840"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-polished
origSize=29587
cf-ray
555ecb22da58c286-FRA
cf-bgj
minify
ubm-widget-min.js
dsimg.ubm-us.net/ubm-widget/js/
192 KB
50 KB
Script
General
Full URL
https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ffcaeef328a1e67717f714997426aaf936e4b9d378a5fbe1bd2a063dfeb50750

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 11 Apr 2018 17:29:33 GMT
server
cloudflare
age
6424
etag
W/"2fe99-56995fb6fbbe3"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
555ecb22da5bc286-FRA
ng_forms.js
www.darkreading.com/script/
31 KB
7 KB
Script
General
Full URL
https://www.darkreading.com/script/ng_forms.js?v7.9
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
ccb577fe731d9954057d10cd6d941eef90e15af6d1b0e4b1469f0ad3af3e84e4
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
age
3677
x-powered-by
ASP.NET
status
200
last-modified
Wed, 09 Oct 2019 11:57:33 GMT
server
cloudflare
etag
W/"28b83cbc987ed51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
555ecb22aa2ec295-FRA
expires
Thu, 16 Jan 2020 10:41:59 GMT
widget-extra.css
twimgs.com/nojitter/css/
443 B
294 B
Stylesheet
General
Full URL
https://twimgs.com/nojitter/css/widget-extra.css?v1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
61494fd1b573b217034bef7e22044bda91962797d68efada6726910d32bb995b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 13 Sep 2017 07:28:37 GMT
server
cloudflare
age
5523
etag
W/"1bb-5590d1ba81340"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
555ecb22ccf49710-FRA
render.v1.js
static.adsnative.com/static/js/
0
0
Script
General
Full URL
https://static.adsnative.com/static/js/render.v1.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f508 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

js
www.googletagmanager.com/gtag/
73 KB
28 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-135180592-2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
1f1d924b97e405e211e82fb02873c87a59c7da3b73c5bf25a6690981db117a41
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
last-modified
Thu, 16 Jan 2020 06:00:00 GMT
server
Google Tag Manager
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
27820
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
conversion.js
www.googleadservices.com/pagead/
25 KB
10 KB
Script
General
Full URL
https://www.googleadservices.com/pagead/conversion.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.205.226 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s24-in-f2.1e100.net
Software
cafe /
Resource Hash
cfb90d46aa5d683367d752c0ffb2e764c4e2cdfa9e401617bf68b346e1936278
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9818
x-xss-protection
0
server
cafe
etag
2504667413935233420
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Thu, 16 Jan 2020 08:41:59 GMT
adblockDetector.js
www.darkreading.com/prestitial/
116 B
224 B
Script
General
Full URL
https://www.darkreading.com/prestitial/adblockDetector.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
3f81e097214e8827172d879ab5ceea8fc8c1c9265830fd1d2938d1cc2b3f0528
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
age
3561
x-powered-by
ASP.NET
status
200
last-modified
Wed, 29 May 2019 04:12:00 GMT
server
cloudflare
etag
W/"aa108aad415d51:0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/x-javascript
cache-control
public, max-age=7200
cf-ray
555ecb22ba55c295-FRA
expires
Thu, 16 Jan 2020 10:41:59 GMT
iwk-it-network-dr.gif
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/iwk-it-network-dr.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d6df7d1f2b9c65c06c5ae1e798650b6c388f26f6852b8814f942557d712b9745

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Wed, 02 Nov 2016 13:53:05 GMT
server
cloudflare
age
4982
etag
"abc-54051c29ab240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
555ecb230edc9814-FRA
content-length
2748
DR_mobile_User_nav.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_User_nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b02cdb496b954e874c4b87d48eb1ea16f088258786ed0d2f0771acc3d01649e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
4981
etag
"5be-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb236f479814-FRA
content-length
1470
spacer.gif
img.deusm.com/images/
49 B
152 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
age
4983
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
555ecb23bfc29814-FRA
content-length
49
DR_search.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_search.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
dafb72bcf008c9b9754482b88e8ba8b8e854f1a69483f0753b1c3f12101c1a9f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
3307
etag
"7e9-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb23cfe39814-FRA
content-length
2025
DR_mobile_SM.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_mobile_SM.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
bfc1797e85a0565d0cfba1621eac801dc5ebd78a02f45e0ab8de5c6c2eb3f987

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
4981
etag
"864-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb23d80b9814-FRA
content-length
2148
DR-sections-nav.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-sections-nav.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f89a03faa36f0b6eeb92b9a8f0b8d2f9d3e564ba8bf13bb169bf05b126ca81e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:03 GMT
server
cloudflare
age
4981
etag
"9aa-4f2ebd21a06c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb23f8419814-FRA
content-length
2474
mobile_close.jpg
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/mobile_close.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b5c543f59d71e1e4f6b51c896febf86975206dcf9e34757f475b125d64d16ea6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 13 Mar 2014 12:44:20 GMT
server
cloudflare
age
4981
etag
"638-4f47c4fdf5100"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
555ecb2418769814-FRA
content-length
1592
DR_logo_314x49.png
img.deusm.com/darkreading/
7 KB
7 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_logo_314x49.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0615fb751c4db849533b1e432f05428e307591466902876f8ab30d7873b7f38b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Mon, 15 Oct 2018 10:02:43 GMT
server
cloudflare
age
3303
etag
"1b78-5784189c2b6f8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2438b59814-FRA
content-length
7032
DR_Newsletters.png
img.deusm.com/darkreading/
4 KB
4 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR_Newsletters.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
33194e1b282eaf349b01b68de4fee20452ff6877b4b82605d5c68c5132444f96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Wed, 18 Sep 2019 13:04:00 GMT
server
cloudflare
age
3303
etag
"fec-592d378715000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2448cb9814-FRA
content-length
4076
Jai-Vijayan.jpg
img.deusm.com/informationweek/
11 KB
11 KB
Image
General
Full URL
https://img.deusm.com/informationweek/Jai-Vijayan.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2e9b6fed568a85ee88f1eb2aa1d51cb2073d907cbb0109a5dd703f0b1e5651d6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Mon, 29 Sep 2014 13:34:14 GMT
server
cloudflare
age
3303
etag
"2c67-5043452972180"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
555ecb2458dc9814-FRA
content-length
11367
editor-TW.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-TW.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
32821e69d091e71a62b9dbefcd09516c2133b50c50a3f8d597207d9cab5d59b8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
3302
etag
"60d-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2458dd9814-FRA
content-length
1549
editor-IN.png
img.deusm.com/informationweek/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-IN.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e5cc2027e2da5b3d553fba6a4d2d7276aafa604001e9b0321e18d1fd62b03b3f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
3301
etag
"5b7-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468e29814-FRA
content-length
1463
editor-RSS.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8f4fa7376444ffe05d0f7b296439401fb9729bdee84d760ee6286e7b663c753

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:41 GMT
server
cloudflare
age
3300
etag
"6fa-4eb2828b4cf40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468e39814-FRA
content-length
1786
editor-email.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/editor-email.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
190f689e0f479324a217a5ea88c1acc132b66d24b16559052d59b892ff5dcba2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 14 Nov 2013 19:33:40 GMT
server
cloudflare
age
3300
etag
"70f-4eb2828a58d00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468e59814-FRA
content-length
1807
DR-comment.png
img.deusm.com/darkreading/
1011 B
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
63484bd691450c081b848e5159315bfcd02720741d3f72a69717643d6630e578

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
age
4982
etag
"3f3-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468e89814-FRA
content-length
1011
thumbs-up.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/thumbs-up.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9111d9514a49ad97e7c6d5fd97a00f3232b73537e9155726f32f123eb69b5a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:09:21 GMT
server
cloudflare
age
3300
etag
"607-4f4934ae90e40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468e99814-FRA
content-length
1543
thumbs-down.png
img.deusm.com/informationweek/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/informationweek/thumbs-down.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b19f14d674857362b6e10d0dcb1703b149d9dda6f350d1737562fc36e4e67a81

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:20:31 GMT
server
cloudflare
age
3300
etag
"624-4eba0acaa9dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468ea9814-FRA
content-length
1572
email-decode.min.js
www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
807 B
Script
General
Full URL
https://www.darkreading.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
last-modified
Wed, 15 Jan 2020 12:58:16 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
etag
W/"5e1f0c68-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=172800, public
cf-ray
555ecb22fafbc295-FRA
expires
Sat, 18 Jan 2020 08:41:59 GMT
widgets.js
platform.twitter.com/
95 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
4dced00354b099d831f860145bbd0149f99889d4c45632e4d9e849f008123866

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:50:12 GMT
Server
ECS (fcn/419E)
Etag
"09356930f7674f04e767f5b1203faeb7+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
28838
flipboard_srsw.png
cdn.flipboard.com/badges/
322 B
762 B
Image
General
Full URL
https://cdn.flipboard.com/badges/flipboard_srsw.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:fc00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
44fc0a3d10c47ae5aa6c77c76b4b8f81aa08022ca464ef235005ddd86570eb5b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 15 Jan 2020 22:14:51 GMT
via
1.1 c7f7b4cf7fd5efe64bac95586db3f62b.cloudfront.net (CloudFront)
last-modified
Wed, 07 Feb 2018 22:03:59 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1518040945/ctime:1518040834/gid:20/gname:staff/md5:37351783e1813119a3e0710c16137273/mode:33152/mtime:1518064798/uid:502/uname:jlee
age
37629
etag
"37351783e1813119a3e0710c16137273"
x-cache
Hit from cloudfront
content-type
image/png
status
200
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
322
x-amz-cf-id
IORQaJ87Swr8BoRzKtvQ_jsi4Tjpy4NMyTaCPggXowls7IDk7sFwnA==
flbuttons.min.js
cdn.flipboard.com/web/buttons/js/
7 KB
4 KB
Script
General
Full URL
https://cdn.flipboard.com/web/buttons/js/flbuttons.min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:fc00:e:5a70:ca47:86e1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8e7ad8de87781f6ad65b36a7d3243b44d80dc182df6af076484a2bec85051550

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 24 Oct 2019 19:55:05 GMT
content-encoding
gzip
last-modified
Wed, 11 Oct 2017 00:24:00 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:502/gname:staff/uname:alee/gid:20/mode:33188/mtime:1507680760/atime:1507680783/md5:ec6e4306e5e274d25c4f9afde663da81/ctime:1507680760
age
43836
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA2-C1
x-amz-cf-id
m70zCpGsKS9KvIvi7_IpoY2UBS2R7tof1_5KXGRb9_Z9loICO577Lw==
via
1.1 c7f7b4cf7fd5efe64bac95586db3f62b.cloudfront.net (CloudFront)
in.js
platform.linkedin.com/
181 KB
55 KB
Script
General
Full URL
https://platform.linkedin.com/in.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:133:7403:4a68:7eff:710b:1ddf , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F0A) /
Resource Hash
9a9285426a94bb895f4e1b03b7686dd49eeb765708f544b21ab375817cd58169

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Content-Encoding
gzip
X-CDN-CLIENT-IP-VERSION
IPV6
X-CDN
ECST
X-Cache
HIT
X-CDN-Proto
HTTP1
NEL
{"report_to":"network-errors","max_age":1296000,"success_fraction":0.00066,"failure_fraction":1,"include_subdomains":true}
X-Li-Pop
prod-edc2
Content-Length
55596
X-LI-UUID
H9Erz7RQ6hWwKshjfCsAAA==
Last-Modified
Thu, 16 Jan 2020 08:29:16 GMT
Server
ECAcc (frc/8F0A)
Vary
Accept-Encoding
Report-To
{"group":"network-errors","max_age":2592000,"endpoints":[{"url":"https://www.linkedin.com/li/rep"}],"include_subdomains":true}
Content-Type
text/javascript; charset=UTF-8
Cache-Control
public, max-age=3600
Accept-Ranges
bytes
X-LI-Proto
http/1.1
X-Li-Fabric
prod-lva1
Expires
Thu, 16 Jan 2020 09:29:16 GMT
Edgepromohorizontal.jpg
img.deusm.com/darkreading/MarilynCohodas/
12 KB
12 KB
Image
General
Full URL
https://img.deusm.com/darkreading/MarilynCohodas/Edgepromohorizontal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7259b4d8e7ac33a579f3a8df3b0eb3fa9c0818ae203fb58b45564cf4d2057ca4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Tue, 27 Aug 2019 12:24:47 GMT
server
cloudflare
age
3300
etag
"2f0f-591185baf21c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
555ecb2468ec9814-FRA
content-length
12047
DR-user.jpg
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-user.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d4b95126382745e9e07d76812e3bbc8d6de2cfa6356c586f930ece7d4acb8052

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Tue, 04 Mar 2014 15:58:18 GMT
server
cloudflare
age
3300
etag
"97d-4f3c9f8faba80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
555ecb2468ed9814-FRA
content-length
2429
lightreading_cropped_635201064811931964.jpg
dsimg.ubm-us.net/user/15111803/86143/
14 KB
14 KB
Image
General
Full URL
https://dsimg.ubm-us.net/user/15111803/86143/lightreading_cropped_635201064811931964.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c23174343e12f3cc9db1f4e6c9ed2528206c45efec68825a90dff4719d966111

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 15 Nov 2013 15:01:21 GMT
server
cloudflare
age
3344
etag
"3911-4eb38789b9240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
max-age=14400
accept-ranges
bytes
cf-ray
555ecb245f23c286-FRA
content-length
14609
id
dpm.demdex.net/
362 B
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.1.2&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=77FB1CFE532B22840A490D45%40AdobeOrg&d_nsid=0&ts=1579164119541
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.211.89.62 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-211-89-62.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
d8d22c9c2208db881b135d7d289fc90538f2f796180083ad9ad28f7ff38a203d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v057-0a9a7a607.edge-irl1.demdex.com 5.64.3.20200108083203 4ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-TID
e47kasuvTns=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.darkreading.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
299
Expires
Thu, 01 Jan 1970 00:00:00 GMT
api.js
www.google.com/recaptcha/
784 B
659 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Requested by
Host: dsimg.ubm-us.net
URL: https://dsimg.ubm-us.net/ubm-widget/js/ubm-widget-min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:34::75 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
GSE /
Resource Hash
d8141184754b956d72c40c041bf0c6beb9a0d0a96b78ed6959c15ec4c86af297
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
485
x-xss-protection
1; mode=block
expires
Thu, 16 Jan 2020 08:41:59 GMT
gpt.js
www.googletagservices.com/tag/js/
52 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c1cc4fea07fdd5461708a40355c9c5defc410fb0baa38c1479cbfb18a992d17d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"399 / 352 of 1000 / last-modified: 1579125410"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
16026
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
Seth-Blank.png
img.deusm.com/darkreading/authors/
77 KB
77 KB
Image
General
Full URL
https://img.deusm.com/darkreading/authors/Seth-Blank.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9df0f709444699a3796672c0d336a787fab5ec9acd4eb4f8990fc8adafbda2a5

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 19 Dec 2019 23:24:26 GMT
server
cloudflare
age
3299
etag
"13397-59a16dcaf7e80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468ee9814-FRA
content-length
78743
CurtisFranklin_125x125.gif
img.lightreading.com/enterpriseefficiency/
12 KB
12 KB
Image
General
Full URL
https://img.lightreading.com/enterpriseefficiency/CurtisFranklin_125x125.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.90 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-90.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
1c2ecd3ede424a34de162da4fdb7bb81feadf657f1984b86a47f8769e6a4453d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 01:55:52 GMT
via
1.1 5a5b94c62ea85e0c0d78b169589b08b5.cloudfront.net (CloudFront)
last-modified
Fri, 20 Jun 2014 19:04:51 GMT
server
AmazonS3
age
24368
etag
"be1aa4bea644bff19f530fb030db64de"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
12440
x-amz-cf-id
eAbSpT0c4U0_8yakTGEE-njx0vSu-0CKZdlbJ3XIqkIU3gvnvYANYg==
NL-icon.png
img.deusm.com/informationweek/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-icon.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d8b7ea5cc75abc79d502a95c5ccac8f97aa82fd8c13acc74c84c754eb86cc4c3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
age
3299
etag
"a27-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468ef9814-FRA
content-length
2599
video-arrow_left_off.gif
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_left_off.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f61400081191bf755c967c186a8fd356b02010fac3412f84cf83d5dfe10dd5d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 16:02:37 GMT
server
cloudflare
age
3299
etag
"53e-4f49332d48140"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
555ecb2468f19814-FRA
content-length
1342
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/fa726b0a-898c-4556-9c4e-8513ab3eb45d/11ab51b4-e776-4639-97c3-07e5210bfd9d/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/fa726b0a-898c-4556-9c4e-8513ab3eb45d/11ab51b4-e776-4639-97c3-07e5210bfd9d/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
fdb0066a030a45bd44f17d459c6369901b3fa648c94de3afa0f824d87dfd1527

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 15 Jan 2020 21:33:00 GMT
Via
1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
40139
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
lbJzSe_eOfd21j7-LCG6qqundCHRXQ7vWZ37m55xXUah924PzVHfaQ==
comment.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/comment.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4f65ccd30d1c95588b51035a804dd49090d7fbe6c2829a576a31d1b6a3e0f86b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Wed, 20 Nov 2013 19:22:53 GMT
server
cloudflare
age
3299
etag
"446-4eba0b5215d40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468f39814-FRA
content-length
1094
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/2fe20654-2cfe-4555-8102-d79cc405847e/0e955e8e-0506-45e1-b715-3062ef29198b/160x90/match/
5 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/2fe20654-2cfe-4555-8102-d79cc405847e/0e955e8e-0506-45e1-b715-3062ef29198b/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
6dd394ad8df7d5e2ed0f220ff18451f281ccc907cae0d25d233c51533ad8887f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 07:36:22 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
3937
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
KQ55jv8naVIMiK0tFgA8ZNbJ68oaad8hN9VcuGh17sqPFJXX1wAJCw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c601c055-fcb3-4a63-98f8-d1882e680cbc/32d6c778-320c-47c4-91cf-4508cb0d5c40/160x90/match/
3 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c601c055-fcb3-4a63-98f8-d1882e680cbc/32d6c778-320c-47c4-91cf-4508cb0d5c40/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
01b4ebef3b601f246d0adbff5259fabbe7c8e0311f1169b495f0bb2b862db981

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:23:25 GMT
Via
1.1 b6d1611761652d7a383651f2bf480596.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
1114
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
8u1b5VoTJkrDt--Oe1_ekngKSrX_xoqbE3CO-Zj1RLSle-bgC3kJBQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a7f317ff-8706-4af7-9f0e-9e2417e9af2d/29fd1a56-9d84-4424-bebd-e25a67a974d3/160x90/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/a7f317ff-8706-4af7-9f0e-9e2417e9af2d/29fd1a56-9d84-4424-bebd-e25a67a974d3/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
eb12eaa9c690d06187a7099545a6bf52318a2364411fc9c4ec73e7fa4ecbb0f9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:23:26 GMT
Via
1.1 c3b74c81fdcb7942211a6c721efa13fd.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
1113
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
bvKlqhG1DIx-VX0DT3g5e-uDBLbG4ka2u7If_1gW4Uf9UueaV00k-w==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7d8fd3f5-736a-4751-9741-c63476a1c55f/9e10932e-22cf-4161-8f97-7ded08968b25/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/7d8fd3f5-736a-4751-9741-c63476a1c55f/9e10932e-22cf-4161-8f97-7ded08968b25/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
2ec7b8d3c38a996f67dd4e580c975ece3e9d936d4267167d12604a59a5ff2c87

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:12:42 GMT
Via
1.1 c2a926ef1bafe1ab239d4761594a8099.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
1757
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
kCQeFY-LSU4v1aIAL09DTXlhBTq4_t6TonBh4daxGz-OEjEV75bbPA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/3afccae7-9c97-4434-b702-84e95b2c9e9b/213e62f9-b1ab-4368-a58c-5bf046478bff/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/3afccae7-9c97-4434-b702-84e95b2c9e9b/213e62f9-b1ab-4368-a58c-5bf046478bff/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
c670b28572ed7804386b274eb1ddafbc0253a1aff515b0d15805c57c26bcee64

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Wed, 15 Jan 2020 18:48:25 GMT
Via
1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
50014
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
eGGzpFgi18zhsmgJpe3Gi19nK1kgzMNMLtWIG3J7-1P76scNOXAseQ==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/1d764395-3566-4875-8962-a175d38af9e5/main/160x90/2m58s368ms/match/
5 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/1d764395-3566-4875-8962-a175d38af9e5/main/160x90/2m58s368ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
f598a8748bf3e022bb3b431e6a0ad2b735d99b41288d56361dc9ce63b4e4d285

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 07:34:14 GMT
Via
1.1 b6d1611761652d7a383651f2bf480596.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
4065
X-Powered-From
us-east-1a
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
3AZER_UpxFxIJ6qkYDaT_zmEtpogXcC-bD0wNCu2gr2ZWrj7C7SseA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/96082f18-026e-44fb-abf1-f81e163dc2f2/cb35f38f-1826-419f-a5e0-7e1971f4c1c6/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/96082f18-026e-44fb-abf1-f81e163dc2f2/cb35f38f-1826-419f-a5e0-7e1971f4c1c6/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
71c805ad1e5135a1d4dd9fccaa913bbdaf94cc3608d9619e5b546c1b865a2c16

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:23:26 GMT
Via
1.1 c3b74c81fdcb7942211a6c721efa13fd.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
1113
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
cBh7mSczukwN42Zm-DmYsTurI4wqK1AxQehGC13JOXjVuytPflHicA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/25c39f65-9707-4f3a-9f06-88fccdd69a43/main/160x90/4m39s829ms/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/jit/1568176135/25c39f65-9707-4f3a-9f06-88fccdd69a43/main/160x90/4m39s829ms/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
20cbcc1c3a0b7c92033adbeb8f6f8b0cb03067db48a19f7116b40e8f2fbf8b3a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 07:34:13 GMT
Via
1.1 c2a926ef1bafe1ab239d4761594a8099.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
4065
X-Powered-From
us-east-1c
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
IBHvvKKvz-yLdH7pXmu-mf5nmbTabA9GuVV_VmLrtwQMoekOxeLmiA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d0e7fead-2e5a-4562-a430-556e3516311c/e5ff9746-37c2-40c4-bb2d-10e4ec8d3ad3/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d0e7fead-2e5a-4562-a430-556e3516311c/e5ff9746-37c2-40c4-bb2d-10e4ec8d3ad3/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
9bb134ceb966cd6cbccfec7ab7dcb2fede6b0a5705e991030c0c248670d99168

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:12:42 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
1757
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
i0OYI0lPRP99tCLhQyeNT1gevP0XXkDmQKuAGSMPj-g8tg4FnEoZYw==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c0da3834-c2d6-4c82-bef6-4ccdef7da688/911a7f6c-fc39-413a-bb28-272f6702ab8e/160x90/match/
4 KB
4 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/c0da3834-c2d6-4c82-bef6-4ccdef7da688/911a7f6c-fc39-413a-bb28-272f6702ab8e/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
731e7bf0e3b7c8fb1978a6c04ba3940b77ce5166bd55dcc2c710baa011c517c6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:23:27 GMT
Via
1.1 c379418fd6100691807f32f274ebe9ce.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
1112
X-Powered-From
us-east-1e
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
5cpGI93GmBfSAkEVMjJ2Wyg1KQ936dERvJX4_BhrHWY_2W02iC3ZMA==
image.jpg
cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d28d35f7-16e0-4c08-9500-8257f224764a/0c968b04-c649-44ca-96b7-867f99c5e6b4/160x90/match/
4 KB
5 KB
Image
General
Full URL
https://cf-images.us-east-1.prod.boltdns.net/v1/static/1568176135/d28d35f7-16e0-4c08-9500-8257f224764a/0c968b04-c649-44ca-96b7-867f99c5e6b4/160x90/match/image.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.146 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-146.fra2.r.cloudfront.net
Software
/ BC
Resource Hash
de309132f417ea1f43ee235841b11e40081e1ea204cbbf29b9c896dc3350dd64

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 07:36:22 GMT
Via
1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Age
3937
X-Powered-From
us-east-1d
X-Powered-By
BC
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Connection
keep-alive
X-Amz-Cf-Id
PUbRncUCOJUum-GYaeY12xPhze0VEeA0zSzBVz4Gl9GBF_MCfwm4rA==
video-arrow_right_on.gif
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/video-arrow_right_on.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c7d1ee4f5a608fa05b8f9c6cbd47e3eab7516facc3380d704b7332805877afff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 14 Mar 2014 15:55:19 GMT
server
cloudflare
age
3299
etag
"9f7-4f49318b927c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
555ecb2468f49814-FRA
content-length
2551
December19CartoonJK.jpg
img.deusm.com/darkreading/Curt_Franklin/
278 KB
279 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Curt_Franklin/December19CartoonJK.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
44379e67faf87c3db6b808852a64aed185e530d40d126483e541c10e88ba22a4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 12 Dec 2019 13:52:47 GMT
server
cloudflare
age
3299
etag
"459a8-599820f6aa9c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
status
200
accept-ranges
bytes
cf-ray
555ecb2468f59814-FRA
content-length
285096
Tech%20Digest_thumbnail_121119.PNG
dsimg.ubm-us.net/asset/412313/623663/
395 KB
395 KB
Image
General
Full URL
https://dsimg.ubm-us.net/asset/412313/623663/Tech%20Digest_thumbnail_121119.PNG
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f4571347ff46841c24c0ac3a1a1f4ac713d264df1ee4afa87f8b3a4cb2e6f76b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Dec 2019 22:55:56 GMT
server
cloudflare
age
61
etag
"62ac1-599616a309865"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=14400
accept-ranges
bytes
cf-ray
555ecb245f24c286-FRA
content-length
404161
survey_jspage.asp
www.darkreading.com/
7 KB
1 KB
Script
General
Full URL
https://www.darkreading.com/survey_jspage.asp?survey_id=130&cbust=11254
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:7863 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
0db99da57d0d48e024bc0cb1aefaffdaff040afde0fc7d198db302d27896a8af
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
DYNAMIC
server
cloudflare
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/html
status
200
cache-control
private
cf-ray
555ecb237c47c295-FRA
report%20thumbnail.PNG
dsimg.ubm-us.net/asset/413163/625983/
819 KB
820 KB
Image
General
Full URL
https://dsimg.ubm-us.net/asset/413163/625983/report%20thumbnail.PNG
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::6818:7975 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3b9aba94ad85d48678daf2856f484fee26176afebeba8f9d2e6292afc011a94b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Tue, 24 Dec 2019 16:23:26 GMT
server
cloudflare
age
4294
etag
"ccc6c-59a7590475c0b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=14400
accept-ranges
bytes
cf-ray
555ecb245f25c286-FRA
content-length
838764
DR-bug.png
img.deusm.com/darkreading/
1 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-bug.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f30d5c0433d74c8224a2343a3c6c08468015909c22315b8693f9bdee33f48217

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
age
3299
etag
"5d2-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468f69814-FRA
content-length
1490
Social-FB.png
img.deusm.com/darkreading/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-FB.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fbb475f48d03815474a554d3c16599917c2fabf811e3fe2772aeabeee474aa8f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 04:28:57 GMT
server
cloudflare
age
3299
etag
"9a2-5949af4d49440"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468f79814-FRA
content-length
2466
Social-Twitter.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-Twitter.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0f762bf1a58c917c1ad50006bfcd192ab55b2d01a857b7c08b6c40e3af878695

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:31 GMT
server
cloudflare
age
4981
etag
"a2c-594a155a3d8c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468fa9814-FRA
content-length
2604
Social-LI.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-LI.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4bbed2de83df27dc8130644101bce3dd9ddd1c178815e42bcb49118b4a73593c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:08 GMT
server
cloudflare
age
4981
etag
"a0b-594a15444e500"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468fb9814-FRA
content-length
2571
Social-Flip.png
img.deusm.com/darkreading/
825 B
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-Flip.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
973ccce3f58b175a9e021c76978726083cc7e5cbed75cd0ff09ff83919934d15

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Wed, 16 Oct 2019 04:56:12 GMT
server
cloudflare
age
4981
etag
"339-594ffeb7d9300"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2468fe9814-FRA
content-length
825
Social-RSS.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/Social-RSS.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a0761aa1289035f3d20430d55e475043a8fa40deff221715e31068905d561753

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 11 Oct 2019 12:05:19 GMT
server
cloudflare
age
4981
etag
"a73-594a154ecbdc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb2469009814-FRA
content-length
2675
Whitelogo.png
twimgs.com/nojitter/img/
7 KB
7 KB
Image
General
Full URL
https://twimgs.com/nojitter/img/Whitelogo.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a8041ba3d02102bd99dcead4dcc9882c484902362927cfd598e389e930f68ceb

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 09 Jan 2020 05:04:54 GMT
server
cloudflare
age
81355
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
555ecb245ef09710-FRA
content-length
7304
ubm-tech-global-app-measurement.js
epromos.ubmcanon.com/s_code/
56 KB
20 KB
Script
General
Full URL
https://epromos.ubmcanon.com/s_code/ubm-tech-global-app-measurement.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:552 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
924b3a471d549de6251aea0e74fe6eb136141d3f0a8bf001906fff933dec45d4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Sat, 14 Jul 2018 00:08:25 GMT
server
cloudflare
age
3387
etag
W/"180789-df4a-570ea6525b8fa"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
max-age=14400
cf-ray
555ecb2389bbd6f1-FRA
spacer.gif
img.deusm.com/images/
Redirect Chain
  • https://www.darkreading.com/client_pathlog.asp?p=%2Fdarkreading%2Fsection%2F314&f=%2Fdarkreading%2Fsection%2F314%2F1336729&rndserial=13318
  • https://img.deusm.com/images/spacer.gif
49 B
160 B
Image
General
Full URL
https://img.deusm.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 13 Oct 2000 01:54:07 GMT
server
cloudflare
age
4983
etag
"31-3737c29f20dc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
555ecb25cb329814-FRA
content-length
49

Redirect headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
DYNAMIC
server
cloudflare
location
https://img.deusm.com/images/spacer.gif
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
text/html
status
302
cache-control
private
cf-ray
555ecb245f61c295-FRA
lightreading_rating_dot_10x7.gif
img.deusm.com/lightreading/
49 B
160 B
Image
General
Full URL
https://img.deusm.com/lightreading/lightreading_rating_dot_10x7.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Wed, 25 Sep 2013 21:21:36 GMT
server
cloudflare
age
4981
etag
"31-4e73bd694b800"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
555ecb2469029814-FRA
content-length
49
pubads_impl_2020010901.js
securepubads.g.doubleclick.net/gpt/
166 KB
61 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
3db14db6cba1096c650fcce5ea485a9f9c5b6ff93b8b9d1163965f9cae428cca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 09 Jan 2020 14:07:25 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
61880
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
782 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=www.darkreading.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
108
x-xss-protection
0
id
ubmtech.d3.sc.omtrdc.net/
3 B
312 B
XHR
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/id?d_visid_ver=3.1.2&d_fieldgroup=A&mcorgid=77FB1CFE532B22840A490D45%40AdobeOrg&mid=56812500789115920810245579451242261512&ts=1579164119671
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
52.31.190.58 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-190-58.eu-west-1.compute.amazonaws.com
Software
jag /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

status
200
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
server
jag
xserver
anedge-5bc5cd848f-zvzzj
vary
Origin
x-c
master-1105.I62e04a.M0-322
p3p
CP="This is not a P3P policy"
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, no-store, max-age=0, no-transform, private
access-control-allow-credentials
true
content-type
application/x-javascript
content-length
3
x-xss-protection
1; mode=block
ibs:dpid=411&dpuuid=XiAh1wAAAGL5MVL0
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=46218783809276662740980542318954222331
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XiAh1wAAAGL5MVL0
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XiAh1wAAAGL5MVL0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.211.89.62 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-211-89-62.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v057-067b91e0d.edge-irl1.demdex.com 5.64.3.20200108083203 0ms (+2ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
wQ25ge4aSaM=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XiAh1wAAAGL5MVL0
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Fri, 17 Jan 2020 08:41:59 GMT
fbevents.js
connect.facebook.net/en_US/
126 KB
31 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
1ada5b4d0b63b06d2bd668cd7d6597689796da41a434a675cfdbd2a1bddf251a
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-24=":443"; ma=3600
content-length
30426
x-xss-protection
0
pragma
public
x-fb-debug
VwG4MD5gLDSZEjK4bQCz9y6jmaUnbCh4O09+lfF9aKnV9f9GO40Dr/Ma8j3N47VTPvmDfGavnq+2oxsqUNhdaw==
x-fb-trip-id
1850256238
date
Thu, 16 Jan 2020 08:41:59 GMT, Thu, 16 Jan 2020 08:41:59 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
log.js
u.heatmap.it/
26 KB
10 KB
Script
General
Full URL
https://u.heatmap.it/log.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
8e08bebeab7d191fe904d98cbab88ad13b367e43e685b4a06c1cafe77a402f25

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 13 Jan 2020 20:35:08 GMT
content-encoding
br
last-modified
Sun, 12 Jan 2020 10:30:00 GMT
x-cdn-pop-ip
51.254.41.128/26
etag
W/"5e1af528-67f8"
x-cacheable
Matched cache
vary
Accept-Encoding
content-type
application/x-javascript; charset=UTF-8
status
200
cache-control
max-age=3600
x-cdn-pop
rbx1
accept-ranges
bytes
content-length
10225
x-request-id
202278489
expires
Mon, 13 Jan 2020 21:35:09 GMT
background-pattern.png
img.deusm.com/darkreading/
493 B
684 B
Image
General
Full URL
https://img.deusm.com/darkreading/background-pattern.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
98fb88ec226feae902fb7f98528a41db7abd7de155a6d7b65658c6ab7f2b95f4

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:01 GMT
server
cloudflare
age
4983
etag
"1ed-4f2ebd1fb8240"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24690b9814-FRA
content-length
493
iribbon-logo.gif
twimgs.com/nojitter/gama/
2 KB
2 KB
Image
General
Full URL
https://twimgs.com/nojitter/gama/iribbon-logo.gif
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3035::681f:459e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f3bd482cd3ec17583f25ad0819d1ccbcd0cdcb0fe26f8d87b7f30fd61b3dc640

Request headers

Referer
https://img.deusm.com/darkreading/informa-iribbon.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 19 Apr 2019 06:59:19 GMT
server
cloudflare
age
81354
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
cf-ray
555ecb245ef29710-FRA
content-length
1931
ads
securepubads.g.doubleclick.net/gampad/
68 KB
18 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3163575512622724&correlator=3488725036624420&output=ldjh&impl=fifs&adsid=NT&eid=21065367%2C21063146&vrg=2020010901&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200116&iu_parts=2441%2Cdarkreading%2Cattacks_breaches&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=2x2%2C5x5%2C300x250%7C336x280%7C300x600%7C336x850%2C6x6%2C1x2%2C728x90%7C970x250%2C336x27%2C300x250%7C336x280%7C300x600%7C336x850%2C300x60%2C3x3%2C4x4%2C8x2%2C8x4&prev_scp=pos%3Dwelcome%26testAd%3D%7Cpos%3DTAPunit%26testAd%3D%7Cpos%3Drec1%26testAd%3D%7Cpos%3Dpromo%26testAd%3D%7Cpos%3Dwallpaper%26testAd%3D%7Cpos%3Dtop%26testAd%3D%7Cpos%3Dlogo%26testAd%3D%7Cpos%3Drec2%26testAd%3D%7Cpos%3Deventpromo%26testAd%3D%7Cpos%3Dribbon%26testAd%3D%7Cpos%3Dvideo%26testAd%3D%7Cpos%3Dnative%26testAd%3D%7Cpos%3Dinsight%26testAd%3D&cust_params=kw%3DAdvanced_Threats%252CAttacks%252CAttacks-Breaches%252CBanking-Finance%252CBreaches%26aid%3D1336729&cookie_enabled=1&bc=31&abxe=1&lmt=1579164119&dt=1579164119740&dlt=1579164119356&idt=344&frm=20&biw=1600&bih=1200&oid=3&adxs=0%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adys=35%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9%2C-9&adks=1417865500%2C2285942263%2C4220632109%2C4159207384%2C2332965166%2C2966194094%2C2269036440%2C4220632108%2C1032152201%2C885452677%2C693593060%2C929715771%2C3939335409&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca%7Cb%7Cc%7Cd&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&ref=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&dssz=42&icsg=257701196448&std=0&csl=80&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1600x1200%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&msz=1600x2%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1%7C0x-1&ga_vid=1406627327.1579164120&ga_sid=1579164120&ga_hid=433056914&fws=0%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2%2C2&ohw=0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
a5a8dc0e531f5ce1b61c5afe6b94bb15e9177d22927cd733f7e9f4cf41f9b3a8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17527
x-xss-protection
0
google-lineitem-id
140048676,4991788258,4991788258,-2,5238858219,5191297188,-2,5238621993,-2,-2,42403476,5269380382,-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
96102516636,138290840464,138290840470,-2,138299597077,138293483450,-2,138296840350,-2,-2,138212589663,138300263648,-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020010901.js
securepubads.g.doubleclick.net/gpt/
63 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
sffe /
Resource Hash
01aafa9bc943e4e2da648bb34416fc7a619004e202352836b0a4ffbcba97010c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 09 Jan 2020 14:07:25 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24379
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

/
googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/
3 KB
2 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1007530244/?random=1579164119752&cv=9&fst=1579164119752&num=1&guid=ON&resp=GooglemKTybQhCsO&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&ref=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&hn=www.googleadservices.com&rfmt=3&fmt=4
Requested by
Host: www.googleadservices.com
URL: https://www.googleadservices.com/pagead/conversion.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
b50c82dbc16cb15ded764da9e112d33e17654cc28ebd8041f4ef6179b11eca57
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
text/javascript; charset=UTF-8
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1332
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
bat.js
bat.bing.com/
23 KB
7 KB
Script
General
Full URL
https://bat.bing.com/bat.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
b139982ce002c53ddfb65aec1e90704c0a3704fc5aa35247f9323b74a1d3f721

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
last-modified
Tue, 10 Sep 2019 18:57:28 GMT
x-msedge-ref
Ref A: B9ED3E3A4D6A412F93B040427F769EBD Ref B: FRAEDGE0409 Ref C: 2020-01-16T08:41:59Z
access-control-allow-origin
*
etag
"09c5197968d51:0"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
private,max-age=1800
accept-ranges
bytes
content-length
7148
all.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
ea4f07a8bce4e2f1be73e3c57f4cfec0508d066795f25d2c45c10be4c88937cc
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
oBfs7Sm0jRipsBNwA5g4Ag==
status
200
date
Thu, 16 Jan 2020 08:41:59 GMT, Thu, 16 Jan 2020 08:41:59 GMT
expires
Thu, 16 Jan 2020 08:43:29 GMT
alt-svc
h3-24=":443"; ma=3600
content-length
1778
x-fb-debug
rTQ40qTD6kxinSiOFVMbENQDLUxaiNdtCcL4rI9xxgCa2BEIUKfZsYdPUZwHwa9qnaop1pNYdz1IM7g6XH+2ew==
x-fb-trip-id
1850256238
x-fb-content-md5
9bb1605bb628578b5d84b513755dc502
etag
"3e819dedf746bc49839a9a420aab45c2"
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public,max-age=1200,stale-while-revalidate=3600
timing-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
Cookie set dest5.html
ubm.demdex.net/ Frame 27F6
0
0
Document
General
Full URL
https://ubm.demdex.net/dest5.html?d_nsid=0
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/VisitorAPI.js?ormzkk
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.50.81.152 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-50-81-152.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
ubm.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Accept-Encoding
gzip, deflate, br
Cookie
demdex=46218783809276662740980542318954222331
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 08 Jan 2020 10:53:21 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=46218783809276662740980542318954222331;Path=/;Domain=.demdex.net;Expires=Tue, 14-Jul-2020 08:41:59 GMT;Max-Age=15552000;Secure;SameSite=None
Strict-Transport-Security
max-age=31536000; includeSubDomains
Vary
Accept-Encoding, User-Agent
X-TID
7MWnxmBISm4=
Content-Length
2764
Connection
keep-alive
twitter_intevol_18x18.gif
img.deusm.com/darkreading/
619 B
720 B
Image
General
Full URL
https://img.deusm.com/darkreading/twitter_intevol_18x18.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ebe3a0272a317857bf566a0deec42181bf0e89d280bb3143bba14da1ae1ddb10

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 09 Feb 2018 10:56:35 GMT
server
cloudflare
age
4981
etag
"26b-564c561c21ec0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
accept-ranges
bytes
cf-ray
555ecb24b97c9814-FRA
content-length
619
beacon-min.js
ins.techweb.com/beacon/js/
6 KB
2 KB
Script
General
Full URL
https://ins.techweb.com/beacon/js/beacon-min.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:15a0 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a290ede885635a3f7bb2b8e630bf795f15dde146fea32520b775bee1b2926ff3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 23 Mar 2017 17:04:42 GMT
server
cloudflare
age
3936
etag
W/"6108-1490288682000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
status
200
cache-control
max-age=14400
cf-ray
555ecb250f0b63a1-FRA
content-type
application/javascript
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-135180592-2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
3824
date
Thu, 16 Jan 2020 07:38:15 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Thu, 16 Jan 2020 09:38:15 GMT
recaptcha__en.js
www.gstatic.com/recaptcha/releases/A1Aard-wURuGsXRGA7JMOqVO/
255 KB
91 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/A1Aard-wURuGsXRGA7JMOqVO/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?onload=rcCallback&render=explicit
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
7048656614a2cfe865336abb6d6223fb523c5882b9f992ee112fad38ab5b8291
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 13 Jan 2020 17:16:20 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Jan 2020 05:04:49 GMT
server
sffe
age
228339
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93232
x-xss-protection
0
expires
Tue, 12 Jan 2021 17:16:20 GMT
rss-icon.png
img.deusm.com/darkreading/
2 KB
2 KB
Image
General
Full URL
https://img.deusm.com/darkreading/rss-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7bb0d75d42e3ccf1a9d1a055bcddfbc23003ed3ab75bb0eb49c05ba747bce8c9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
4983
etag
"649-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24e9bf9814-FRA
content-length
1609
tw-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/tw-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
48d211ee8f54e0f314ee98a2b63e6e470b33fb1de29d326c742be16125bda71a

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
4983
etag
"56e-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24e9c29814-FRA
content-length
1390
flipboard-icon.png
img.deusm.com/darkreading/
425 B
526 B
Image
General
Full URL
https://img.deusm.com/darkreading/flipboard-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
22c53eeed2c33c21657590793b89fed83648ee555686c0e9ff90b39c1dab406f

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Nov 2018 12:31:36 GMT
server
cloudflare
age
4983
etag
"1a9-57be0fae8ba00"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24e9c49814-FRA
content-length
425
facebook-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/facebook-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4e19e8f9902a8b9ec4840aaf54110d6f502c5fb500303dc605f8776c40f7fb67

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
4982
etag
"4a9-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24e9c59814-FRA
content-length
1193
li-icon.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/li-icon.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
976aabc512994a6ecc5981a85c489d1bb242ba6734b746a964d69db615f72875

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Mon, 24 Feb 2014 16:00:47 GMT
server
cloudflare
age
632
etag
"54b-4f329132149c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24e9c69814-FRA
content-length
1355
reb-border.png
img.deusm.com/darkreading/
331 B
666 B
Image
General
Full URL
https://img.deusm.com/darkreading/reb-border.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
523296d1a2c9a67ee707b5e0bc582f488e5786ec9b343c7b3da58a0d162d643b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Thu, 03 Nov 2016 06:29:01 GMT
server
cloudflare
age
632
etag
"14b-5405fac56e540"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24e9c79814-FRA
content-length
331
nav-background.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
a6595372db2688a9dfb0991bc6cea16343042dd3caa33483b393d21a77d1c4be

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Sat, 22 Feb 2014 17:43:38 GMT
server
cloudflare
age
4983
etag
"af8-4f30247448680"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24e9c89814-FRA
content-length
2808
nav-background-edge.png
img.deusm.com/darkreading/
3 KB
3 KB
Image
General
Full URL
https://img.deusm.com/darkreading/nav-background-edge.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fd2f3015d1e62a6f24420652afa85f8dbce31636ea8ee86781dc794c243dec68

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Tue, 11 Jun 2019 06:13:41 GMT
server
cloudflare
age
632
etag
"aeb-58b0632bf0f40"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb24e9c99814-FRA
content-length
2795
BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjoa4Omb2RlV9Su1cai.woff
fonts.gstatic.com/s/robotoslab/v10/
15 KB
15 KB
Font
General
Full URL
https://fonts.gstatic.com/s/robotoslab/v10/BngbUXZYTXPIvIBgJJSb6s3BzlRRfKOFbvjoa4Omb2RlV9Su1cai.woff
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
25f287eb7a911bc928cca7d105e54252c2cd0bd4770319c402751c810d2804e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Roboto+Slab:700
Origin
https://www.darkreading.com

Response headers

date
Wed, 15 Jan 2020 00:28:57 GMT
x-content-type-options
nosniff
last-modified
Thu, 14 Nov 2019 22:02:32 GMT
server
sffe
age
115982
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
15288
x-xss-protection
0
expires
Thu, 14 Jan 2021 00:28:57 GMT
832000476880185
connect.facebook.net/signals/config/
447 KB
113 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/832000476880185?v=2.9.15&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
6b32273d502be4ac793cba3d1e1524fcfe423a433c822ab529b1f77af0b8d60b
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-24=":443"; ma=3600
content-length
114947
x-xss-protection
0
pragma
public
x-fb-debug
e6damUoLSOlcxEyw4JZ5LwfnbDtTtD9XICqSrVVxJxccgn/ipyOEbj2C48DIPuLI33JGJSYxyjo1wT39TRJftg==
x-fb-trip-id
1850256238
date
Thu, 16 Jan 2020 08:41:59 GMT, Thu, 16 Jan 2020 08:41:59 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
__fpn.gif
fpn.flipboard.com/tr/
Redirect Chain
  • https://fpn.flipboard.com/pix/__fpn.gif?utm_source=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729...
  • https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-at...
35 B
358 B
Image
General
Full URL
https://fpn.flipboard.com/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729%25253Fmkt_tok%25253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%2525253D%2525253D&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%25253D%25253D
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:6200:14:85db:2b40:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 02:04:28 GMT
via
1.1 eb1a8c1b1275e33a016e623478052111.cloudfront.net (CloudFront)
last-modified
Thu, 12 Oct 2017 18:19:12 GMT
server
AmazonS3
age
24182
etag
"28d6814f309ea289f847c69cf91194c6"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-length
35
x-amz-cf-id
zgAzQ2c1cTshHfMVuwhthIvmcM5fJSLvtUh3Jyg1oQSImF2GwkZKWQ==

Redirect headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
via
1.1 eb1a8c1b1275e33a016e623478052111.cloudfront.net (CloudFront)
server
CloudFront
x-amz-cf-pop
FRA2-C2
location
/tr/__fpn.gif?qs=utm_source%253Dhttps%25253A%25252F%25252Fwww.darkreading.com%25252Fattacks-breaches%25252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%25252Fd%25252Fd-id%25252F1336729%25253Fmkt_tok%25253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%2525253D%2525253D&rh=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%25253D%25253D
x-cache
LambdaGeneratedResponse from cloudfront
status
307
cache-control
no-cache, no-store, must-revalidate
content-length
0
x-amz-cf-id
jEMPpt6s-XZrn_TCEQCWi_TxGEakQNzBiQLetCyOLq24vht9JJ4kGg==
expires
Thu, 01 Dec 1994 16:00:00 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005435&ns__t=1579164119865&ns_c=windows-1252&cv=3.1e&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww....
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1579164119865&ns_c=windows-1252&cv=3.1e&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww...
0
514 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1579164119865&ns_c=windows-1252&cv=3.1e&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&c9=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&cs_ak_ss=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:41:59 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005435&ns__t=1579164119865&ns_c=windows-1252&cv=3.1e&c8=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&c7=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&c9=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&cs_ak_ss=1
Pragma
no-cache
Date
Thu, 16 Jan 2020 08:41:59 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
bullet.png
img.deusm.com/informationweek/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/informationweek/bullet.png
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9e0e2ad3a93ec78d016efee0993b5856ba9b4acafcee3aa4d6f7162f039fcce4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Sat, 02 Nov 2013 00:57:26 GMT
server
cloudflare
age
3295
etag
"41e-4ea272a96e980"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb253a519814-FRA
content-length
1054
www.darkreading.com.js
u.heatmap.it/conf/
0
213 B
Script
General
Full URL
https://u.heatmap.it/conf/www.darkreading.com.js
Requested by
Host: u.heatmap.it
URL: https://u.heatmap.it/log.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
46.105.202.39 , France, ASN16276 (OVH, FR),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
x-cacheable
Cacheable
x-cdn-pop-ip
51.254.41.128/26
content-type
text/javascript;charset=UTF-8
status
204
cache-control
max-age=60
x-cdn-pop
rbx1
x-request-id
866521895
expires
Thu, 16 Jan 2020 08:47:00 GMT
all.js
connect.facebook.net/en_US/
190 KB
57 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js?hash=a4ef545c64fd1d6a3d141a100dd1e964&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
d9292c6a56ae2cfd4b9da5c68bb0f5348b82c9642bcd7ad3b131d95045d83b01
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
k2ePXQJrzrbaa+EkX00Rcw==
status
200
date
Thu, 16 Jan 2020 08:41:59 GMT, Thu, 16 Jan 2020 08:41:59 GMT
expires
Fri, 15 Jan 2021 07:44:04 GMT
alt-svc
h3-24=":443"; ma=3600
content-length
57702
x-fb-debug
m1aMV8oxyTPRAJbtjnK4JQbzr8rM4bFzXZOLeqQQOH3mAKrFnTi4khbYTXI+GGwM3GjypmsPn7HfXJjRm/Dorg==
x-fb-trip-id
1850256238
x-fb-content-md5
0859fc53fc4b6277f696e418cda3b023
etag
"82a6044436fc34a267157833b5573cca"
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
DR-hot-topics-comment.png
img.deusm.com/darkreading/
1 KB
1 KB
Image
General
Full URL
https://img.deusm.com/darkreading/DR-hot-topics-comment.png
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
9182e8a1e20a5437d2f311b096b2a98a33d54e94d4d9d6d01c5db3861460d04e

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 21 Feb 2014 14:56:02 GMT
server
cloudflare
age
3295
etag
"4a5-4f2ebd20ac480"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb256a8a9814-FRA
content-length
1189
collect
stats.g.doubleclick.net/r/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=433056914&t=pageview&_s=1&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ranso...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=1406627327.1579164120&jid=1890429707&_gid=2082284233.1579164120&gjid=572506957&_v=j79&z=1442448644
35 B
102 B
Image
General
Full URL
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=1406627327.1579164120&jid=1890429707&_gid=2082284233.1579164120&gjid=572506957&_v=j79&z=1442448644
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:400c:c00::9a Brussels, Belgium, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
strict-transport-security
max-age=10886400; includeSubDomains; preload
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
date
Thu, 16 Jan 2020 08:41:59 GMT
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
location
https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-135180592-2&cid=1406627327.1579164120&jid=1890429707&_gid=2082284233.1579164120&gjid=572506957&_v=j79&z=1442448644
content-type
text/html; charset=UTF-8
status
302
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
420
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.facebook.com/tr/
44 B
362 B
Image
General
Full URL
https://www.facebook.com/tr/?id=832000476880185&ev=PageView&dl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&rl=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&if=false&ts=1579164119922&sw=1600&sh=1200&v=2.9.15&r=stable&ec=0&o=30&fbp=fb.1.1579164119921.901438301&it=1579164119835&coo=false&rqm=GET
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT, Thu, 16 Jan 2020 08:41:59 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-24=":443"; ma=3600
content-length
44
expires
Thu, 16 Jan 2020 08:41:59 GMT
/
www.google.com/pagead/1p-user-list/1007530244/
42 B
167 B
Image
General
Full URL
https://www.google.com/pagead/1p-user-list/1007530244/?random=1579164119752&cv=9&fst=1579161600000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&ref=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&fmt=3&is_vtc=1&random=4124665995&resp=GooglemKTybQhCsO&rmt_tld=0&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4860:4802:34::75 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
www.google.de/pagead/1p-user-list/1007530244/
42 B
156 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1007530244/?random=1579164119752&cv=9&fst=1579161600000&num=1&guid=ON&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_his=2&u_tz=60&u_java=false&u_nplug=0&u_nmime=0&sendb=1&frm=0&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&ref=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&tiba=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&fmt=3&is_vtc=1&random=4124665995&resp=GooglemKTybQhCsO&rmt_tld=1&ipr=y
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
content-security-policy
script-src 'none'; object-src 'none'
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame C200
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvRwB5UxbOPSjVgkiu1-3YsY2byiUl0G5loYv9HGiy4vqdMlCk7i0B329klTjM44T-ccgwL8h8X9v8k76AFWLRJggBz0B7YDpvpqKA_fhpMVaNo3tQ8pq9J9k7suD_ptj3uCuyKgsMOTIBhp5xOwflbxxQtrcki_UJy4FV_Bbco9G1tuwWoL-yQZyTTru2AhzMmBfa4g_fn8KYcmz6OzdNyOPtB3YuxBbeHOe14L0sd70wqakGbaDS3ccCcNsc89UdnlESGfu1kZcH3BKAXU20Z2ex3w7-ZpfOg7j7lW_yQJt6NQzZdgwp3fkObOXyq4YLnfw&sai=AMfl-YRJtfnYOPntAgDSKkVTog1FmEBEAeT2qrBp0fz99Xm7pfPkm-1FPBzXdI8TyOpTNSE7Sgrm_DX6RrCNav_eOF-4iogR5zLp-osThV9JwA&sig=Cg0ArKJSzFncUQLMPJfFEAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame C200
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c332335364b9a6c359313572a2cbeae02146cf05333d5c7a2cff81ecf4c4214
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27830
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame C200
279 KB
95 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c64e7272a5ddae61be40ec50e21b16648f9efcd7104505c63384297cb28bb259

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:16:49 GMT
Server
AmazonS3
x-amz-request-id
7756889B267985A8
ETag
"be6ebb82e9189b07c11c91241a8f4368"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12189
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96404
x-amz-id-2
IzBzcXz8olIufAkU55QEaFVEvMLhD1OZNGiYGF0A2qC3WthB2kimkI2mn2n99PWtmD+4DKf4bU0=
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
6d3eb1ecc9274ec87195dd6d4d28e5a9f00029a0b054c8e44cdd8f8ac79ae653
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28110
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 0D25
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssbc_zEB22sv7wglPjUcnIfbHYC8dOu0a5L8gup6PzoJB1tHRcCXnjLbL88tbMHTGZwqYnhl6ktDpn1Zdbl8uEDEWCzPcyj1xSE0XhZ4P8GhBBXLJvyiuPYVJ6SH5sS9WB0SE5Vv-FOahL-ZTn8RU-Xr6nM8e15PZhgu4SbeWfbJ022jLhMCE8mZzdlZ0UoakZENPoThCg3HipWkCk4ViYfENmOYXduSttwfrrOB1sl01tjT_D2m2Oq9nrBt8-p1saz0ZPkVmAxrTtBUiyl-9XJTwzWkampRnl_&sai=AMfl-YR4ZJeTj21l5Syl8hduwvxeqEmjCFzL3R2csHF4VUr_yEFQwLkygNps9I3qeg0tCb0xA93A5yQppfoaxDxAhTqw5MvrSs0zOdZXEemQew&sig=Cg0ArKJSzDytvjs8nJ9OEAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 0D25
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c332335364b9a6c359313572a2cbeae02146cf05333d5c7a2cff81ecf4c4214
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27830
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 0D25
279 KB
95 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c64e7272a5ddae61be40ec50e21b16648f9efcd7104505c63384297cb28bb259

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:16:49 GMT
Server
AmazonS3
x-amz-request-id
7756889B267985A8
ETag
"be6ebb82e9189b07c11c91241a8f4368"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12189
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96404
x-amz-id-2
IzBzcXz8olIufAkU55QEaFVEvMLhD1OZNGiYGF0A2qC3WthB2kimkI2mn2n99PWtmD+4DKf4bU0=
view
securepubads.g.doubleclick.net/pcs/ Frame 4C61
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssd5hD9L5mhVw4NeCTyyBJ7CnEny9oZsU7aEcrbkjAFjlO_6TAULCbjx262r68zYAbAP3aE2PFbQdEy4kLeZSx4BPf9HGE0mnOUZaqQguUZi9lv0nlHqjMG2SaPIPDR5Yl7lDNtCQ_SqXmpy_CLNBPdMe4gRMp2wj_Rqu1LyCUDTNw0mJL-gNq8kr6-gLuPHoABvJ2GgbOqcQYkGa0wksba1uzFYqB7jIhE4HrkXh55KuKNotgTCvyqiAjzWNuqhId3f5b-BGA35RDSLL5EERe5zhugybm6xuHD&sai=AMfl-YTgOSYbj2N9nDMXtKsIVzfwJMRWP8oIqnoqbzg9AXF3IcFvrBpHVihH5TXChR9eYfx-HWkVhyEZFavwN8hJpcZgwUIGnK7ZbQrBYfYZzw&sig=Cg0ArKJSzAhVn8kUH7jpEAE&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200113/r20110914/client/ Frame 4C61
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200113/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4404f9a8c086e6c19f1b664ff4a917ef68d76bd1ea2dc61fa97c48977f99cb26
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 13 Jan 2020 23:04:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
207479
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1233
x-xss-protection
0
server
cafe
etag
5112019540083599776
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 27 Jan 2020 23:04:00 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 4C61
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c332335364b9a6c359313572a2cbeae02146cf05333d5c7a2cff81ecf4c4214
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27830
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 4C61
279 KB
95 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c64e7272a5ddae61be40ec50e21b16648f9efcd7104505c63384297cb28bb259

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:16:49 GMT
Server
AmazonS3
x-amz-request-id
7756889B267985A8
ETag
"be6ebb82e9189b07c11c91241a8f4368"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12189
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96404
x-amz-id-2
IzBzcXz8olIufAkU55QEaFVEvMLhD1OZNGiYGF0A2qC3WthB2kimkI2mn2n99PWtmD+4DKf4bU0=
14482563435738894259
tpc.googlesyndication.com/simgad/ Frame 4C61
107 KB
107 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/14482563435738894259
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
d19f12f870aa65eeee973937ca341f021fd1065352095ffa6f0c2b321cb3da3e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 14 Jan 2020 01:08:42 GMT
x-content-type-options
nosniff
age
199997
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
109717
x-xss-protection
0
last-modified
Thu, 10 Oct 2019 20:03:20 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 13 Jan 2021 01:08:42 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame ED9E
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssLdExTCeGPgvSfs-jhdmuzur1497sBh8QH8JlG6hDNPd7I_gvaZmF575hBjOvR97dpsfFHgklbTzblJvkdjJTQgMFn_QP1kff7Kbe_ypoKhxpq3oxLfFKNHh__tjYCpHnUSeBFIHawpmTGlOohDyn3V24q8kCfP2u9QrpfMFbN1fE9HvUbxNOnPjaD-Vd8zgh5YapX_hsSaNo9CPIRf0C8dFM_9FU9lW6LGQ_pG7e77SZNbNladQv_QjG5hRJ8ee5KSEzvSH--9tgIyvjW33H8_VMAVboFwRUCRh9c&sai=AMfl-YSwD2t87XwPV2FZfMqQMwhBPcS_s4UlWSYifEV3v64Q4TP8BeLTWgApU1BilFblB8ri9-7PVoGRwmqoTvR8-Xz6KqDsHPYsxR1ex1or5Q&sig=Cg0ArKJSzGd6sfxF4Bx9EAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame ED9E
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c332335364b9a6c359313572a2cbeae02146cf05333d5c7a2cff81ecf4c4214
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27830
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame ED9E
279 KB
95 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c64e7272a5ddae61be40ec50e21b16648f9efcd7104505c63384297cb28bb259

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:16:49 GMT
Server
AmazonS3
x-amz-request-id
7756889B267985A8
ETag
"be6ebb82e9189b07c11c91241a8f4368"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12189
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96404
x-amz-id-2
IzBzcXz8olIufAkU55QEaFVEvMLhD1OZNGiYGF0A2qC3WthB2kimkI2mn2n99PWtmD+4DKf4bU0=
view
securepubads.g.doubleclick.net/pcs/ Frame 6E57
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstT1-tuwkFTJVmBFrXpFc7ytC-jqo8ickpnV8NE5BRVgPS-qJ-lstZEE1S-qKs5ODJThlClH6DU2o9n7EiWC1rPog2oX9dvxwNfaPqA0iACfof7JQ6eJlGm6lPdTo2IuHhxZ01zRv4ksVHw7qpb7-UyorJtd5KGPF15pEKkEXABErG4l9MibHapeOHKwgadH38kzP5HXkUMJsC9QlqxQqaBGYl8T31ApYvKlDO2GssdJW5Ul7MFOoqzk3EYpBYJ4i3EesCj-GjZwB3OafyIOrfkLzKYMvM&sai=AMfl-YS9kWaRgD-b6BnU0t77lEvIMNuCn7gGtjHI1CDxSTXxwOgGuOjdSOVyOiQD1Q2fiQ1sVA8NUKANSeOnOJZz-esp8uI9Wb0xWFsEVgJiHg&sig=Cg0ArKJSzARuqpC00BI4EAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
dcmads.js
www.googletagservices.com/dcm/ Frame 6E57
4 KB
2 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/dcmads.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
cc0069dab5b1c410fc8bb1a109f8ceb4792e4780bbe7ea9e969662a7d6e49915
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:23:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 24 Oct 2019 14:04:48 GMT
server
sffe
age
1123
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2032
x-xss-protection
0
expires
Thu, 16 Jan 2020 09:23:16 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 6E57
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c332335364b9a6c359313572a2cbeae02146cf05333d5c7a2cff81ecf4c4214
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27830
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 6E57
279 KB
95 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c64e7272a5ddae61be40ec50e21b16648f9efcd7104505c63384297cb28bb259

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:16:49 GMT
Server
AmazonS3
x-amz-request-id
7756889B267985A8
ETag
"be6ebb82e9189b07c11c91241a8f4368"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12188
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96404
x-amz-id-2
IzBzcXz8olIufAkU55QEaFVEvMLhD1OZNGiYGF0A2qC3WthB2kimkI2mn2n99PWtmD+4DKf4bU0=
gen_204
pagead2.googlesyndication.com/pagead/
0
157 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=3163575512622724&r=336x27&w=0&h=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=3163575512622724&r=3x3&w=0&h=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=3163575512622724&r=4x4&w=4&h=4
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=3163575512622724&r=5x5&w=5&h=5
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=3163575512622724&r=300x250%7C336x280%7C300x600%7C336x850&w=300&h=250
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
NL-button.png
img.deusm.com/informationweek/
2 KB
3 KB
Image
General
Full URL
https://img.deusm.com/informationweek/NL-button.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:3e5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7b5688f8b168e06251901442c4f2f72b30c4477cb472833cde7979a8dca0a862

Request headers

Referer
https://www.darkreading.com/styles/pano-framework.css?v1.27
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
cf-cache-status
HIT
last-modified
Fri, 08 Nov 2013 15:09:43 GMT
server
cloudflare
age
3295
etag
"9c6-4eaabc5a3dbc0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200
accept-ranges
bytes
cf-ray
555ecb25bb1f9814-FRA
content-length
2502
0
bat.bing.com/action/
0
148 B
Image
General
Full URL
https://bat.bing.com/action/0?ti=5476211&Ver=2&mid=2fac1543-1573-6274-918d-560d12360c1f&pi=0&lg=en-US&sw=1600&sh=1200&sc=24&tl=Widely%20Known%20Flaw%20in%20Pulse%20Secure%20VPN%20Being%20Used%20in%20...&p=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&r=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&evt=pageLoad&msclkid=N&rn=534391
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:c11::200 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Thu, 16 Jan 2020 08:41:59 GMT
cache-control
no-cache, must-revalidate
x-msedge-ref
Ref A: F26EA91F9194400789C7438F659CE7E6 Ref B: FRAEDGE0409 Ref C: 2020-01-16T08:41:59Z
access-control-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
web.js
ads.celtra.com/ae3ce7b5/ Frame 0D25
13 KB
5 KB
Script
General
Full URL
https://ads.celtra.com/ae3ce7b5/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%25253Fxai%25253DAKAOjstfDaf9VT3iD6lwtf8vBEfFXXqoFKP7wPNILtOtZ_wiZXeRSlcFxhjtyI5zpikQqjzZHABYaY7pgg-vKrnziEA0iwaJy5jmYjGlAWsXQ0KpeQERos1znzUX9_76DRiewCZ5_GKzvjNMOGuC3LMyAwF5RuID35HPBU5Xk22MNY3Mgg8ladsUPrQxmIg64UNaCYilgmRKoIBoxut2ud-7qPQEHiVuYRy3RVh_l8cZvXgnTBDwL8VSn3gfwvF1o9zmcTJn40xbvK2_bUHwvft9r70Oq2dlkzqx%252526sai%25253DAMfl-YSC2SPmLEj6FCYX9k3cZxoBa5F3jZeM0Q2q0uUSzpheJsPGTHA52uGWqco6-j7jjjRDlQCzMvmrqSvt5ZXXlmLP3CgcDgRjyBzKNMK10A%252526sig%25253DCg0ArKJSzBouUWndVd9MEAE%252526urlfix%25253D1%252526adurl%25253D&expandDirection=undefined&clickEvent=advertiser&externalAdServer=DCM&tagVersion=6&externalCreativeId=138290840464&externalPlacementId=43863396&externalSiteId=27868836&externalLineItemId=4991788258&externalCampaignId=2508093984&externalCreativeSize=&externalUserId=%25m&externalDestinationUrl=&scriptId=celtra-script-1&clientTimestamp=1579164119.962&clientTimeZoneOffsetInMinutes=-60&hostPageLoadId=4920498365015693
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.196.22.144 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-196-22-144.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
10743139d40581dbd2bc88f8f718f57a1d7c4d125271705b970be23d9c4d98c6

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Content-Type
application/javascript; charset=UTF-8
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Length
4595
Expires
0
view
securepubads.g.doubleclick.net/pcs/ Frame 3A9C
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsttXiR5mjhrjCsiQTsc_i60qAYEyyngVjti_e3qwyXwwEGex7cC6jHXDbiDacpKnHPxeJpHAxQA6uyWEcsSPWo-9vBV_XYMe9gc4DDG0jZgoHclEOVwO2PIrDxvRyNy73l-V65wigHF9qY-4yf0PD92FosbhUD0lhCp6MtgIked7x4R7zMtcKM3b-atHx-aEXB4F34ibF_2PW7cLvxerUn0ADo_w1XF_tkFLOuc-rw0UajFSKH0BOHxFOgQeghRKTLhtpBvQOgzJPI4PUgvB1Pfsn6LPyoCOtc&sai=AMfl-YTab4ZCicf7e52l8fyGHbS-TL_dHIzMbByJyNoPMxvu_SrBnfndqSblp1zX5jWWUcKP5upObc0euQh8IhyB0O1R8EflV-P1iE57qr57zA&sig=Cg0ArKJSzI62EsW1V3CPEAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Jan 2020 08:41:59 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 3A9C
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c332335364b9a6c359313572a2cbeae02146cf05333d5c7a2cff81ecf4c4214
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27830
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 3A9C
279 KB
95 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c64e7272a5ddae61be40ec50e21b16648f9efcd7104505c63384297cb28bb259

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:16:49 GMT
Server
AmazonS3
x-amz-request-id
7756889B267985A8
ETag
"be6ebb82e9189b07c11c91241a8f4368"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12188
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96404
x-amz-id-2
IzBzcXz8olIufAkU55QEaFVEvMLhD1OZNGiYGF0A2qC3WthB2kimkI2mn2n99PWtmD+4DKf4bU0=
view
securepubads.g.doubleclick.net/pcs/ Frame 99A3
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstBua9vLe5flZ1emd5fp1D9lddCGaiOVElRiVDKAaOR63Io6CTACT1gyJza1lz46akUaJr0FzeqOf9SUaPLQJ9LIM73AqM5q62cWg1b3RLennAX7pIfOk0Cq9tgbHlnunylnhp5EzNsKn524nHZ5-5HZ1z5Hn3P3ZiS5rRLS3PQRbCGbd02MP6y7vfLfrzlAlP_r_j9TzRMN6824d_zcBDoalmVqO4Eb8jIpMMO3s6h4HO0nPmUgrpcpttVNKiGMejGPHpozMZNrYrYAiA11_rDXQeroZA&sai=AMfl-YSPsz8WLfQamTE_2C1uNKyvIjX-QlY0G-dB8jE2PMgmjUxJxVr3E8gt5IjaxaFbzfaScANkkW1e0fO5Ylid74rufSLgPTBxEF5v1xH4oA&sig=Cg0ArKJSzGAz_eK_0ncSEAE&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200113/r20110914/client/ Frame 99A3
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200113/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4404f9a8c086e6c19f1b664ff4a917ef68d76bd1ea2dc61fa97c48977f99cb26
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 13 Jan 2020 23:04:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
207479
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1233
x-xss-protection
0
server
cafe
etag
5112019540083599776
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 27 Jan 2020 23:04:00 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 99A3
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c332335364b9a6c359313572a2cbeae02146cf05333d5c7a2cff81ecf4c4214
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:41:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27830
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:41:59 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 99A3
279 KB
95 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c64e7272a5ddae61be40ec50e21b16648f9efcd7104505c63384297cb28bb259

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:16:49 GMT
Server
AmazonS3
x-amz-request-id
7756889B267985A8
ETag
"be6ebb82e9189b07c11c91241a8f4368"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12188
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96404
x-amz-id-2
IzBzcXz8olIufAkU55QEaFVEvMLhD1OZNGiYGF0A2qC3WthB2kimkI2mn2n99PWtmD+4DKf4bU0=
7123435453443161977
tpc.googlesyndication.com/simgad/ Frame 99A3
26 KB
26 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/7123435453443161977
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
470c0748b01b9746a05fa4c7e12d284daaf0de834075f6d908d587d29f0f45a0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 01 Jan 2020 05:00:19 GMT
x-content-type-options
nosniff
age
1309300
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
26620
x-xss-protection
0
last-modified
Tue, 27 Aug 2019 17:32:57 GMT
server
sffe
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2020 05:00:19 GMT
impl_v55.js
www.googletagservices.com/dcm/ Frame 6E57
22 KB
9 KB
Script
General
Full URL
https://www.googletagservices.com/dcm/impl_v55.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/dcmads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0ec7c1eac6e0f82237b25ed509bf0e48b3cd7f9d989e8e8cac94e8b39edcca46
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 07:23:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 21 Oct 2019 14:05:29 GMT
server
sffe
age
4717
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9535
x-xss-protection
0
expires
Fri, 15 Jan 2021 07:23:22 GMT
xd_arbiter.php
staticxx.facebook.com/connect/ Frame 80B1
0
0
Document
General
Full URL
https://staticxx.facebook.com/connect/xd_arbiter.php?version=45
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=a4ef545c64fd1d6a3d141a100dd1e964&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
staticxx.facebook.com
:scheme
https
:path
/connect/xd_arbiter.php?version=45
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
accept-encoding
gzip, deflate, br
cookie
fr=0tr1YeyWUaMVoRLGO..BeICHX...1.0.BeICHX.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

status
200
content-type
text/html; charset=utf-8
expires
Wed, 13 Jan 2021 22:32:22 GMT
strict-transport-security
max-age=15552000; preload
content-encoding
br
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
cache-control
public,max-age=31536000,immutable
x-fb-debug
vIPCrjUgifqXw6w7QSizm8/0njbIkXnD+0A2DUzZK6IeMbA96KUKVHK8HQchTbc7T79eWX6EO3WsBlXF1tsdiQ==
content-length
12375
x-fb-trip-id
1850256238
date
Thu, 16 Jan 2020 08:42:00 GMT Thu, 16 Jan 2020 08:42:00 GMT
alt-svc
h3-24=":443"; ma=3600
status
www.facebook.com/x/oauth/
0
0
Fetch
General
Full URL
https://www.facebook.com/x/oauth/status?client_id=640989409269461&input_token&origin=1&redirect_uri=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&sdk=joey&wants_cookie_data=false
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=a4ef545c64fd1d6a3d141a100dd1e964&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/
Origin
https://www.darkreading.com

Response headers

pragma
no-cache
x-fb-debug
PU4p4auUmEwBkBNAdKSNo8hHFizMqnAW20+83ZJ5ZNTKQzrSsc+ELkr5kjL/S9nQZZODB0WHHiuqX6oIOFXtow==
fb-s
unknown
status
200
date
Thu, 16 Jan 2020 08:42:00 GMT, Thu, 16 Jan 2020 08:42:00 GMT
strict-transport-security
max-age=15552000; preload
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.darkreading.com
access-control-expose-headers
fb-s
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
h3-24=":443"; ma=3600
content-length
0
x-content-type-options
nosniff
expires
Sat, 01 Jan 2000 00:00:00 GMT
truncated
/ Frame C200
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fe4f0257beb3ab93355463871a1d871b8fed03b4ed671cb74051964f0cc7daf6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 0D25
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a63026f962a36bbb521e5f9ea950a8d733195681eccdbd4a92cf1372610aa8f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame 4C61
217 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5774b3a1ffbfd7b07c3864e69fa38173f5637b15a748b0624faa2f8d80be0f55

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/ Frame ED9E
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
077c3b129ddc11376cd7b68036bbd0636a5a64e45815b6bd8eef5d40293dd9e9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
B23394980.259967385;dc_ver=55.153;sz=728x90;u_sd=1;dc_adk=545849083;ord=wn8pz2;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstX-qdZrs2Qe737CFxixPcHv7nkZTWEEdn5XryC9ECYN9...
ad.doubleclick.net/ddm/adj/N510001.127711DARKREADING2/ Frame 6E57
25 KB
13 KB
Script
General
Full URL
https://ad.doubleclick.net/ddm/adj/N510001.127711DARKREADING2/B23394980.259967385;dc_ver=55.153;sz=728x90;u_sd=1;dc_adk=545849083;ord=wn8pz2;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstX-qdZrs2Qe737CFxixPcHv7nkZTWEEdn5XryC9ECYN9y9rBvUkjIFUa0b6pQVyonSv35NfnB4jxCWo5l8V3MmVdoSPfAzy9EY1B-IWdOInuez2QfdvgbD-62jYsEQsx4AdC6ogl37_Uxi4m560WhI3uqEiLA2KN7quG3Y-iE_xpVEDLBXf-OYV-TFy8-O9lNcxKn_hz8SUIcI6ls60k1mYPX21sSw79rmy35zxpiFCErKdbTOaW--pyvt0PbYJKqAAA_hbFY1oBmO8A4Xgx3F5S8%26sai%3DAMfl-YSfps6nO9DukntUne2ZvtVPpeaXNh4Nxr92tKhQHfMQVELTPIBcSmi4lronhcKGZ3DKnaVmgoxH7_ThOSNAJ6jihCROeo-fXDruseuzUA%26sig%3DCg0ArKJSzNDiAItq1WXaEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D$0;xdt=0;crlt=!Umzip0dIf;osda=2;sttr=78;prcl=s?
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/dcm/impl_v55.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.205.230 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s24-in-f230.1e100.net
Software
cafe /
Resource Hash
0b0500b4141c70bcbbe81f80c98ce190b53e488f1b1d8abfa2d3c8594a1077be
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
br
x-content-type-options
nosniff
content-type
text/javascript; charset=UTF-8
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
12415
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
truncated
/ Frame 99A3
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f0c4ab54978ae77cc5f81daa90be00cd2f0d19a335fef4314c8c8abbac099b93

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
tag.aspx
ml314.com/ Frame C200
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?1602020
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
c293a28e23c66b27bd04bc1742f3aab0ebf6c382961c1e83140f035a08ea5e5d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:41:59 GMT
Content-Encoding
gzip
Last-Modified
Wed, 15 Jan 2020 16:35:10 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=28389
Connection
keep-alive
Content-Length
11932
Expires
Thu, 16 Jan 2020 16:35:10 GMT
n.js
geo.moatads.com/
100 B
274 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120111&de=616534295189&m=0&ar=0de3535428-clean&iw=48f767e&q=2&cb=0&ym=0&cu=1579164120111&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A411987156%3A140048676%3A96102516636&zMoatPS=welcome&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=welcome&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=1223166419&cs=0&callback=MoatDataJsonpRequest_99535553
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/pentonmedia53440730609/moatad.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.10.14.242 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-10-14-242.eu-west-2.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
db55b7a1ff3876b464fb08f23df1a6cc1d1377cfbb5b8bccf2c317a354d00a24

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
server
TornadoServer/4.5.3
etag
"b6faf5d139928dd09ba6e02e235967a86e329ef4"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
100
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120111&de=616534295189&m=0&ar=0de3535428-clean&iw=48f767e&q=3&cb=0&ym=0&cu=1579164120111&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A411987156%3A140048676%3A96102516636&zMoatPS=welcome&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=welcome&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=714376171&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
lidar.js
www.googletagservices.com/activeview/js/current/ Frame 6E57
75 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/lidar.js?cache=r20110914
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N510001.127711DARKREADING2/B23394980.259967385;dc_ver=55.153;sz=728x90;u_sd=1;dc_adk=545849083;ord=wn8pz2;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstX-qdZrs2Qe737CFxixPcHv7nkZTWEEdn5XryC9ECYN9y9rBvUkjIFUa0b6pQVyonSv35NfnB4jxCWo5l8V3MmVdoSPfAzy9EY1B-IWdOInuez2QfdvgbD-62jYsEQsx4AdC6ogl37_Uxi4m560WhI3uqEiLA2KN7quG3Y-iE_xpVEDLBXf-OYV-TFy8-O9lNcxKn_hz8SUIcI6ls60k1mYPX21sSw79rmy35zxpiFCErKdbTOaW--pyvt0PbYJKqAAA_hbFY1oBmO8A4Xgx3F5S8%26sai%3DAMfl-YSfps6nO9DukntUne2ZvtVPpeaXNh4Nxr92tKhQHfMQVELTPIBcSmi4lronhcKGZ3DKnaVmgoxH7_ThOSNAJ6jihCROeo-fXDruseuzUA%26sig%3DCg0ArKJSzNDiAItq1WXaEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D$0;xdt=0;crlt=!Umzip0dIf;osda=2;sttr=78;prcl=s?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
fbada0e83e1f1ab44591d79dab12cbeff5947b3e8563a03dfb85956a8ea72872
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28009
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:42:00 GMT
view
googleads4.g.doubleclick.net/pcs/ Frame 6E57
0
658 B
Other
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjstk7Hm_Jt_nEJSOID_kHW_jcCpLljqcXhCSLbn9kQv4rGsEXTnQ8W8mt_uuiBPcAZvsbzos0DcCo5ATTnXKTR50ahmecLTiiEmuIJ_8slFgFE5CwpKEhnH8_7RqQpNYteltdWBn6ZumxM3gok9gjw&sig=Cg0ArKJSzNpSuwZeqYxEEAE&urlfix=1&omid=0&rm=1&ctpt=1&cstd=0&cisv=r20200113&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N510001.127711DARKREADING2/B23394980.259967385;dc_ver=55.153;sz=728x90;u_sd=1;dc_adk=545849083;ord=wn8pz2;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstX-qdZrs2Qe737CFxixPcHv7nkZTWEEdn5XryC9ECYN9y9rBvUkjIFUa0b6pQVyonSv35NfnB4jxCWo5l8V3MmVdoSPfAzy9EY1B-IWdOInuez2QfdvgbD-62jYsEQsx4AdC6ogl37_Uxi4m560WhI3uqEiLA2KN7quG3Y-iE_xpVEDLBXf-OYV-TFy8-O9lNcxKn_hz8SUIcI6ls60k1mYPX21sSw79rmy35zxpiFCErKdbTOaW--pyvt0PbYJKqAAA_hbFY1oBmO8A4Xgx3F5S8%26sai%3DAMfl-YSfps6nO9DukntUne2ZvtVPpeaXNh4Nxr92tKhQHfMQVELTPIBcSmi4lronhcKGZ3DKnaVmgoxH7_ThOSNAJ6jihCROeo-fXDruseuzUA%26sig%3DCg0ArKJSzNDiAItq1WXaEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D$0;xdt=0;crlt=!Umzip0dIf;osda=2;sttr=78;prcl=s?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
UFYwWwmt.js
tpc.googlesyndication.com/sodar/ Frame 6E57
41 KB
15 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N510001.127711DARKREADING2/B23394980.259967385;dc_ver=55.153;sz=728x90;u_sd=1;dc_adk=545849083;ord=wn8pz2;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstX-qdZrs2Qe737CFxixPcHv7nkZTWEEdn5XryC9ECYN9y9rBvUkjIFUa0b6pQVyonSv35NfnB4jxCWo5l8V3MmVdoSPfAzy9EY1B-IWdOInuez2QfdvgbD-62jYsEQsx4AdC6ogl37_Uxi4m560WhI3uqEiLA2KN7quG3Y-iE_xpVEDLBXf-OYV-TFy8-O9lNcxKn_hz8SUIcI6ls60k1mYPX21sSw79rmy35zxpiFCErKdbTOaW--pyvt0PbYJKqAAA_hbFY1oBmO8A4Xgx3F5S8%26sai%3DAMfl-YSfps6nO9DukntUne2ZvtVPpeaXNh4Nxr92tKhQHfMQVELTPIBcSmi4lronhcKGZ3DKnaVmgoxH7_ThOSNAJ6jihCROeo-fXDruseuzUA%26sig%3DCg0ArKJSzNDiAItq1WXaEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D$0;xdt=0;crlt=!Umzip0dIf;osda=2;sttr=78;prcl=s?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
5056305b09ad6474ea540f796c79be51d6b8e96043cb3d7bc4ef774e56765f4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:08:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 09 May 2018 20:45:00 GMT
server
sffe
age
1999
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15207
x-xss-protection
0
expires
Fri, 15 Jan 2021 08:08:41 GMT
11062019-121559628-RSA200054_Disc_banners_gen-728X90.jpg
s0.2mdn.net/9736922/ Frame 6E57
120 KB
121 KB
Image
General
Full URL
https://s0.2mdn.net/9736922/11062019-121559628-RSA200054_Disc_banners_gen-728X90.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
fc25d49411b8526c8983ff197bc197889b6f9112bad9153395fc2f7fc1d9583c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 01:40:52 GMT
x-content-type-options
nosniff
last-modified
Wed, 06 Nov 2019 20:15:59 GMT
server
sffe
age
25268
content-type
image/jpeg
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=86400
accept-ranges
bytes
access-control-allow-origin
*
content-length
123264
x-xss-protection
0
expires
Fri, 17 Jan 2020 01:40:52 GMT
truncated
/ Frame 6E57
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9ecdee1d341c4c2cc98625039b3b0cf6e376cc7659e3e2807391b7af3314b27c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
web.js
cache-ssl.celtra.com/api/creatives/fb77a540/compiled/ Frame 0D25
587 KB
127 KB
Script
General
Full URL
https://cache-ssl.celtra.com/api/creatives/fb77a540/compiled/web.js?v=37-86d1349ffe&secure=1&cachedVariantChoices=W10-&eventMetadataExperiment=newMeta&inmobi=0&adx-in-banner-video=1
Requested by
Host: ads.celtra.com
URL: https://ads.celtra.com/ae3ce7b5/web.js?&clickUrl=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%25253Fxai%25253DAKAOjstfDaf9VT3iD6lwtf8vBEfFXXqoFKP7wPNILtOtZ_wiZXeRSlcFxhjtyI5zpikQqjzZHABYaY7pgg-vKrnziEA0iwaJy5jmYjGlAWsXQ0KpeQERos1znzUX9_76DRiewCZ5_GKzvjNMOGuC3LMyAwF5RuID35HPBU5Xk22MNY3Mgg8ladsUPrQxmIg64UNaCYilgmRKoIBoxut2ud-7qPQEHiVuYRy3RVh_l8cZvXgnTBDwL8VSn3gfwvF1o9zmcTJn40xbvK2_bUHwvft9r70Oq2dlkzqx%252526sai%25253DAMfl-YSC2SPmLEj6FCYX9k3cZxoBa5F3jZeM0Q2q0uUSzpheJsPGTHA52uGWqco6-j7jjjRDlQCzMvmrqSvt5ZXXlmLP3CgcDgRjyBzKNMK10A%252526sig%25253DCg0ArKJSzBouUWndVd9MEAE%252526urlfix%25253D1%252526adurl%25253D&expandDirection=undefined&clickEvent=advertiser&externalAdServer=DCM&tagVersion=6&externalCreativeId=138290840464&externalPlacementId=43863396&externalSiteId=27868836&externalLineItemId=4991788258&externalCampaignId=2508093984&externalCreativeSize=&externalUserId=%25m&externalDestinationUrl=&scriptId=celtra-script-1&clientTimestamp=1579164119.962&clientTimeZoneOffsetInMinutes=-60&hostPageLoadId=4920498365015693
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
89da7ca019839b55e5a83de03734302df5bc9e74c7c042b8c137a7c10968e0c4

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 14 Jan 2020 08:53:21 GMT
content-encoding
gzip
age
172118
x-cache
Hit from cloudfront
status
200
content-length
129214
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
server
Apache
etag
"4521fa93e9b589a6f9d9515da38e7741321a4429fef1c759f5c9850871abda33"
vary
Accept-Encoding
x-varnish
1901070 229879
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
x8knVrBleYoT9fqNSGdvyj-r9t4h5S6-V5ObMTjWkDwcTrpkbFcatg==
truncated
/ Frame 0D25
167 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
97242dbd-c13c-4a3b-9121-14a332428e60
https://www.darkreading.com/ Frame 0D25
167 B
0
Image
General
Full URL
blob:https://www.darkreading.com/97242dbd-c13c-4a3b-9121-14a332428e60
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d26432e661658ef9d3d538b1f71b1478193f6c141f1cd7dfed03e5b677d178c2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Length
167
Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120159&de=99838943456&m=0&ar=0de3535428-clean&iw=48f767e&q=7&cb=0&ym=0&cu=1579164120159&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=30729156%3A2508093984%3A4991788258%3A138290840464&zMoatPS=TAPunit&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=TAPunit&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=1112316571&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
Enqz_20U.html
tpc.googlesyndication.com/sodar/ Frame 64B8
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/Enqz_20U.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/UFYwWwmt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/Enqz_20U.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
8395
date
Thu, 16 Jan 2020 08:08:41 GMT
expires
Fri, 15 Jan 2021 08:08:41 GMT
last-modified
Wed, 09 May 2018 20:45:00 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1999
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
view
googleads4.g.doubleclick.net/pcs/ Frame 6E57
0
57 B
Other
General
Full URL
https://googleads4.g.doubleclick.net/pcs/view?xai=AKAOjstk7Hm_Jt_nEJSOID_kHW_jcCpLljqcXhCSLbn9kQv4rGsEXTnQ8W8mt_uuiBPcAZvsbzos0DcCo5ATTnXKTR50ahmecLTiiEmuIJ_8slFgFE5CwpKEhnH8_7RqQpNYteltdWBn6ZumxM3gok9gjw&sig=Cg0ArKJSzNpSuwZeqYxEEAE&urlfix=1&omid=0&rm=1&ctpt=35&vt=11&dtpt=34&dett=2&cstd=0&cisv=r20200113&adurl=
Requested by
Host: ad.doubleclick.net
URL: https://ad.doubleclick.net/ddm/adj/N510001.127711DARKREADING2/B23394980.259967385;dc_ver=55.153;sz=728x90;u_sd=1;dc_adk=545849083;ord=wn8pz2;click=https%3A%2F%2Fadclick.g.doubleclick.net%2Fpcs%2Fclick%3Fxai%3DAKAOjstX-qdZrs2Qe737CFxixPcHv7nkZTWEEdn5XryC9ECYN9y9rBvUkjIFUa0b6pQVyonSv35NfnB4jxCWo5l8V3MmVdoSPfAzy9EY1B-IWdOInuez2QfdvgbD-62jYsEQsx4AdC6ogl37_Uxi4m560WhI3uqEiLA2KN7quG3Y-iE_xpVEDLBXf-OYV-TFy8-O9lNcxKn_hz8SUIcI6ls60k1mYPX21sSw79rmy35zxpiFCErKdbTOaW--pyvt0PbYJKqAAA_hbFY1oBmO8A4Xgx3F5S8%26sai%3DAMfl-YSfps6nO9DukntUne2ZvtVPpeaXNh4Nxr92tKhQHfMQVELTPIBcSmi4lronhcKGZ3DKnaVmgoxH7_ThOSNAJ6jihCROeo-fXDruseuzUA%26sig%3DCg0ArKJSzNDiAItq1WXaEAE%26urlfix%3D1%26adurl%3D;dc_rfl=1,https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D$0;xdt=0;crlt=!Umzip0dIf;osda=2;sttr=78;prcl=s?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120174&de=530691071818&m=0&ar=0de3535428-clean&iw=48f767e&q=11&cb=0&ym=0&cu=1579164120174&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=30729156%3A2508093984%3A4991788258%3A138290840470&zMoatPS=rec1&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=rec1&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=780795648&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F14482563435738894259&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120174&de=530691071818&cu=1579164120174&m=16&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3611&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=3&an=0&gf=3&gg=0&ix=3&ic=3&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=3&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5&cd=0&ah=5&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840470&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=949841937&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
spacer.gif
img.lightreading.com/images/
49 B
374 B
Image
General
Full URL
https://img.lightreading.com/images/spacer.gif
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.90 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-90.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
3c5b83e390d046c3623c4b8e35b58aaf64a7481bb2372fb51ae2e0e7818f7407

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 15 Jan 2020 12:52:02 GMT
via
1.1 5a5b94c62ea85e0c0d78b169589b08b5.cloudfront.net (CloudFront)
last-modified
Fri, 20 Jun 2014 19:05:53 GMT
server
AmazonS3
age
71399
etag
"4909631c93ffa90e65247e3fd4454f2d"
x-cache
Hit from cloudfront
content-type
image/gif
status
200
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
49
x-amz-cf-id
Yn8gcUkr3aCYZmGPAM7HwI3NSIWU9E4mEDf8tVWfmhHLMxYmeWYO2A==
view
securepubads.g.doubleclick.net/pcs/ Frame 0A38
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuf_OwS0SQC1pHJ_pxE2c2ZZPX8mDimPohXSvUbl3W5-dG1P2lx_9AJi3CArOgZ3endQIy2W66bEPd0WsmrQcE82PY9HPdKMQrrxXIqHqBZELnzRJhqIREmddCSs6soDnHhfGPZmhjWmTff_fVxAw-iZZw75j2m0E0RBhXFluhuxZjfn4gkHn_HPAyiJdL25dkQFOMr3AqVJBkCf5ulV2zNpe48M2PZGx1ts6TppAXPoftQlhnoqofS3Z0wAyuybV9TbX9qmI-9mo-050aqAL__YbkItQ&sai=AMfl-YQohlxNXbcwtRoZSoOmJPkvRHmPbncthnql8l0GVDcZxGBTsnGzNDpcgr_4IXMQpqttp5QuVygZBSIExYxKB1ASRfU0hizYboDG1XnrrQ&sig=Cg0ArKJSzNDPePV8t3XMEAE&urlfix=1&adurl=
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.194 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
tag
a.teads.tv/page/11512/ Frame 0A38
1 KB
967 B
Script
General
Full URL
https://a.teads.tv/page/11512/tag
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
294d6c6b6d960b3a65d8a4c980f72bc9b95892641762e2bb6bf6eec8b31d8620

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
access-control-allow-origin
*
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
cache-control
private, must-revalidate, max-age=3600
access-control-allow-credentials
true
content-length
690
expires
Thu, 16 Jan 2020 09:42:00 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 0A38
72 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c332335364b9a6c359313572a2cbeae02146cf05333d5c7a2cff81ecf4c4214
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1579101545709831"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
27830
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:42:00 GMT
moatad.js
z.moatads.com/pentonmedia53440730609/ Frame 0A38
279 KB
95 KB
Script
General
Full URL
https://z.moatads.com/pentonmedia53440730609/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020010901.js?21065367
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
c64e7272a5ddae61be40ec50e21b16648f9efcd7104505c63384297cb28bb259

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:16:49 GMT
Server
AmazonS3
x-amz-request-id
7756889B267985A8
ETag
"be6ebb82e9189b07c11c91241a8f4368"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=12188
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96404
x-amz-id-2
IzBzcXz8olIufAkU55QEaFVEvMLhD1OZNGiYGF0A2qC3WthB2kimkI2mn2n99PWtmD+4DKf4bU0=
s88564915742703
ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/
43 B
441 B
XHR
General
Full URL
https://ubmtech.d3.sc.omtrdc.net/b/ss/cmpglobalvista/1/JS-2.8.2/s88564915742703
Requested by
Host: epromos.ubmcanon.com
URL: https://epromos.ubmcanon.com/s_code/ubm-tech-global-app-measurement.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
52.31.190.58 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-190-58.eu-west-1.compute.amazonaws.com
Software
jag /
Resource Hash
55c9d2f019f9d7ddfd69b2ad0351c5617338a222362aebb02b3b98a4dbc18486
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-c
master-1105.I62e04a.M0-322
p3p
CP="This is not a P3P policy"
status
200
content-length
43
x-xss-protection
1; mode=block
pragma
no-cache
last-modified
Fri, 17 Jan 2020 08:42:00 GMT
server
jag
xserver
anedge-5bc5cd848f-8zbc5
etag
3391229125293604864-4614474644599425907
vary
*
content-type
image/gif;charset=utf-8
access-control-allow-origin
https://www.darkreading.com
cache-control
no-cache, no-store, max-age=0, no-transform, private
access-control-allow-credentials
true
expires
Wed, 15 Jan 2020 08:42:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120196&de=113506332021&m=0&ar=0de3535428-clean&iw=48f767e&q=15&cb=0&ym=0&cu=1579164120196&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=20049636%3A2633279246%3A5238858219%3A138299597077&zMoatPS=wallpaper&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=wallpaper&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=549569728&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
Cookie set login.jsp
ng.techweb.com/authds/login/ Frame 0883
0
0
Document
General
Full URL
https://ng.techweb.com/authds/login/login.jsp?type=iframe&cdsocket_client=https://www.darkreading.com/cdsocket_proxy.html
Requested by
Host: twimgs.com
URL: https://twimgs.com/nojitter/js/jquery-1.11.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
2620:103::192:155:48:119 , United States, ASN19994 (RACKSPACE - Rackspace Hosting, US),
Reverse DNS
Software
NG /
Resource Hash

Request headers

Host
ng.techweb.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

Set-Cookie
JSESSIONID=971AA20140851313C9C4BB214023A099; Path=/; Secure; HttpOnly
vary
accept-encoding
Content-Type
text/html;charset=ISO-8859-1
Content-Length
755
Date
Thu, 16 Jan 2020 08:42:00 GMT
Server
NG
Content-Encoding
gzip
Connection
Keep-Alive
widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html
platform.twitter.com/widgets/ Frame E666
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.4f8aea4342a4ada72cba2bdffcff6b4d.html?origin=https%3A%2F%2Fwww.darkreading.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Thu, 16 Jan 2020 08:42:00 GMT
Etag
"4b563298f37eb3ef2a2f8897be83c714+gzip"
Last-Modified
Thu, 09 Jan 2020 22:38:16 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/419E)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5825
like.php
www.facebook.com/plugins/ Frame 7F81
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D45%23cb%3Df32c6a297d8f3a8%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff7d98110fa902c%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=a4ef545c64fd1d6a3d141a100dd1e964&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?app_id=640989409269461&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D45%23cb%3Df32c6a297d8f3a8%26domain%3Dwww.darkreading.com%26origin%3Dhttps%253A%252F%252Fwww.darkreading.com%252Ff7d98110fa902c%26relation%3Dparent.parent&container_width=0&href=http%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729&layout=button&locale=en_US&sdk=joey&send=false&show_faces=false&width=87
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
accept-encoding
gzip, deflate, br
cookie
fr=0tr1YeyWUaMVoRLGO..BeICHX...1.0.BeICHX.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
mgRopys4RjX75vAJMXziq8W3CFA3zqCLgODOjStpxC9zls0k/W5PnMv3gV/jHCFehkcrFDvDfm8SVu7UYSvhoA==
date
Thu, 16 Jan 2020 08:42:00 GMT Thu, 16 Jan 2020 08:42:00 GMT
alt-svc
h3-24=":443"; ma=3600
record.do
ins.techweb.com/beacon/ Frame 67C0
0
0
Document
General
Full URL
https://ins.techweb.com/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%25253D%25253D&t=P
Requested by
Host: ins.techweb.com
URL: https://ins.techweb.com/beacon/js/beacon-min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681c:15a0 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
ins.techweb.com
:scheme
https
:path
/beacon/record.do?a=68841bbbf037b3bd9eda236cfd0edcb96932f665438d7b833aaa994d869277ac&u=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%25253D%25253D&t=P
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

status
204
date
Thu, 16 Jan 2020 08:42:01 GMT
set-cookie
__cfduid=d247c664312ff75907eb876dbec0718a91579164120; expires=Sat, 15-Feb-20 08:42:00 GMT; path=/; domain=.techweb.com; HttpOnly; SameSite=Lax Insights=31-41a52e39-21de-454a-91ad-e358ba0d6598; Domain=.techweb.com; Expires=Tue, 14-Jan-2025 08:42:00 GMT; Path=/
p3p
CP='IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT'
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
555ecb289b6c63a1-FRA
truncated
/ Frame 0A38
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
391eb2acd66d20b8f6499b5d6d41d17de7460d06477f258022e9cf3c517aa6d5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
/
www.facebook.com/tr/
0
38 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundarys1Zq3C3jlyIArlce

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
access-control-allow-origin
https://www.darkreading.com
date
Thu, 16 Jan 2020 08:42:00 GMT
content-type
text/plain
status
200
access-control-allow-credentials
true
alt-svc
h3-24=":443"; ma=3600
content-length
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120212&de=798007975256&m=0&ar=0de3535428-clean&iw=48f767e&q=19&cb=0&ym=0&cu=1579164120212&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2611451730%3A5269380382%3A138300263648&zMoatPS=native&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=native&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=1234640619&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash
636dbf4f87fa130596fdb491938e4ad2b693b397139ba7f8d2a34b738a494078

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:38:02 GMT
Server
ECS (fcn/40D2)
Etag
"352656b32c7e3a4e623687d598b66f66+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7937
timeline.f7ace10bb00711bb451dd36523152463.js
platform.twitter.com/js/
21 KB
7 KB
Script
General
Full URL
https://platform.twitter.com/js/timeline.f7ace10bb00711bb451dd36523152463.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
94f68df5309f2b9a301b4e43ed6a06e5b96220647c4bac806e9f1238207a92e9

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:38:01 GMT
Server
ECS (fcn/419E)
Etag
"ded8cb1f87ca509b84b7998dc3912224+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
6652
button.550007e6cc79c00bac51111d8131d860.js
platform.twitter.com/js/
7 KB
3 KB
Script
General
Full URL
https://platform.twitter.com/js/button.550007e6cc79c00bac51111d8131d860.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash
04f4ae45c416f3cae99c9092537f549e56653297e79cea04501e0ebed1e9bd1c

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:38:00 GMT
Server
ECS (fcn/419E)
Etag
"0c1c703295ecdf55c72e3a108ce862e8+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
2294
teads-format.min.js
a.teads.tv/media/format/v3/
722 KB
189 KB
Script
General
Full URL
https://a.teads.tv/media/format/v3/teads-format.min.js
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/page/11512/tag
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f46f3d4187c9739fcd27bb0aef461ab8aaee7138ed44c981d6cf5f15bae1c877

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
last-modified
Wed, 08 Jan 2020 09:55:19 GMT
x-amz-request-id
B21A0536A6F1A776
etag
"faa032d593f05eab21ad2143f354acae"
vary
Accept-Encoding
content-type
text/javascript;charset=utf-8
status
200
cache-control
private, must-revalidate, max-age=600
x-bucket
e
accept-ranges
bytes
content-length
192765
x-amz-id-2
Byx8Ww9N3teY4r+X76WR7wTp6bG2eMuQ2H1eEwJ7CQO/AY3zOH7OzvaiV4eG/75p9L4ODgBrQ/M=
expires
Thu, 16 Jan 2020 08:52:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120230&de=738631542544&m=0&ar=0de3535428-clean&iw=48f767e&q=23&cb=0&ym=0&cu=1579164120230&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2593515745%3A5238621993%3A138296840350&zMoatPS=rec2&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=rec2&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=142201548&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
profile
cdn.syndication.twimg.com/timeline/
170 KB
11 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/timeline/profile?callback=__twttr.callbacks.tl_i0_profile_DarkReading_old&dnt=true&domain=www.darkreading.com&lang=en&screen_name=DarkReading&suppress_response_codes=true&t=1754626&tz=GMT%2B0100&with_replies=false
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D4) /
Resource Hash
50a0994f79f4d0c6932fb0836c715e88b100a3b01fcdc02e5ce69d8ed9ead7d4
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-cache
HIT
status
200
content-disposition
attachment; filename=jsonp.jsonp
strict-transport-security
max-age=631138519
content-length
11089
x-xss-protection
0
x-response-time
158
last-modified
Thu, 16 Jan 2020 08:35:30 GMT
server
ECS (fcn/40D4)
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=300
x-connection-hash
1cfca7c8ab809a514aead231e98dd250
accept-ranges
bytes
timing-allow-origin
*
x-transaction
0055725b009a2396
expires
Thu, 16 Jan 2020 08:47:00 GMT
syndication
syndication.twitter.com/i/jot/
43 B
337 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?dnt=1&l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1579164120496%2C%22dnt%22%3Atrue%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22timeline%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.8 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
110
pragma
no-cache
last-modified
Thu, 16 Jan 2020 08:42:00 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
3cd344cc1c9f6e033c253f51b6f0cb9a
x-transaction
009a3980002e82dd
expires
Tue, 31 Mar 1981 05:00:00 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjAsImNsaWVudFRpbWVzdGFtcCI6MTU3OTE2NDEyMC40OTEsIm5hbWUiOiJjb250YWluZXJCZWNhbWVWaWV3YWJsZSJ9XX0=?crc32c=3495332804
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
tweet_button.4f8aea4342a4ada72cba2bdffcff6b4d.en.html
platform.twitter.com/widgets/ Frame 8D55
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.4f8aea4342a4ada72cba2bdffcff6b4d.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/419E) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Thu, 16 Jan 2020 08:42:00 GMT
Etag
"2eb5c81b21ea44c3b5996f83ddc67a6a+gzip"
Last-Modified
Thu, 09 Jan 2020 22:38:09 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/419E)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
12265
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F7123435453443161977&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120230&de=738631542544&cu=1579164120230&m=9&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3611&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A-%3A-&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=0&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=3&cd=0&ah=3&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2593515745%3A5238621993%3A138296840350&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=284553192&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
JJarF-wj
pbs.twimg.com/card_img/1217099199231250432/ Frame 919E
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1217099199231250432/JJarF-wj?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
42d91779d4a70f3709996e581044d96bf2b02a87e1c5688d9a6efcb63a750fb2
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
5286
x-response-time
137
surrogate-key
card_img card_img/bucket/4 card_img/1217099199231250432
last-modified
Tue, 14 Jan 2020 14:58:36 GMT
server
ECS (fcn/40FB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
d863240eb9c9e46ec0895d4f95e0fc84
accept-ranges
bytes
_PRvdZ-S
pbs.twimg.com/card_img/1217503138657206272/ Frame 919E
9 KB
9 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1217503138657206272/_PRvdZ-S?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E5) /
Resource Hash
c07b616ee2417157ee997fc747d66e9accaa224822150acf04571908126df3e1
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
9553
x-response-time
133
surrogate-key
card_img card_img/bucket/6 card_img/1217503138657206272
last-modified
Wed, 15 Jan 2020 17:43:43 GMT
server
ECS (fcn/40E5)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
28fbacf7c25cbb71feb8d18393a5f7ec
accept-ranges
bytes
Z7WLzQbL
pbs.twimg.com/card_img/1215292683192864769/ Frame 919E
7 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1215292683192864769/Z7WLzQbL?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40DD) /
Resource Hash
39767c4b4987ac643bf24d2392eb3a4a212cc1e0c785989dde7ad4ce5d601309
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
7643
x-response-time
136
surrogate-key
card_img card_img/bucket/7 card_img/1215292683192864769
last-modified
Thu, 09 Jan 2020 15:20:09 GMT
server
ECS (fcn/40DD)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
4d231f71a00f4993d2e0a1bb605431a8
accept-ranges
bytes
index.html
cmp.teads.mgr.consensu.org/ Frame 0FBC
0
0
Document
General
Full URL
https://cmp.teads.mgr.consensu.org/index.html
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:f1:1a2::2c92 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

Host
cmp.teads.mgr.consensu.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

x-amz-id-2
SV5EFkFZ8ZqpQsD+AUG7Qa0+yyq5t/W1g/nyayn+Vp4X0jt42ALr0VffnZFTtxXh14eD15d5ato=
x-amz-request-id
50F75886F93CE985
Last-Modified
Fri, 14 Sep 2018 07:42:32 GMT
ETag
"e7d6c2974a38b7ff77a560e83789f66a"
Accept-Ranges
bytes
Content-Type
text/html
Content-Length
583
Server
AmazonS3
Cache-Control
max-age=300
Expires
Thu, 16 Jan 2020 08:47:00 GMT
Date
Thu, 16 Jan 2020 08:42:00 GMT
Connection
keep-alive
p
sb.scorecardresearch.com/
43 B
575 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17198971&ns_ap_sv=2.1511.10&ns_type=hidden&ns_st_it=a&ns_st_sv=4.0.0&ns_st_ad=1&ns_st_sq=1&ns_st_id=1579164120613&ns_st_ec=1&ns_st_cn=1&ns_st_ev=play&ns_st_ct=va00&ns_st_cl=0&ns_st_pt=0&c3=*null&c4=*null&c6=*null&ns_ts=01915694&cs_ucfr=1
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
track
t.teads.tv/
23 B
157 B
Image
General
Full URL
https://t.teads.tv/track?action=placementCall&ts=1579164120611&pageId=11512&pid=21882&env=js-web&pfid=[pfid]&f=1&fv=180
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.99.233.143 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-99-233-143.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Thu, 16 Jan 2020 08:42:00 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Thu, 16 Jan 2020 08:42:00 GMT
track
t.teads.tv/
23 B
157 B
Image
General
Full URL
https://t.teads.tv/track?action=slotAvailable&ts=1579164120611&pageId=11512&pid=21882&env=js-web&pfid=[pfid]&f=1&slot=native&fv=180
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.99.233.143 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-99-233-143.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
328e90a318268aea96180cc31666ae6d6f79d90d078c123bc3d98ee08a192fb7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
pragma
no-cache
date
Thu, 16 Jan 2020 08:42:00 GMT
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
23
expires
Thu, 16 Jan 2020 08:42:00 GMT
timeline.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
platform.twitter.com/css/ Frame 919E
52 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/timeline.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E4) /
Resource Hash
12bf529a0f4d0a3f10d003a07d5b91e40579a3da18022a9896a9ccd9e5dc1b33

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:37:57 GMT
Server
ECS (fcn/40E4)
Etag
"0100ec69a2c00683a1ae89e074b822c1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
12155
timeline.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
platform.twitter.com/css/
52 KB
52 KB
Image
General
Full URL
https://platform.twitter.com/css/timeline.b19b28e5dd6afdadd09507e64bad84c7.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E4) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:00 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 Jan 2020 22:37:57 GMT
Server
ECS (fcn/40E4)
Etag
"0100ec69a2c00683a1ae89e074b822c1+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
12155
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120251&de=161931011982&m=0&ar=0de3535428-clean&iw=48f767e&q=27&cb=0&ym=0&cu=1579164120251&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=21887076%3A2608796044%3A5191297188%3A138293483450&zMoatPS=top&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=top&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=1616830568&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
css
fonts.googleapis.com/ Frame 3AFF
269 B
320 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:400&text=%20BCDEGILMORSUVadeor
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
05fb3aec19b88f9bfe8d138014f7333eace881236b39f8270e02d12705a1fa6b
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Thu, 16 Jan 2020 08:42:00 GMT
server
ESF
access-control-allow-origin
*
date
Thu, 16 Jan 2020 08:42:00 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Thu, 16 Jan 2020 08:42:00 GMT
JJarF-wj
pbs.twimg.com/card_img/1217099199231250432/ Frame 919E
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1217099199231250432/JJarF-wj?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
42d91779d4a70f3709996e581044d96bf2b02a87e1c5688d9a6efcb63a750fb2
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
5286
x-response-time
137
surrogate-key
card_img card_img/bucket/4 card_img/1217099199231250432
last-modified
Tue, 14 Jan 2020 14:58:36 GMT
server
ECS (fcn/40FB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
d863240eb9c9e46ec0895d4f95e0fc84
accept-ranges
bytes
_PRvdZ-S
pbs.twimg.com/card_img/1217503138657206272/ Frame 919E
9 KB
9 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1217503138657206272/_PRvdZ-S?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E5) /
Resource Hash
c07b616ee2417157ee997fc747d66e9accaa224822150acf04571908126df3e1
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
9553
x-response-time
133
surrogate-key
card_img card_img/bucket/6 card_img/1217503138657206272
last-modified
Wed, 15 Jan 2020 17:43:43 GMT
server
ECS (fcn/40E5)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
28fbacf7c25cbb71feb8d18393a5f7ec
accept-ranges
bytes
Z7WLzQbL
pbs.twimg.com/card_img/1215292683192864769/ Frame 919E
7 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1215292683192864769/Z7WLzQbL?format=jpg&name=144x144_2
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/js/moment~timeline~tweet.a1aa0f6410f7eaada23e6b16a38824b8.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40DD) /
Resource Hash
39767c4b4987ac643bf24d2392eb3a4a212cc1e0c785989dde7ad4ce5d601309
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
7643
x-response-time
136
surrogate-key
card_img card_img/bucket/7 card_img/1215292683192864769
last-modified
Thu, 09 Jan 2020 15:20:09 GMT
server
ECS (fcn/40DD)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
4d231f71a00f4993d2e0a1bb605431a8
accept-ranges
bytes
A4mG0U5P_normal.jpg
pbs.twimg.com/profile_images/885169621795565573/ Frame 919E
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/885169621795565573/A4mG0U5P_normal.jpg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B4) /
Resource Hash
25b438de3e944547e69c6de98e403f46a9aa4fb98e6d1bb34954fd30ebc19b56
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
1883
x-response-time
109
surrogate-key
profile_images profile_images/bucket/8 profile_images/885169621795565573
last-modified
Wed, 12 Jul 2017 16:08:58 GMT
server
ECS (fcn/40B4)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
913f17642f90340813e1ac4b539e90a7
accept-ranges
bytes
ad
a.teads.tv/page/11512/
118 B
338 B
XHR
General
Full URL
https://a.teads.tv/page/11512/ad?windowWidth=1600&windowHeight=1200&windowDepth=1&windowReferrerUrl=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&page=%7B%22id%22%3A11512%2C%22placements%22%3A%5B%7B%22id%22%3A21882%2C%22validity%22%3A%7B%22status%22%3Atrue%2C%22reasons%22%3A%5B%5D%7D%2C%22player%22%3A%7B%22width%22%3A489%2C%22height%22%3A275%7D%2C%22slotType%22%3A%22native%22%7D%5D%2C%22gdpr_iab%22%3A%7B%22status%22%3A22%2C%22consent%22%3A%22%22%2C%22reason%22%3A220%7D%7D&userId=050ac4dc-2aa0-40c6-a001-2a8a91cb9584&formatVersion=2.22.61&env=js-web&netBw=10&ttfb=868
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2.18.232.7 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-7.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f50167bee40cd7fdd6c623efb794e0edddec7de87ef71f48c8b1b1413e1dfc4a

Request headers

Accept
application/json; charset=UTF-8
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Origin
https://www.darkreading.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
status
200
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
https://www.darkreading.com
cache-control
max-age=0, no-cache, no-store
access-control-allow-credentials
true
content-length
129
expires
Thu, 16 Jan 2020 08:42:00 GMT
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/ Frame 919E
44 KB
7 KB
Stylesheet
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
a549034009f79ead18a2154a8b730d8acb61e2f36c0434c0f9cff0f73df5d8cf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
45170
x-cache
HIT
status
200
strict-transport-security
max-age=631138519
content-length
6839
x-response-time
8
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-connection-hash
b6aa28103d865fac0edb12e31e750d84
accept-ranges
bytes
expires
Thu, 23 Jan 2020 08:42:00 GMT
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/
44 KB
44 KB
Image
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
45170
x-cache
HIT
status
200
strict-transport-security
max-age=631138519
content-length
6839
x-response-time
8
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-connection-hash
b6aa28103d865fac0edb12e31e750d84
accept-ranges
bytes
expires
Thu, 23 Jan 2020 08:42:00 GMT
truncated
/ Frame 919E
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
45055babdbc02ea34c7baa53f33fc68389c4c5f73afe0bfafd6c9bc5733399bc

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame 919E
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
abd2a457215e60ab60b2a6b4f25a17583c5d80e13935f76e097236f729c5dcd6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/ Frame 919E
644 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a87f4fd815fc95288f2da6efc536c950ef940bd9eb52176fd9e8e56107cc65e2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
One%20Phish%2C%20Two%20Phish%2C%20Three%20Phish%2C%20Fraud%20Phish.jpg
cache-ssl.celtra.com/api/blobs/ecb2149c003d7c5bc5369bbae684a912c877da90758ad44987c426db3460652c/ Frame 3AFF
24 KB
25 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/ecb2149c003d7c5bc5369bbae684a912c877da90758ad44987c426db3460652c/One%20Phish%2C%20Two%20Phish%2C%20Three%20Phish%2C%20Fraud%20Phish.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
4fcf5bed75a5547edeb07af473406d2dac2f503d5619ccfe1292f0c6ebabbb88

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 12 Dec 2019 05:28:36 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
3035604
x-cache
Hit from cloudfront
status
200
content-length
24801
server
Apache
etag
"4fcf5bed75a5547edeb07af473406d2dac2f503d5619ccfe1292f0c6ebabbb88"
x-varnish
935283 829629
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
MvWkhek8abYNRkQZQ8DyVwIVTEqIZ6esg2_1UN2zzChtwBocOA7hQQ==
the-five-essential-capabilities-of-an-analytics-driven-SOC.jpg
cache-ssl.celtra.com/api/blobs/21dec4417fab0ebc9521971cb5e698416e4837f09d3d9a2e890549c24862d74f/ Frame 3AFF
4 KB
4 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/21dec4417fab0ebc9521971cb5e698416e4837f09d3d9a2e890549c24862d74f/the-five-essential-capabilities-of-an-analytics-driven-SOC.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
e9948cd34d8cb0ada5d19306710a579a6ea1ab866fb74cb5187380532cf50fc2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:54 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415225
x-cache
Hit from cloudfront
status
200
content-length
3974
server
Apache
etag
"e9948cd34d8cb0ada5d19306710a579a6ea1ab866fb74cb5187380532cf50fc2"
x-varnish
1738739
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
ZTrN7J8veC3qX-KuA8ZLUoMPPn8FTltxBbiUjozHQcaBP-6vfupchg==
the-essential-guide-to-security.png
cache-ssl.celtra.com/api/blobs/b2dc6daa6d8dbc54f1c3b32d2b3af56cf4fe6b736e89cb8ac9d56b6b6b89f155/ Frame 3AFF
14 KB
15 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b2dc6daa6d8dbc54f1c3b32d2b3af56cf4fe6b736e89cb8ac9d56b6b6b89f155/the-essential-guide-to-security.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
300da6e41a56c8946f29a6094e4addf4320ea4451e2e1dd8826c919f6c79f639

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 02 Jan 2020 21:50:37 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
1162283
x-cache
Hit from cloudfront
status
200
content-length
14772
server
Apache
etag
"300da6e41a56c8946f29a6094e4addf4320ea4451e2e1dd8826c919f6c79f639"
x-varnish
15906825
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
K8xX96zpA3kQpKSbeRUP6lUgiJDlV0WQg25MStpHylSFP0Hby6q6MQ==
security-predictions-2020-1.jpg
cache-ssl.celtra.com/api/blobs/239a9ee69ffe945834b593be81072a70aa2ddf413054a50173bd170f6904bd2d/ Frame 3AFF
61 KB
62 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/239a9ee69ffe945834b593be81072a70aa2ddf413054a50173bd170f6904bd2d/security-predictions-2020-1.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
a1270fab3a0802a2a90ac26f825ab07d0b72c82257c23247f4432f2db6baaca8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 12 Dec 2019 05:25:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
190863
x-cache
Hit from cloudfront
status
200
content-length
62482
server
Apache
etag
"a1270fab3a0802a2a90ac26f825ab07d0b72c82257c23247f4432f2db6baaca8"
x-varnish
4013022 5408127
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
WokoAlYMSEonF22Z-29e91OAfE5p_8KII5YZY7BSyt8dme_Qf8NoNA==
The%20SIEM%20Buyers%20Guide%20for%202020.jpeg.jpg
cache-ssl.celtra.com/api/blobs/dd0e38d4a8b6756d7eafd68a1381a554411570385bd98f31b199708d056716a1/ Frame 3AFF
15 KB
15 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/dd0e38d4a8b6756d7eafd68a1381a554411570385bd98f31b199708d056716a1/The%20SIEM%20Buyers%20Guide%20for%202020.jpeg.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
85825dee492b21f4730c29f8be895a878ef69e5780d87b57659341626d337193

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415225
x-cache
Hit from cloudfront
status
200
content-length
15253
server
Apache
etag
"85825dee492b21f4730c29f8be895a878ef69e5780d87b57659341626d337193"
x-varnish
1704708
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
Gvji3gzAbxuXumPjcGnLDmhHHBmqp1S1_mgqlPXwO45ipBd7oawwag==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 3AFF
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 19 Sep 2019 00:25:46 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
3307590
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5902826
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
lXJeAtx30WH_GMc_o7Gxjc4mWOFALNFv-TaMF1l3PVXGAEFGUDAaYg==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 3AFF
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 21:53:39 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
1595006
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
726002
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
V6pDtYj6nouUwDyb5KebK6dBIjZsbS8KZwLiu-3chp2JBIpH8OHl2A==
li.png
cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/ Frame 3AFF
608 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/li.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
315960
x-cache
Hit from cloudfront
status
200
content-length
608
server
Apache
etag
"2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48"
x-varnish
3868297
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
QRNlvazNpRIk12x3b7nwFICoBHlze_QsBim5E76IF9lBRx-gTNdM7g==
li_hover.png
cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/ Frame 3AFF
612 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/li_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
566390
x-cache
Hit from cloudfront
status
200
content-length
612
server
Apache
etag
"3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7"
x-varnish
2164721
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
RZCmUcTKQhmlt8_t6327LAOUP_6rKAyH9VTaOjT1N3qgdTk4KucV_A==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 3AFF
348 B
845 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 16 Sep 2019 21:26:10 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
909967
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
5821160 2559395
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
V1egctCqdpUyv-r5geHuWsTW5L__qJloqVVdtjbsvKQiovI0misMsw==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 3AFF
348 B
841 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 05:16:48 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
558504
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
1020844
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
7FkJbidgz8JaGTgPtHwXuk8ZjFv18-QIKbsK4VuZ48kT_NFfpHUs_w==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 3AFF
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 16 Sep 2019 20:38:20 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
310565
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
7408973 6009460
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
MkLzcSc8_u4sucZYVc3No8h3QMMjGEeRfz_ZKk3ITJx_rNlwut-IKA==
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame 3AFF
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 05:16:43 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
310565
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
5754314
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
R-R9V4BJ0FgKFo_xWA8781JUFJdy75LOPHcFXNsWkuhTz0A5rEfCgQ==
splunk-logo.png
cache-ssl.celtra.com/api/blobs/470f3ac2f042a93825f23e987a7252b94b94086eaeadc1ef123c4bc40a8acf8a/ Frame 3AFF
7 KB
8 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/470f3ac2f042a93825f23e987a7252b94b94086eaeadc1ef123c4bc40a8acf8a/splunk-logo.png?transform=crush&quality=256
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
50152a4756f38eac1830111c706d04740b68ddb53d97aa94c68de6026235b18e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415225
x-cache
Hit from cloudfront
status
200
content-length
7301
server
Apache
etag
"50152a4756f38eac1830111c706d04740b68ddb53d97aa94c68de6026235b18e"
x-varnish
1018154
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
nEdI4tzAmPi21FcVBN2YloIuXcHgdNebgiHzQ6YOg03cTCc9WmvbVg==
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fs0.2mdn.net%2F9736922%2F11062019-121559628-RSA200054_Disc_banners_gen-728X90.jpg&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120251&de=161931011982&cu=1579164120251&m=7&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3611&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=1&an=0&gf=1&gg=0&ix=1&ic=1&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=1&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=2&cd=0&ah=2&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=21887076%3A2608796044%3A5191297188%3A138293483450&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DOMSEARCH&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=236820389&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
font
fonts.gstatic.com/l/ Frame 3AFF
2 KB
2 KB
Font
General
Full URL
https://fonts.gstatic.com/l/font?kit=S6uyw4BMUTPHvxw6WQevLjTIr55xq7MRmoOKXtz4bjVMPb5_&skey=2d58b92a99e1c086&v=v16
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:815::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
f3c29694754d2b8fd7c310f93f42217d6a01acefe0606f5778d4f804c4eb895a
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Lato:400&text=%20BCDEGILMORSUVadeor
Origin
https://www.darkreading.com

Response headers

date
Wed, 15 Jan 2020 19:21:51 GMT
last-modified
Tue, 23 Jul 2019 17:22:44 GMT
server
ESF
age
48009
x-frame-options
SAMEORIGIN
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400
content-disposition
attachment; filename="font.woff2"; filename*=UTF-8''font.woff2
timing-allow-origin
*
access-control-allow-origin
*
content-length
2276
x-xss-protection
0
expires
Wed, 15 Jan 2020 19:21:51 GMT
iframe
sync.teads.tv/ Frame 475F
0
0
Document
General
Full URL
https://sync.teads.tv/iframe?pid=21882&userId=050ac4dc-2aa0-40c6-a001-2a8a91cb9584&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&1579164120753
Requested by
Host: a.teads.tv
URL: https://a.teads.tv/media/format/v3/teads-format.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.45.108.93 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-108-93.deploy.static.akamaitechnologies.com
Software
akka-http/10.1.5 /
Resource Hash

Request headers

:method
GET
:authority
sync.teads.tv
:scheme
https
:path
/iframe?pid=21882&userId=050ac4dc-2aa0-40c6-a001-2a8a91cb9584&gdprIab={%22status%22:22,%22consent%22:%22%22,%22reason%22:220}&fromFormat=true&env=js-web&1579164120753
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
accept-encoding
gzip, deflate, br
cookie
tt_viewer=ef9e4372-09d9-4de4-8393-9ffa54506dd6
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D

Response headers

status
200
content-type
text/html; charset=UTF-8
server
akka-http/10.1.5
vary
Accept-Encoding
content-encoding
gzip
expires
Thu, 16 Jan 2020 08:42:00 GMT
cache-control
max-age=0, no-cache, no-store
pragma
no-cache
date
Thu, 16 Jan 2020 08:42:00 GMT
content-length
600
set-cookie
tt_exelate=; Expires=Fri, 17 Jan 2020 08:42:00 GMT; Domain=.teads.tv; Secure; SameSite=None tt_bluekai=; Expires=Fri, 17 Jan 2020 08:42:00 GMT; Domain=.teads.tv; Secure; SameSite=None tt_emetriq=; Expires=Fri, 17 Jan 2020 08:42:00 GMT; Domain=.teads.tv; Secure; SameSite=None tt_liveramp=; Expires=Fri, 17 Jan 2020 08:42:00 GMT; Domain=.teads.tv; Secure; SameSite=None tt_neustar=; Expires=Fri, 17 Jan 2020 08:42:00 GMT; Domain=.teads.tv; Secure; SameSite=None tt_salesforce=; Expires=Fri, 17 Jan 2020 08:42:00 GMT; Domain=.teads.tv; Secure; SameSite=None tt_dar=; Expires=Fri, 17 Jan 2020 08:42:00 GMT; Domain=.teads.tv; Secure; SameSite=None tt_skp=; Expires=Fri, 17 Jan 2020 08:42:00 GMT; Domain=.teads.tv; Secure; SameSite=None
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=PENTONMEDIA1&hp=1&wf=1&vb=13&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120436&de=867247118871&m=0&ar=0de3535428-clean&iw=48f767e&q=31&cb=0&ym=0&cu=1579164120436&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=17527716%3A193997916%3A42403476%3A138212589663&zMoatPS=video&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&bo=27868836&bp=43863396&bd=video&dfp=0%2C1&la=43863396&gw=pentonmedia53440730609&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=1073719315&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:00 GMT
splunk-logo.png
cache-ssl.celtra.com/api/blobs/470f3ac2f042a93825f23e987a7252b94b94086eaeadc1ef123c4bc40a8acf8a/ Frame 3AFF
7 KB
8 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/470f3ac2f042a93825f23e987a7252b94b94086eaeadc1ef123c4bc40a8acf8a/splunk-logo.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
50152a4756f38eac1830111c706d04740b68ddb53d97aa94c68de6026235b18e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415225
x-cache
Hit from cloudfront
status
200
content-length
7301
server
Apache
etag
"50152a4756f38eac1830111c706d04740b68ddb53d97aa94c68de6026235b18e"
x-varnish
1018154
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
rCx-pIC6PTls0qxipOvFWnSvXkjIpCiwsXcCkGjWUWWbf6ko88RnRA==
One%20Phish%2C%20Two%20Phish%2C%20Three%20Phish%2C%20Fraud%20Phish.jpg
cache-ssl.celtra.com/api/blobs/ecb2149c003d7c5bc5369bbae684a912c877da90758ad44987c426db3460652c/ Frame 3AFF
24 KB
25 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/ecb2149c003d7c5bc5369bbae684a912c877da90758ad44987c426db3460652c/One%20Phish%2C%20Two%20Phish%2C%20Three%20Phish%2C%20Fraud%20Phish.jpg?transform=crush&quality=85
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
4fcf5bed75a5547edeb07af473406d2dac2f503d5619ccfe1292f0c6ebabbb88

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 12 Dec 2019 05:28:36 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
3035604
x-cache
Hit from cloudfront
status
200
content-length
24801
server
Apache
etag
"4fcf5bed75a5547edeb07af473406d2dac2f503d5619ccfe1292f0c6ebabbb88"
x-varnish
935283 829629
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
cSZtNGo9onvxsCSryIALnneO2TFU3VHhQwGZLy-uTh1ctSeYxqhN7Q==
the-five-essential-capabilities-of-an-analytics-driven-SOC.jpg
cache-ssl.celtra.com/api/blobs/21dec4417fab0ebc9521971cb5e698416e4837f09d3d9a2e890549c24862d74f/ Frame 3AFF
4 KB
4 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/21dec4417fab0ebc9521971cb5e698416e4837f09d3d9a2e890549c24862d74f/the-five-essential-capabilities-of-an-analytics-driven-SOC.jpg?transform=crush&quality=85
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
e9948cd34d8cb0ada5d19306710a579a6ea1ab866fb74cb5187380532cf50fc2

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:54 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415225
x-cache
Hit from cloudfront
status
200
content-length
3974
server
Apache
etag
"e9948cd34d8cb0ada5d19306710a579a6ea1ab866fb74cb5187380532cf50fc2"
x-varnish
1738739
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
XZSImUg9Ti0Dgyp6HzqLEygfzTdagHgbP2kCh8FO_59K2tI7ozlsag==
the-essential-guide-to-security.png
cache-ssl.celtra.com/api/blobs/b2dc6daa6d8dbc54f1c3b32d2b3af56cf4fe6b736e89cb8ac9d56b6b6b89f155/ Frame 3AFF
14 KB
15 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b2dc6daa6d8dbc54f1c3b32d2b3af56cf4fe6b736e89cb8ac9d56b6b6b89f155/the-essential-guide-to-security.png?transform=crush&quality=256
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
300da6e41a56c8946f29a6094e4addf4320ea4451e2e1dd8826c919f6c79f639

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 02 Jan 2020 21:50:37 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
1162283
x-cache
Hit from cloudfront
status
200
content-length
14772
server
Apache
etag
"300da6e41a56c8946f29a6094e4addf4320ea4451e2e1dd8826c919f6c79f639"
x-varnish
15906825
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
q7bal9BQMWUWrTwRF5yq_NzuC_HLpM15mAjEELQandaxjzafhEkijA==
security-predictions-2020-1.jpg
cache-ssl.celtra.com/api/blobs/239a9ee69ffe945834b593be81072a70aa2ddf413054a50173bd170f6904bd2d/ Frame 3AFF
61 KB
62 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/239a9ee69ffe945834b593be81072a70aa2ddf413054a50173bd170f6904bd2d/security-predictions-2020-1.jpg?transform=crush&quality=85
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
a1270fab3a0802a2a90ac26f825ab07d0b72c82257c23247f4432f2db6baaca8

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 12 Dec 2019 05:25:44 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
3035776
x-cache
Hit from cloudfront
status
200
content-length
62482
server
Apache
etag
"a1270fab3a0802a2a90ac26f825ab07d0b72c82257c23247f4432f2db6baaca8"
x-varnish
4013022 5408127
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
Kh4S4IvH90t_Hc4ga-BgUqhZpDzu-dU_2bjMWxY6vY0reXYpp4dqCg==
The%20SIEM%20Buyers%20Guide%20for%202020.jpeg.jpg
cache-ssl.celtra.com/api/blobs/dd0e38d4a8b6756d7eafd68a1381a554411570385bd98f31b199708d056716a1/ Frame 3AFF
15 KB
15 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/dd0e38d4a8b6756d7eafd68a1381a554411570385bd98f31b199708d056716a1/The%20SIEM%20Buyers%20Guide%20for%202020.jpeg.jpg?transform=crush&quality=85
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
85825dee492b21f4730c29f8be895a878ef69e5780d87b57659341626d337193

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415225
x-cache
Hit from cloudfront
status
200
content-length
15253
server
Apache
etag
"85825dee492b21f4730c29f8be895a878ef69e5780d87b57659341626d337193"
x-varnish
1704708
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
j8vTxX1VPBHVUFj99aeAHC53meocPOy3xN_KJDFHQ69LfszscD4kyw==
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 3AFF
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 19 Sep 2019 00:25:46 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10311373
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5902826
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
h_8VCtwHIpxtf35B9KKhfxfmRXbajIj_dS6Ks9pvnsPgHPFfBRQiog==
li.png
cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/ Frame 3AFF
608 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/li.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415225
x-cache
Hit from cloudfront
status
200
content-length
608
server
Apache
etag
"2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48"
x-varnish
3868297
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
GSn2UI2LJ-I817NrVTShdp2hFFfNHiqrnI1PsnrFNJpKKN_ERIBK3A==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 3AFF
348 B
846 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 16 Sep 2019 21:26:10 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10494949
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
5821160 2559395
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
nGp5ntuzAvUsBeeQiOK83ngtU5wBoHvoB7uGAs-GI0hK3_CR6Ihx-w==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 3AFF
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 16 Sep 2019 20:38:20 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10497820
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
7408973 6009460
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
TKxKc3PP946CJjf9B6r3KtjVh6TwRiiKgqjqWkWh4YzyaS35pLdfvA==
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.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?crc32c=275931854
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:00 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
ton.twimg.com/tfw/assets/ Frame 919E
829 B
541 B
Image
General
Full URL
https://ton.twimg.com/tfw/assets/news_stroke_v1_78ce5b21fb24a7c7e528d22fc25bd9f9df7f24e2.svg
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41AC) /
Resource Hash
5c0f79d0286f1fd3db48e1b689358017b302c0f4babde540329e8c644cf119c7
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
829
x-cache
HIT
status
200
strict-transport-security
max-age=631138519
content-length
395
x-response-time
8
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:55 GMT
server
ECS (fcn/41AC)
etag
"CTUg6L9PuY+d9h5xpE0zmw=="
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
x-connection-hash
476029081d01a5931a1633cb614dcb8a
accept-ranges
bytes
expires
Thu, 23 Jan 2020 08:42:00 GMT
iframe_api
www.youtube.com/ Frame 3AFF
859 B
1 KB
Script
General
Full URL
https://www.youtube.com/iframe_api
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
YouTube Frontend Proxy /
Resource Hash
26c5d881f8634d2d70564f559f7da989a62387eeafb66e6d1c9dea9aee966d6d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
server
YouTube Frontend Proxy
content-type
application/javascript
status
200
cache-control
no-cache
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Tue, 27 Apr 1971 19:44:06 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjcsImNsaWVudFRpbWVzdGFtcCI6MTU3OTE2NDEyMC44MTEsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTc5MTY0MTIwLjc5NCwidG8iOjE1NzkxNjQxMjAuNzk0fV19?crc32c=2253964946
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
tw.png
cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/ Frame 3AFF
781 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/9ad81786e386c3155cbc468769eddcc96e3e991156ad745860288c59c63a417c/tw.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 19 Sep 2019 00:25:46 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10311373
x-cache
Hit from cloudfront
status
200
content-length
781
server
Apache
etag
"308e134d9a0df8031a894aa2bb6e70515cb9db2403e3e568e7554ae69f474c96"
x-varnish
5902826
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
ylatOv_s6XTpWCTNwppV1oFVoaqrNSELrO9UHxzn2Tz3HuhOvOCs6A==
tw_hover.png
cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/ Frame 3AFF
777 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/f0cccd681d168932db801410643c93f0df03370d5c638ab3e4a16e92b80b3aa0/tw_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 21:53:39 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10406901
x-cache
Hit from cloudfront
status
200
content-length
777
server
Apache
etag
"1ace1b17e77ec3828eda87eb3fea3671ce2a0f706426fbd158873546c4f9366e"
x-varnish
726002
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
2-lUrMJXjUFPxiiPRQP9fUkP6eHNAPQ_irdW4IV6RqdLnrNkhSzMPA==
li.png
cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/ Frame 3AFF
608 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/8abad5101e4e04aaad9758773bd0e6eead30303742f732e5235e7d73be899598/li.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415225
x-cache
Hit from cloudfront
status
200
content-length
608
server
Apache
etag
"2e8c15ba0e22d227940fcc5ae790599e1b32a636d9b28e174e864a4884ee7e48"
x-varnish
3868297
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
nCzfzx1ZkfPTjKUIaEzrl2F9JUSrnQPFW64xI-NQkMcDcBh7UxW8KA==
li_hover.png
cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/ Frame 3AFF
612 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/b7a1a128e1e4be19257209f345f26c688422071122ed660518782b609158ad7a/li_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 19:34:55 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10415226
x-cache
Hit from cloudfront
status
200
content-length
612
server
Apache
etag
"3bb72e5a3bd7858a708f629dfc7e2f2aa9d87ee8a43b1c22b300e49cd59b09d7"
x-varnish
2164721
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
5I5RrOhXPFmaXTy-CCOpxAssVUnHJ2H5UuVnYjJcdxNjrrWFs8MQOg==
fb.png
cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/ Frame 3AFF
348 B
847 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/44f24c3edfffb11dd41284fe3c7bddb08dc29236aa3509e3a243c10f9804b28d/fb.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 16 Sep 2019 21:26:10 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10494949
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"e9d0cab69a4c71df7a16b6ee6f99ea474423689c8eadd7aa62ce9cef3a48c395"
x-varnish
5821160 2559395
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
KpqFrO6--RUYYhNZ4fKRnH5h2bR_fl2JnzF6aMyX8ypfsO-57xh55g==
fb_hover.png
cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/ Frame 3AFF
348 B
840 B
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/652ab50d0e331e4269bb4d847fcc5a5a4e3def07bb1ebca4d2d6fda889e52604/fb_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 05:16:48 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10466712
x-cache
Hit from cloudfront
status
200
content-length
348
server
Apache
etag
"9250f0b586e89674ec647d8dfb6fe7aedcb588be13ebb6aeb1286efa9d3cfb39"
x-varnish
1020844
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
N4ruZa9pDaulvDJi_F7cuS05o4qlYpOYerVThnfhjaBHuN6oJKExJw==
yt.png
cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/ Frame 3AFF
914 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/13d77e3befd746d58356da2f0b0d1d20af11ba13ea0ca8cd7b73871ef1d40edd/yt.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Mon, 16 Sep 2019 20:38:20 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10497820
x-cache
Hit from cloudfront
status
200
content-length
914
server
Apache
etag
"8c792dc2527753d5f758a812c5de2225dba619ecd83b05713ce68b0db858fa28"
x-varnish
7408973 6009460
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
qQ9X2IKhYSIkyWl2LiNGZh6pvax_Gjm6vAedZGZkUkL-wySfeOLC1w==
yt_hover.png
cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/ Frame 3AFF
918 B
1 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/05c871534a66ba01deefbc75b6ed2f9281993581e903223785a6f6a7ff82bebb/yt_hover.png?transform=crush
Requested by
Host: go.pulsesecure.net
URL: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 05:16:43 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10466716
x-cache
Hit from cloudfront
status
200
content-length
918
server
Apache
etag
"6e504d72d0b8fe63b71774d746594a7d13607ee5313241cc546a1bcd47909677"
x-varnish
5754314
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/png
x-amz-cf-id
RDiW3Pdl7y6psiIcf-KfAlDe0dXKhGUpyMtglUtUaT7uyEZ2-0E54g==
blog_image.jpg
cache-ssl.celtra.com/api/blobs/586fe08329cf219aabcc8d1c9a330ef821c28a1cb0795e082745145ebd40a9d3/ Frame 3AFF
35 KB
35 KB
Image
General
Full URL
https://cache-ssl.celtra.com/api/blobs/586fe08329cf219aabcc8d1c9a330ef821c28a1cb0795e082745145ebd40a9d3/blog_image.jpg?transform=crush&quality=85
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.37 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-37.fra2.r.cloudfront.net
Software
Apache /
Resource Hash
be444155ab8ebb9c8adc7736920039adf50f73d56822cd2f19527611c19767fc

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Tue, 17 Sep 2019 10:00:12 GMT
via
1.1 varnish (Varnish/5.0), 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
age
10449708
x-cache
Hit from cloudfront
status
200
content-length
35720
server
Apache
etag
"be444155ab8ebb9c8adc7736920039adf50f73d56822cd2f19527611c19767fc"
x-varnish
1147408
access-control-allow-origin
*
access-control-expose-headers
Accept-Ranges, Content-Encoding, Content-Length, Content-Range
cache-control
max-age=31556926
access-control-allow-credentials
false
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-type
image/jpeg
x-amz-cf-id
0H9X1bpis02nkeCxwskF4k1BC6VaI9sYJZLf4_oiQggd0mIQ8cQHNQ==
JJarF-wj
pbs.twimg.com/card_img/1217099199231250432/ Frame 919E
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1217099199231250432/JJarF-wj?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
42d91779d4a70f3709996e581044d96bf2b02a87e1c5688d9a6efcb63a750fb2
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
5286
x-response-time
137
surrogate-key
card_img card_img/bucket/4 card_img/1217099199231250432
last-modified
Tue, 14 Jan 2020 14:58:36 GMT
server
ECS (fcn/40FB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
d863240eb9c9e46ec0895d4f95e0fc84
accept-ranges
bytes
www-widgetapi.js
s.ytimg.com/yts/jsbin/www-widgetapi-vfl2vZZmd/ Frame 3AFF
27 KB
10 KB
Script
General
Full URL
https://s.ytimg.com/yts/jsbin/www-widgetapi-vfl2vZZmd/www-widgetapi.js
Requested by
Host: www.youtube.com
URL: https://www.youtube.com/iframe_api
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
0c9d9e231d515af03f69cb90c1247d21720b617fca9fe1bcbc0865f736d34bf9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 15 Jan 2020 06:43:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
93531
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10198
x-xss-protection
0
last-modified
Wed, 15 Jan 2020 05:15:37 GMT
server
sffe
vary
Accept-Encoding, Origin
content-type
text/javascript
cache-control
public, max-age=691200
accept-ranges
bytes
timing-allow-origin
https://www.youtube.com
expires
Thu, 23 Jan 2020 06:43:09 GMT
_PRvdZ-S
pbs.twimg.com/card_img/1217503138657206272/ Frame 919E
9 KB
9 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1217503138657206272/_PRvdZ-S?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E5) /
Resource Hash
c07b616ee2417157ee997fc747d66e9accaa224822150acf04571908126df3e1
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:00 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
9553
x-response-time
133
surrogate-key
card_img card_img/bucket/6 card_img/1217503138657206272
last-modified
Wed, 15 Jan 2020 17:43:43 GMT
server
ECS (fcn/40E5)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
28fbacf7c25cbb71feb8d18393a5f7ec
accept-ranges
bytes
imgad
tpc.googlesyndication.com/pagead/
30 KB
30 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKCn856DYxABGAEyCMLRCw-_yhyJ
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e2b60239457768e452e87887ecdb0aa907977fba8f1ff3c18dac1b0720aced35
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 13 Jan 2020 22:55:16 GMT
x-content-type-options
nosniff
server
cafe
age
208004
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-disposition
attachment; filename="image.png"
content-type
image/png
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
30286
x-xss-protection
0
expires
Mon, 20 Jan 2020 22:55:16 GMT
Z7WLzQbL
pbs.twimg.com/card_img/1215292683192864769/ Frame 919E
7 KB
8 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1215292683192864769/Z7WLzQbL?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40DD) /
Resource Hash
39767c4b4987ac643bf24d2392eb3a4a212cc1e0c785989dde7ad4ce5d601309
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:01 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
7643
x-response-time
136
surrogate-key
card_img card_img/bucket/7 card_img/1215292683192864769
last-modified
Thu, 09 Jan 2020 15:20:09 GMT
server
ECS (fcn/40DD)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
4d231f71a00f4993d2e0a1bb605431a8
accept-ranges
bytes
JJarF-wj
pbs.twimg.com/card_img/1217099199231250432/ Frame 919E
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1217099199231250432/JJarF-wj?format=jpg&name=144x144_2
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
42d91779d4a70f3709996e581044d96bf2b02a87e1c5688d9a6efcb63a750fb2
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 16 Jan 2020 08:42:01 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
5286
x-response-time
137
surrogate-key
card_img card_img/bucket/4 card_img/1217099199231250432
last-modified
Tue, 14 Jan 2020 14:58:36 GMT
server
ECS (fcn/40FB)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
d863240eb9c9e46ec0895d4f95e0fc84
accept-ranges
bytes
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=https%3A%2F%2Fwww.darkreading.com%2F%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120159&de=99838943456&cu=1579164120159&m=1051&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6163&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=72&an=0&gf=72&gg=0&ix=72&ic=72&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=72&bx=0&dj=1&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=144&cd=0&ah=144&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840464&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=84336143&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:01 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120174&de=530691071818&cu=1579164120174&m=1090&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6163&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=55&vx=55%3A55%3A-&as=1&ag=1082&an=3&gf=578&gg=3&ix=578&ic=578&ez=1&ck=1082&kw=880&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1082&bx=3&ci=1082&jz=880&dj=1&aa=0&ad=959&cn=0&gk=455&gl=0&ik=455&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=880&cd=5&ah=880&am=5&rf=0&re=1&ft=959&fv=0&fw=959&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840470&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1642517342&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:01 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 6E57
42 B
115 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuai8UIc4O76X77q0j-jZ-EIgRk5DrUswXr-nBqlU4wZ1HsCiDpBNSdhwXgLpOMVvY-7_MAOZxEnWb6hfq-Q7F7h3nufoWGjpdF1E6ii2Q&sig=Cg0ArKJSzLae3at6TlYJEAE&adk=2966194094&tt=-1&bs=1585%2C1200&mtos=1043,1043,1043,1043,1043&tos=1043,0,0,0,0&p=98,428,188,1156&mcvt=1043&rs=3&ht=0&tfs=34&tls=1077&mc=1&lte=1&bas=0&bac=0&met=ie&avms=nio&exg=1&md=2&lm=2&rst=1579164119946&dlt&rpt=319&isd=0&msd=0&ext&imams=1&xdi=0&ps=1585%2C6163&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-10-2-9-9-0-0-0&tvt=1077&is=728%2C90&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&r=v&id=osdim&vs=4&uc=10&upc=1&tgt=DIV&cl=1&cec=2&wf=0&cac=1&cd=0x0&itpl=19&v=20200115
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:42:01 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120251&de=161931011982&cu=1579164120251&m=1087&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6163&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=1080&an=1&gi=1&gf=1080&gg=1&ix=1080&ic=1080&ez=1&ck=1080&kw=869&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1080&bx=1&ci=1080&jz=869&dj=1&aa=0&ad=969&cn=0&gk=969&gl=0&ik=969&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=869&cd=2&ah=869&am=2&rf=0&re=1&ft=969&fv=0&fw=969&wb=1&cl=0&at=0&d=21887076%3A2608796044%3A5191297188%3A138293483450&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1075610839&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:01 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame ED9E
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssaXXzxjXUPwZbdvW1r33uKFFuZR94dMkIs2I4LCrNECUN4WKU-DMBmAfLZNTeTfOuCsWx8lKUqpE8u0nASQGHUa0wxcljyACAethzFB9c&sig=Cg0ArKJSzBmXEVhMzoXIEAE&adk=2332965166&tt=-1&bs=1585%2C1200&mtos=0,0,1035,1035,1035&tos=0,0,1035,0,0&p=360,293,362,294&mcvt=1035&rs=0&ht=0&tfs=305&tls=1340&mc=0.5&lte=1&bas=0&bac=0&met=ce&avms=nio&exg=1&md=2&lm=2&rst=1579164119943&dlt&rpt=258&isd=0&msd=0&ext&imams=1&xdi=0&ps=1585%2C6163&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-12-2-11-11-0-0-0&tvt=1339&is=1%2C2&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&r=v&id=osdim&vs=4&uc=12&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200115
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:42:01 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120251&de=161931011982&cu=1579164120251&m=1091&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6163&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=1080&an=1080&gi=1&gf=1080&gg=1080&ix=1080&ic=1080&ez=1&ck=1080&kw=869&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1080&bx=1080&ci=1080&jz=869&dj=1&aa=0&ad=969&cn=969&gk=969&gl=969&ik=969&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=869&cd=869&ah=869&am=869&rf=0&re=1&ft=969&fv=969&fw=969&wb=1&cl=0&at=0&d=21887076%3A2608796044%3A5191297188%3A138293483450&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1275686628&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:01 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame C200
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjsuAQNnQSrkOR8OrYdxnBIpKZ8oXnYAWjbtqCaW026vJZ_1VJTFhcMGExGR6fRBUFgUeqhc9CpLG3eJYixf7v7lmRP3VGH46FafT90Bl700&sig=Cg0ArKJSzLYPg4cvfRZlEAE&adk=1417865500&tt=-1&bs=1585%2C1200&mtos=1058,1058,1058,1058,1058&tos=1058,0,0,0,0&p=35,0,37,2&mcvt=1058&rs=0&ht=0&tfs=317&tls=1375&mc=1&lte=1&bas=0&bac=0&met=ce&avms=nio&exg=1&md=2&lm=2&rst=1579164119931&dlt&rpt=296&isd=0&msd=0&ext&imams=1&xdi=0&ps=1585%2C6163&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-13-6-12-12-0-0-0&tvt=1371&is=2%2C2&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&r=v&id=osdim&vs=4&uc=13&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200115
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:42:01 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120251&de=161931011982&cu=1579164120251&m=1093&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6163&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=1080&an=1080&gi=1&gf=1080&gg=1080&ix=1080&ic=1080&ez=1&ck=1080&kw=869&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1080&bx=1080&ci=1080&jz=869&dj=1&aa=0&ad=969&cn=969&gk=969&gl=969&ik=969&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=869&cd=869&ah=869&am=869&rf=0&re=1&ft=969&fv=969&fw=969&wb=1&cl=0&at=0&d=21887076%3A2608796044%3A5191297188%3A138293483450&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=482250055&cs=0
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:01 GMT
roundtrip.js
s.adroll.com/j/
35 KB
12 KB
Script
General
Full URL
https://s.adroll.com/j/roundtrip.js
Requested by
Host: www.darkreading.com
URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.216 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-216.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
10bdeb0242f97e5483f914eb5b752df183725a366af8f0c9ba8bb645586006ff

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-amz-version-id
_IkEf6DskU5rqggn.I2sIuaN0nx2cwvp
Content-Encoding
gzip
x-amz-request-id
F9D0DA43F8A7D2E7
x-amz-server-side-encryption
AES256
Access-Control-Max-Age
600
Date
Thu, 16 Jan 2020 08:42:01 GMT
Connection
keep-alive
Content-Length
11267
x-amz-id-2
kYq/HvQE2in2V0OJHqAxqYPYGdFqWIY5daBAJ8M6lbP+uFyBfe2MEB4kG/n5piNS5k7o+rxgLSo=
Last-Modified
Tue, 17 Dec 2019 22:01:13 GMT
Server
AmazonS3
ETag
"94890c8a120a76710f8edb7ac61589bf"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
activeview
pagead2.googlesyndication.com/pcs/ Frame 4C61
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjst7la3xLH3A3S8I-vZ1BzDm9QRZXsqvJQ6gA7jNBjPlX2uL782NJTK-k3F4r9lR5wkM5gzyjiahdJwFNU20jj7ssp-2VvNrf2oDEOXjC5s&sig=Cg0ArKJSzHcx0FhBA2w9EAE&adk=4220632109&tt=-1&bs=1585%2C1200&mtos=588,588,1101,1101,1101&tos=588,0,513,0,0&p=1062,953,1312,1253&mcvt=1101&rs=0&ht=0&tfs=303&tls=1404&mc=1&lte=1&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&lm=2&rst=1579164119940&dlt&rpt=252&isd=0&msd=0&ext&imams=1&xdi=0&ps=1585%2C6163&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-13-2-12-12-0-0-0&tvt=1403&is=300%2C250&invis=1&iframe_loc=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&r=v&id=osdim&vs=4&uc=13&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=300x250&itpl=3&v=20200115
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:42:01 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
imgad
tpc.googlesyndication.com/pagead/
39 KB
39 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/imgad?id=CICAgKCn3YLFehABGAEyCCIdbmsR-Ju2
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
29351e2b56e1425b95e0cd749fa1a3de97b923d53f35ba47a22343a7f72feeee
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 10 Jan 2020 07:13:13 GMT
x-content-type-options
nosniff
server
cafe
age
523728
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
public, max-age=604800
content-disposition
attachment; filename="image.png"
content-type
image/png
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
40336
x-xss-protection
0
expires
Fri, 17 Jan 2020 07:13:13 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120174&de=530691071818&cu=1579164120174&m=1293&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6163&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=55&vx=55%3A55%3A-&as=1&ag=1285&an=1082&gf=578&gg=578&ix=578&ic=578&ez=1&ck=1082&kw=880&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1285&bx=1082&ci=1082&jz=880&dj=1&aa=1&ad=1162&cn=959&gk=455&gl=455&ik=455&co=1162&cp=1084&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1084&cd=880&ah=1084&am=880&rf=0&re=1&ft=1162&fv=959&fw=959&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840470&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=232332631&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:01 GMT
index.js
s.adroll.com/j/exp/
Redirect Chain
  • https://s.adroll.com/j/exp/TQSV74R4GVCSJITSZC2MCP/index.js
  • https://s.adroll.com/j/exp/index.js
28 B
680 B
Script
General
Full URL
https://s.adroll.com/j/exp/index.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.216 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-216.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f59e5f34a941183aacaed25322ac0856628493c2cfd936ded3fddc0a49510e52

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-amz-version-id
rx7BfD9dnk7nfoe5xT7_CNiD5QUGCAZQ
x-amz-request-id
51DF29E7887C7081
x-amz-server-side-encryption
AES256
Date
Thu, 16 Jan 2020 08:42:01 GMT
Connection
keep-alive
Content-Length
28
x-amz-id-2
II7UahBMIgVcAvb1Dfh0CpxicIqcLG+u9Ryx4iiU49gWSKTYc6r94rJuSQXbOyIym+oz57ryAHw=
Last-Modified
Wed, 15 Jan 2020 16:28:19 GMT
Server
AmazonS3
ETag
"5816cced8568d223aa09d889f300692b"
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*

Redirect headers

Date
Thu, 16 Jan 2020 08:42:01 GMT
Server
AkamaiGHost
Access-Control-Allow-Origin
*
Access-Control-Max-Age
600
Access-Control-Allow-Methods
GET
Location
https://s.adroll.com/j/exp/index.js
Access-Control-Allow-Credentials
false
Connection
keep-alive
Access-Control-Allow-Headers
*
Content-Length
0
/
d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/
Redirect Chain
  • https://d.adroll.mgr.consensu.org/consent/iabcheck/TQSV74R4GVCSJITSZC2MCP?_s=e1b411e7109f8624a4bb7a29115445c1&_b=2
  • https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=e1b411e7109f8624a4bb7a29115445c1&_b=2
106 B
198 B
Script
General
Full URL
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=e1b411e7109f8624a4bb7a29115445c1&_b=2
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.34.11 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-30-34-11.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
d38821db570b42b1a3dfd69b69b2883d6a0e7fbc4c4021416670597e6af75bd3

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Thu, 16 Jan 2020 08:42:01 GMT
server
nginx/1.16.1
content-length
106
content-type
application/javascript

Redirect headers

status
302
date
Thu, 16 Jan 2020 08:42:01 GMT
server
nginx/1.16.1
content-length
105
location
https://d.adroll.com/consent/check/TQSV74R4GVCSJITSZC2MCP/?_s=e1b411e7109f8624a4bb7a29115445c1&_b=2
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120251&de=161931011982&cu=1579164120251&m=1297&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6163&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=1292&an=1080&gi=1&gf=1292&gg=1080&ix=1292&ic=1292&ez=1&ck=1080&kw=869&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1292&bx=1080&ci=1080&jz=869&dj=1&aa=1&ad=1181&cn=969&gn=1&gk=1181&gl=969&ik=1181&co=1181&cp=1081&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1081&cd=869&ah=1081&am=869&rf=0&re=1&ft=1181&fv=969&fw=969&wb=1&cl=0&at=0&d=21887076%3A2608796044%3A5191297188%3A138293483450&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=2069298172&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:01 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 6E57
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstOsXiMtr4hiiRmx1KcjuF_A67ffIz3kD9IDlqdTxhQAsMsyAcDu5vbdh19i6C14eKvsNqLinu0FcVGWuHkytQ&sig=Cg0ArKJSzCpWb7NSNDaEEAE&id=lidar2&adk=545849083&gcm=1&lcs=1&p=0,0,94,728&tos=0,1076,0,0,0&mtos=0,1076,1076,1076,1076&mcvt=1076&rs=5&tfs=283&tls=1359&mc=0.95&lte=-1&bas=0&bac=0&met=mue&avms=nio&niot_obs=155&niot_cbk=182&lm=4&imams=1&msp=1&bs=1585,1200&ps=1585,6163&ss=1600,1200&tt=1207&pt=153&bin=2&deb=1-1-1-11-0-0-11-0-0-0&tvt=1205&iframe_loc=https%253A%252F%252Fwww.darkreading.com%252Fattacks-breaches%252Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%252Fd%252Fd-id%252F1336729%253Fmkt_tok%253DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%25253D%25253D&is=728,90&url=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&referrer=http%3A%2F%2Fgo.pulsesecure.net%2Fb0000fNNzSz0Ex7N030Ir4q&itpl=32&r=v&v=20200115
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 16 Jan 2020 08:42:01 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
consent.js
s.adroll.com/j/
243 KB
33 KB
Script
General
Full URL
https://s.adroll.com/j/consent.js
Requested by
Host: s.adroll.com
URL: https://s.adroll.com/j/roundtrip.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.216 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-216.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f82c9f099656346f543c66ba009bd5f18010c7b41ad43d47a7f762121ad4496d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-amz-version-id
W7pJTDq0578OcjyRZxtRH_BjDuWCGgRc
Content-Encoding
gzip
x-amz-request-id
C5CB11FA2891D5FB
x-amz-server-side-encryption
AES256
Access-Control-Max-Age
600
Date
Thu, 16 Jan 2020 08:42:01 GMT
Connection
keep-alive
Content-Length
33195
x-amz-id-2
xvDuzhmafYXOulMfcltPByepfW69qHQWdG5Ym3MZlL+9sl8jZLq//WEZRkSp6xPBek9wYUVR3VI=
Last-Modified
Tue, 19 Nov 2019 20:42:26 GMT
Server
AmazonS3
ETag
"2f9f76c2d377be42af05cdf34c632618"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=300, must-revalidate
Access-Control-Allow-Credentials
false
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
hod
d.adroll.com/consent/
42 B
180 B
Image
General
Full URL
https://d.adroll.com/consent/hod?_e=view_banner&_s=e1b411e7109f8624a4bb7a29115445c1&_b=2.1&_a=TQSV74R4GVCSJITSZC2MCP
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.34.11 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-30-34-11.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Thu, 16 Jan 2020 08:42:01 GMT
cache-control
no-transform,public,max-age=300,s-maxage=900
server
nginx/1.16.1
content-length
42
vary
Cookie
content-type
image/gif
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjgsImNsaWVudFRpbWVzdGFtcCI6MTU3OTE2NDEyMS44MDUsIm5hbWUiOiJ2aWV3YWJsZTUwMSIsImNyaXRlcmlvbiI6eyJuYW1lIjoiNTAvMSIsInJhdGlvIjowLjUsInRpbWUiOjEwMDB9fV19?crc32c=1276456122
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjksImNsaWVudFRpbWVzdGFtcCI6MTU3OTE2NDEyMS44MTksIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTc5MTY0MTIwLjc5NCwidG8iOjE1NzkxNjQxMjEuODExfV19?crc32c=2420644365
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:01 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
jot.html
platform.twitter.com/ Frame DFF5
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E9) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
https://www.darkreading.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Thu, 16 Jan 2020 08:42:02 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Thu, 09 Jan 2020 22:50:11 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40E9)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Thu, 16 Jan 2020 08:42:02 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Thu, 16 Jan 2020 08:42:01 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
3cd344cc1c9f6e033c253f51b6f0cb9a
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
120
x-transaction
00c98dfc00e05cfc
x-tsa-request-body-time
12
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120159&de=99838943456&cu=1579164120159&m=2143&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=1172&an=72&gi=1&gf=1172&gg=72&ix=1172&ic=1172&ez=1&ck=1172&kw=1042&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1172&bx=72&ci=1172&jz=1042&dj=1&aa=1&ad=1070&cn=0&gn=1&gk=1070&gl=0&ik=1070&co=1070&cp=1042&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1042&cd=144&ah=1042&am=144&rf=0&re=0&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840464&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=810498221&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:02 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120159&de=99838943456&cu=1579164120159&m=2144&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=1172&an=1172&gi=1&gf=1172&gg=1172&ix=1172&ic=1172&ez=1&ck=1172&kw=1042&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1172&bx=1172&ci=1172&jz=1042&dj=1&aa=1&ad=1070&cn=1070&gn=1&gk=1070&gl=1070&ik=1070&co=1070&cp=1042&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1042&cd=1042&ah=1042&am=1042&rf=0&re=0&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840464&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1085263342&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:02 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120159&de=99838943456&cu=1579164120159&m=2145&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=1172&an=1172&gi=1&gf=1172&gg=1172&ix=1172&ic=1172&ez=1&ck=1172&kw=1042&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1172&bx=1172&ci=1172&jz=1042&dj=1&aa=1&ad=1070&cn=1070&gn=1&gk=1070&gl=1070&ik=1070&co=1070&cp=1042&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1042&cd=1042&ah=1042&am=1042&rf=0&re=0&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840464&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1747895250&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:02 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:02 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjEwLCJjbGllbnRUaW1lc3RhbXAiOjE1NzkxNjQxMjIuODM2LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU3OTE2NDEyMS44MTEsInRvIjoxNTc5MTY0MTIyLjgyfV19?crc32c=950416795
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:02 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
utsync.ashx
ml314.com/ Frame C200
733 B
2 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=62439&ct=js&pi=&fp=&clid=&if=1&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&pv=1579164120279_1dxv6d3ne&bl=en-us&cb=1172564&return=&ht=&d=&dc=&si=1579164120279_1dxv6d3ne&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1602020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
29ee730ab72d07509cd87c6557d93c5f40120128a955b8645e7ed9ccfceec2ac

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:02 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
503
Expires
0
ud.ashx
in.ml314.com/ Frame C200
35 B
711 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=1602020
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1602020
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.206.149.41 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-206-149-41.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
3662628a53eaef5edfb903813bc8236714812e5c2f3cc05c507fc3c4dc8bfe8d

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:03 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, no-cache="set-cookie"
Connection
keep-alive
Content-Length
151
Expires
Fri, 17 Jan 2020 08:42:03 GMT
csync.ashx
ml314.com/ Frame C200
Redirect Chain
  • https://tags.bluekai.com/site/20486?limit=0&id=3607503481959612454&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=3607503481959612454%26eid=50056
  • https://ml314.com/csync.ashx?fp=9t0qmMpd99e4zuOK&person_id=3607503481959612454&eid=50056
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=9t0qmMpd99e4zuOK&person_id=3607503481959612454&eid=50056
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 17 Jan 2020 03:42:03 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:03 GMT
P3P
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
Location
https://ml314.com/csync.ashx?fp=9t0qmMpd99e4zuOK&person_id=3607503481959612454&eid=50056
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Length
0
BK-Server
b8b
Expires
Thu, 01 Dec 1994 16:00:00 GMT
csync.ashx
ml314.com/ Frame C200
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=3607503481959612454
  • https://ml314.com/csync.ashx?fp=57d9537f7f0bf3d2b560bd07473b9e484099ce952c838ba58d4ca00894f213c0f4cb09cee1a4f8eb&person_id=3607503481959612454&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=57d9537f7f0bf3d2b560bd07473b9e484099ce952c838ba58d4ca00894f213c0f4cb09cee1a4f8eb&person_id=3607503481959612454&eid=50082
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 17 Jan 2020 03:42:03 GMT

Redirect headers

date
Thu, 16 Jan 2020 08:42:03 GMT
via
1.1 google
location
https://ml314.com/csync.ashx?fp=57d9537f7f0bf3d2b560bd07473b9e484099ce952c838ba58d4ca00894f213c0f4cb09cee1a4f8eb&person_id=3607503481959612454&eid=50082
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
status
307
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
csync.ashx
ml314.com/ Frame C200
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=d0tro1j&ttd_tpi=1
  • https://ml314.com/utsync.ashx?eid=53819&et=0&fp=bd606477-3b12-432e-9a60-78bd1307bdbb
  • https://ml314.com/csync.ashx?fp=bd606477-3b12-432e-9a60-78bd1307bdbb&person_id=3607503481959612454&eid=53819
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=bd606477-3b12-432e-9a60-78bd1307bdbb&person_id=3607503481959612454&eid=53819
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 17 Jan 2020 03:42:03 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Location
https://ml314.com/csync.ashx?fp=bd606477-3b12-432e-9a60-78bd1307bdbb&person_id=3607503481959612454&eid=53819
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
0,Fri, 17 Jan 2020 03:42:03 GMT
csync.ashx
ml314.com/ Frame C200
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3607503481959612454
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D3607503481959612454
  • https://ml314.com/csync.ashx?fp=6f948eae1308f8aa48456acb623e447a&eid=50146&person_id=3607503481959612454
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=6f948eae1308f8aa48456acb623e447a&eid=50146&person_id=3607503481959612454
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:02 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Fri, 17 Jan 2020 03:42:03 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:03 GMT
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Location
https://ml314.com/csync.ashx?fp=6f948eae1308f8aa48456acb623e447a&eid=50146&person_id=3607503481959612454
Cache-Control
no-cache
X-Server
10.45.9.25
Connection
keep-alive
Content-Length
0
Expires
0
match
ps.eyeota.net/ Frame C200
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2cNJ8oNYPo_5q5f_zXEYu3FNDL9myAuZ0DhgliS4xzMw&gdpr=1&gdpr_consent=&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil
  • https://ml314.com/csync.ashx?fp=2cNJ8oNYPo_5q5f_zXEYu3FNDL9myAuZ0DhgliS4xzMw&person_id=3607503481959612454&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
70 B
171 B
Image
General
Full URL
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
3.124.210.90 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-124-210-90.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 16 Jan 2020 08:42:03 GMT
Content-Length
70
Content-Type
image/gif

Redirect headers

Date
Thu, 16 Jan 2020 08:42:03 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
text/html; charset=utf-8
Location
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Cache-Control
private
Connection
keep-alive
Content-Length
168
Expires
Fri, 17 Jan 2020 03:42:03 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjExLCJjbGllbnRUaW1lc3RhbXAiOjE1NzkxNjQxMjMuODUzLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU3OTE2NDEyMi44MiwidG8iOjE1NzkxNjQxMjMuODM2fV19?crc32c=1974889147
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:03 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120159&de=99838943456&cu=1579164120159&m=5201&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=4231&an=1172&gi=1&gf=4231&gg=1172&ix=4231&ic=4231&ez=1&ck=1172&kw=1042&aj=1&pg=100&pf=100&ib=0&cc=1&bw=4231&bx=1172&ci=1172&jz=1042&dj=1&aa=1&ad=4129&cn=1070&gn=1&gk=4129&gl=1070&ik=4129&co=1070&cp=1042&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4303&cd=1042&ah=4303&am=1042&rf=0&re=0&wb=2&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840464&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1686929692&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:05 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:05 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120174&de=530691071818&cu=1579164120174&m=5205&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=55&vx=55%3A55%3A-&as=1&ag=5198&an=1285&gf=578&gg=578&ix=578&ic=578&ez=1&ck=1082&kw=880&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5198&bx=1285&ci=1082&jz=880&dj=1&aa=1&ad=5075&cn=1162&gk=455&gl=455&ik=455&co=1162&cp=1084&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4997&cd=1084&ah=4997&am=1084&rf=0&re=1&ft=4974&fv=1162&fw=959&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840470&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1533740338&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:05 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:05 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120174&de=530691071818&cu=1579164120174&m=5206&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=55&vx=55%3A55%3A-&as=1&ag=5198&an=5198&gf=578&gg=578&ix=578&ic=578&ez=1&ck=1082&kw=880&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5198&bx=5198&ci=1082&jz=880&dj=1&aa=1&ad=5075&cn=5075&gk=455&gl=455&ik=455&co=1162&cp=1084&cq=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5200&cd=4997&ah=5200&am=4997&rf=0&re=1&ft=4974&fv=4974&fw=959&wb=1&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840470&bo=27868836&bp=43863396&bd=rec1&zMoatPS=rec1&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=980828427&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:05 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:05 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120230&de=738631542544&cu=1579164120230&m=5157&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5154&cd=3&ah=5154&am=3&rf=0&re=1&wb=1&cl=0&at=0&d=21887076%3A2593515745%3A5238621993%3A138296840350&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1800004301&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:05 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:05 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120251&de=161931011982&cu=1579164120251&m=5157&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=5152&an=1292&gi=1&gf=5152&gg=1292&ix=5152&ic=5152&ez=1&ck=1080&kw=869&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5152&bx=1292&ci=1080&jz=869&dj=1&aa=1&ad=5041&cn=1181&gn=1&gk=5041&gl=1181&ik=5041&co=1181&cp=1081&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=0&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4952&cd=1081&ah=4952&am=1081&rf=0&re=1&ft=5041&fv=1181&fw=969&wb=2&cl=0&at=0&d=21887076%3A2608796044%3A5191297188%3A138293483450&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1763071100&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:05 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:05 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=90&w=728&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120251&de=161931011982&cu=1579164120251&m=5157&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=5152&an=5152&gi=1&gf=5152&gg=5152&ix=5152&ic=5152&ez=1&ck=1080&kw=869&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5152&bx=5152&ci=1080&jz=869&dj=1&aa=1&ad=5041&cn=5041&gn=1&gk=5041&gl=5041&ik=5041&co=1181&cp=1081&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5153&cd=4952&ah=5153&am=4952&rf=0&re=1&ft=5041&fv=5041&fw=969&wb=2&cl=0&at=0&d=21887076%3A2608796044%3A5191297188%3A138293483450&bo=27868836&bp=43863396&bd=top&zMoatPS=top&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=DCM%20ins&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=1605923681&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:05 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:05 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=0&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=300&fy=0&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120230&de=738631542544&cu=1579164120230&m=5359&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A0%3A-&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&cq=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5154&cd=5154&ah=5154&am=5154&rf=0&re=1&wb=1&cl=0&at=0&d=21887076%3A2593515745%3A5238621993%3A138296840350&bo=27868836&bp=43863396&bd=rec2&zMoatPS=rec2&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=826315721&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:05 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:05 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjEyLCJjbGllbnRUaW1lc3RhbXAiOjE1NzkxNjQxMjUuODcsIm5hbWUiOiJ2aWV3YWJsZVRpbWUiLCJmcm9tIjoxNTc5MTY0MTIzLjgzNiwidG8iOjE1NzkxNjQxMjUuODU0fV19?crc32c=1959106459
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:05 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&vb=13&kq=1&lo=3&uk=null&pk=0&wk=1&rk=1&tk=1&ak=-&i=PENTONMEDIA1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=BBBBB2IUEY4vGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMQSQeQBBn2soBggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Skg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccypBsrB41kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTCyBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&ql=&qo=0&qr=0&vf=1&vg=100&bq=0&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&fy=18&gp=0&zGSRC=1&gu=https%3A%2F%2Fwww.darkreading.com%2Fattacks-breaches%2Fwidely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks%2Fd%2Fd-id%2F1336729%3Fmkt_tok%3DeyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%253D%253D&id=1&f=0&j=http%3A%2F%2Fgo.pulsesecure.net&t=1579164120159&de=99838943456&cu=1579164120159&m=6010&ar=0de3535428-clean&iw=48f767e&cb=0&ym=0&ll=2&lm=0&ln=1&r=0&dl=0&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=6148&le=1&gm=1&io=1&ch=0&vv=1&vw=1%3A3%3A0&vp=100&vx=100%3A100%3A-&as=1&ag=5038&an=4231&gi=1&gf=5038&gg=4231&ix=5038&ic=5038&ez=1&ck=1172&kw=1042&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5038&bx=4231&ci=1172&jz=1042&dj=1&aa=1&ad=4936&cn=4129&gn=1&gk=4936&gl=4129&ik=4936&co=1070&cp=1042&cq=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4909&cd=4303&ah=4909&am=4303&rf=0&re=0&wb=2&cl=0&at=0&d=30729156%3A2508093984%3A4991788258%3A138290840464&bo=27868836&bp=43863396&bd=TAPunit&zMoatPS=TAPunit&gw=pentonmedia53440730609&zMoatOrigSlicer1=27868836&zMoatOrigSlicer2=43863396&zMoatDomain=darkreading.com&zMoatSubdomain=darkreading.com&dfp=0%2C1&la=43863396&hv=Exps%3A%20Celtra%20Banner%2FVideo%20%7C%20Celtra%20API&ab=3&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&ti=0&ih=1&tc=0&fs=175595&na=13172878&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:06 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 16 Jan 2020 08:42:06 GMT
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
35 B
242 B
Image
General
Full URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjEzLCJjbGllbnRUaW1lc3RhbXAiOjE1NzkxNjQxMjcuODg2LCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU3OTE2NDEyNS44NTQsInRvIjoxNTc5MTY0MTI3Ljg3NH1dfQ==?crc32c=3803344269
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.101.225 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-101-225.compute-1.amazonaws.com
Software
/
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 16 Jan 2020 08:42:07 GMT
Cache-Control
no-cache, no-store, must-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
35
Expires
0
eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiO...
track.celtra.com/json/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
track.celtra.com
URL
https://track.celtra.com/json/eyJldmVudHMiOlt7InNlc3Npb25JZCI6InMxNTc5MTY0MTIweDNmNWFmMGYwYTExYTEzeDA0MDAwMDE1IiwiYWNjb3VudElkIjoiNDRiNzRiMzUiLCJzdHJlYW0iOiJhZEV2ZW50cyIsImluc3RhbnRpYXRpb24iOiIwODM1Mjg4NTQxMzYwNzI4IiwiaW5kZXgiOjE0LCJjbGllbnRUaW1lc3RhbXAiOjE1NzkxNjQxMjkuOTAzLCJuYW1lIjoidmlld2FibGVUaW1lIiwiZnJvbSI6MTU3OTE2NDEyNy44NzQsInRvIjoxNTc5MTY0MTI5Ljg4OH1dfQ==?crc32c=3816211881

Verdicts & Comments Add Verdict or Comment

423 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| displayDefaultNativeAd function| displayNativeAd function| displayLandingPageNativeAd function| displaySecondLandingPageNativeAd function| displayArticleNativeAd function| displayInsightAd function| displaySASInsightAd object| respond string| theSiteDomain string| theMsgChatQueueInclude string| theChatStatusInclude boolean| doHideShowDivOpacityFade function| MM_swapImgRestore function| MM_preloadImages function| MM_findObj function| MM_swapImage function| MM_openBrWindow function| SwitchColor function| MakeDark function| MakeLight string| pop_collection string| pop_styleObj function| GetObject function| SwitchHTML function| SwitchDivs function| HideDiv function| ShowDiv function| URLEncodeString object| opacitySliderTimeouts function| SlideObjOpacity function| ChangeObjOpacity object| heightSliderTimeouts function| SlideObjHeight function| ChangeObjHeight function| ClearTimeoutArray function| AttachEventFunctionToObject function| RemoveEventFunctionFromObject function| SetCookie function| GetCookie function| AlignObject function| MoveObject function| MoveDivToColTop function| AddEventListenerToObj function| ContentNotifyPrefsShortSubmit function| ContentNotifyPrefsShortGenerateAndDisplayRSSFeed function| RedirectConfirm function| blend function| returnPosYofObj function| returnPosXofObj function| returnCurrentWindowYOffset function| returnCurrentWindowXOffset object| menuMoverTimeouts number| menuMoverTimeoutCounter number| menuMaxOpacity function| ShowMenu function| ChangeObjectLeft function| ChangeObjectTop function| NumStepsToMove function| AddPopMenuEventListener boolean| lockPoppedMenu string| lockedPoppedMenuObjName function| PopMenu object| closeMenuTimeouts number| closeMenuTimeoutCounter function| PopMenuOff number| globalPopXDiff number| globalPopYDiff function| createSubmenu function| LRSliderHandler string| active_pop_collection string| active_pop_styleObj function| GetActiveObject function| PrintActiveContent function| LoadScript function| RemoveScript string| theRateLink function| ShowRateMenu function| ShowSaveInfo function| HideSaveInfo function| HideRateMenu function| RateThis function| ChangeRateMenuFormParam function| BuildAndLoadRateMenuScript function| ClearRateMenuForm function| ClearRateLink function| ContentConsumptionLoggedSuccess function| ContentSignUpLoggedSuccess function| ObjectFader function| PageEffectPopUp function| returnWidthofObj function| cookiesEnabled boolean| pop_ns4 boolean| pop_dom boolean| active_pop_ns4 boolean| active_pop_dom function| $ function| jQuery function| displayWhatsThisBox function| displayPartnerPerspectivesBox function| displayMalwareBytesPartnerPerspectivesBox function| displayEvidentioPartnerPerspectivesBox function| displayF5PartnerPerspectivesBox function| displayBitdefenderPartnerPerspectivesBox function| displayGeneralDynamicsFidelisPartnerPerspectivesBox function| displayPartnerPerspectivesBoxArticle function| displayMalwareBytesPartnerPerspectivesBoxArticle function| displayGigamonPartnerPerspectivesBoxArticle function| displayAuthorInfoBox function| highlightTopStory function| showMobileIconOverlay function| closeMobileOverlayMenu function| goToByScroll function| ToggleNavButtonMenu function| ToggleNavButton object| designlinesSliderHandler string| designlinesLeftArrowButtonMouseoutImgSrc string| designlinesRightArrowButtonMouseoutImgSrc number| oneScrollHeight number| currentTickerItem number| numberOfTickerItems boolean| tickerIsPopulated undefined| tickerTimeout boolean| tickerStopped function| InitializeNewsTicker function| RotateNewsTicker function| StartNewsTicker function| StopNewsTicker boolean| superNavEventsMenuOpen function| ToggleSuperNavEventsMenu function| swipeleftHandler function| swiperightHandler function| tapholdHandler function| tapholdOutHandler function| sizeAnyBrightcoveObjects function| sizeDocImageClass object| jQuery11100645251536366094 object| visitor function| Visitor object| s_c_il number| s_c_in object| adobe function| mboxCreate function| mboxDefine function| mboxUpdate function| getCookie function| setCookie string| thePageTitle string| ngenv string| ngserv string| omn_regtrackproduct string| omn_nltrackproduct function| CSBJs_Core function| CSBJs_OOP function| CSBJs_Resources function| CSBJs_ServiceRequest function| CSBJs_Exception function| CSBJs_Ajax function| CSBJs_Decorator function| CSBJs_Decorator_HtmlNode function| CSBJs_App function| CSBJs_App_Window function| CSBJs_App_Window_Modal function| CSBJs_App_Window_Alert function| CSBJs_App_Button function| CSBJs_App_Html function| CSBJs_App_Field function| CSBJs_App_Field_File function| CSBJs_App_Field_TextArea function| CSBJs_Timer function| CSBJs_Form function| CSBJs_Form_Group function| CSBJs_Form_Step function| CSBJs_Form_Element function| CSBJs_Form_Element_Html function| CSBJs_Form_Element_Image function| CSBJs_Form_Element_TextField function| CSBJs_Form_Element_OtherTextField function| CSBJs_Form_Element_Submit function| CSBJs_Form_Element_NextStep function| CSBJs_Form_Element_PreviousStep function| CSBJs_Form_Element_Reset function| CSBJs_Form_Element_Multi function| CSBJs_Form_Element_Select function| CSBJs_Form_Element_Password function| CSBJs_Form_Element_Dynamic function| CSBJs_Form_Element_Hidden function| CSBJs_Form_Element_Checkbox function| CSBJs_Form_Element_Checkboxes function| CSBJs_Form_Element_Radio function| CSBJs_Form_Element_TextArea function| CSBJs_Form_Validation function| CSBJs_Form_Validation_Regex function| CSBJs_Form_Validation_CompareEqual function| CSBJs_Form_Validation_Required function| CSBJs_Form_Validation_JsFunction function| CSBJs_Form_Validation_Ajax function| CSBJs_Form_Validation_JsonP function| CSBJs_Form_Observer function| CSBJs_Form_Observer_Action function| CSBJs_Form_Observer_Action_Hide function| CSBJs_Form_Observer_Action_ChangeDynamic function| CSBJs_Form_Filter function| CSBJs_Form_Filter_Replace function| UBM function| rcCallback string| siteLogo string| privacyLogo string| privacyText string| loginRedirectURL string| loginNextAction string| securityJobAction boolean| reloadOnClose object| ngconfig string| regHeaderContent string| regAction string| ngRegAsset object| loginWidget object| registrationWidget object| updateWidget object| optoutWidget object| newsletterWidget object| newsletterSignupWidget object| externalAuthSuppWidget function| openRegisterThanks function| login function| verifyToken function| securityJobsFromUpdate function| securityJobs function| loginWithMessage function| changePassword function| openForm function| updateForm function| newsletterForm function| newsletterSignupForm function| extAuthSuppForm function| ngLogoutUser function| ngCreateCookie function| ngRreadCookie function| ngEraseCookie function| trackShortRegistrationOpen function| trackSocialMediaBasicRegistration function| trackLongRegistrationOpen function| trackLoginOpen function| trackLoginSuccess function| trackPasswordResetOpen function| trackNewsletterPrefsOpen function| trackNewsletterPrefsConfirm function| trackShortRegistrationConfirm function| trackRegistrationThankYou object| welcomeLinks number| loginCheck string| loginHTML string| loginHTMLMobile function| initGatewayCheck function| setNGReg function| SubmitInPageSurvey number| _doubleclickRand function| jobalert object| _AdsNativeOpts object| googletag object| gptadslots object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync number| google_srt undefined| google_measure_js_timing number| __google_ad_urls_id object| _comscore function| fbq function| _fbq function| gtag object| dataLayer number| google_unique_id object| gaGlobal object| google_conversion_id object| google_custom_params object| google_remarketing_only function| GooglemKTybQhCsO object| google_conversion_date object| google_conversion_time number| google_conversion_snippets number| google_conversion_first_time object| google_conversion_js_version object| google_conversion_format object| google_enable_display_cookie_match object| google_conversion_type object| google_conversion_order_id object| google_conversion_language object| google_conversion_value object| google_conversion_evaluemrc object| google_conversion_currency object| google_conversion_domain object| google_conversion_label object| google_conversion_color object| google_disable_viewthrough object| google_gtag_event_data object| google_conversion_linker object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_allow_ad_personalization_signals object| google_restricted_data_processing object| google_conversion_items object| google_conversion_merchant_id object| google_user_id object| onload_callback object| opt_image_generator object| google_conversion_page_url object| google_conversion_referrer_url object| google_gtm object| google_gcl_cookie_prefix object| google_read_gcl_cookie_opt_out object| google_basket_feed_country object| google_basket_feed_language object| google_basket_discount object| google_basket_transaction_type object| google_disable_merchant_reported_conversions object| google_additional_conversion_params object| google_transport_url object| uetq object| google_tag_manager object| ab string| isblocked function| unhideMainContent string| GoogleAnalyticsObject function| ga object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __twttrll object| twttr object| __twttr function| FlipboardWidgets object| __core-js_shared__ object| Sslac object| IN function| udm_ object| ns_p object| COMSCORE object| heatmap object| FB object| google_tag_data object| gaplugins object| gaData object| google_image_requests object| __google_ad_urls object| ampInaboxIframes object| ampInaboxPendingMessages object| NewsletterBox_14004867696102516636 boolean| google_osd_loaded boolean| google_onload_fired function| Togglehottopicseditorschoice function| UET object| lwvalues string| valueToUselw function| Toggleliveeventswebinarslive object| recaptcha object| video_reportsSliderHandler string| video_reportsLeftArrowButtonMouseoutImgSrc string| video_reportsRightArrowButtonMouseoutImgSrc function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 boolean| attachedML object| MoatDataJsonpRequest_99535553 string| s_account object| s string| SCCodeVersion function| s_doPlugins function| getHier function| s_getLoadTime function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq number| s_objectID number| s_giq undefined| s_code string| s_hour string| s_day string| s_timepart number| s_loadT string| x number| y number| d object| eo string| f0 object| s_i_cmpglobalvista string| thispage_sharelink object| beacon string| adroll_adv_id string| adroll_pix_id string| adroll_segments boolean| recaptchaReady object| __CELTRA object| teadsscript object| teads boolean| __adroll_loaded string| adroll_sid function| __cmp object| __adroll boolean| adroll_optout object| adroll_ext_network object| adroll_callbacks function| adroll_tpc_callback object| __adroll_consent boolean| __adroll_consent_is_gdpr object| __adroll_consent_data string| __adroll_consent_user_country string| __adroll_consent_adv_country object| $jscomp string| BANNER_VERSION object| __adroll_consent_banner object| adroll_exp_list

34 Cookies

Domain/Path Name / Value
.teads.tv/ Name: tt_salesforce
Value:
.teads.tv/ Name: tt_emetriq
Value:
.teads.tv/ Name: tt_bluekai
Value:
.teads.tv/ Name: tt_viewer
Value: ef9e4372-09d9-4de4-8393-9ffa54506dd6
.techweb.com/ Name: Insights
Value: 31-41a52e39-21de-454a-91ad-e358ba0d6598
ng.techweb.com/ Name: JSESSIONID
Value: 971AA20140851313C9C4BB214023A099
www.darkreading.com/ Name: gdpr_cookie_darkreading
Value: 1
.darkreading.com/ Name: undefined_s
Value: First%20Visit
.teads.tv/ Name: tt_neustar
Value:
.darkreading.com/ Name: s_invisit
Value: true
.darkreading.com/ Name: s_cc
Value: true
www.darkreading.com/ Name: piddlNGPageReferer
Value: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
.darkreading.com/ Name: s_nr
Value: 1579164120358-New
.demdex.net/ Name: demdex
Value: 46218783809276662740980542318954222331
.darkreading.com/ Name: _gid
Value: GA1.2.2082284233.1579164120
www.darkreading.com/ Name: darkreading_lastvisit
Value: 1/16/2020 3:41:59 AM
.darkreading.com/ Name: __gads
Value: ID=8e56a393ad25fdc7:T=1579164119:S=ALNI_Mai3ZIt_UznFbvt4tRwa3ZAalI-Yg
.darkreading.com/ Name: _gat_gtag_UA_135180592_2
Value: 1
.facebook.com/ Name: fr
Value: 0tr1YeyWUaMVoRLGO..BeICHX...1.0.BeICHX.
.darkreading.com/ Name: _fbp
Value: fb.1.1579164119921.901438301
.teads.tv/ Name: tt_dar
Value:
www.darkreading.com/ Name: darkreading%2Dmeter
Value: 1336729
.darkreading.com/ Name: _ga
Value: GA1.2.1406627327.1579164120
.darkreading.com/ Name: AMCV_77FB1CFE532B22840A490D45%40AdobeOrg
Value: -330454231%7CMCIDTS%7C18278%7CMCMID%7C56812500789115920810245579451242261512%7CMCAAMLH-1579768919%7C6%7CMCAAMB-1579768919%7C6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y%7CMCOPTOUT-1579171319s%7CNONE%7CMCAID%7CNONE%7CMCSYNCSOP%7C411-18285%7CvVersion%7C3.1.2
.teads.tv/ Name: tt_liveramp
Value:
.teads.tv/ Name: tt_exelate
Value:
www.darkreading.com/ Name: piddlNGSiteReferer
Value: http://go.pulsesecure.net/b0000fNNzSz0Ex7N030Ir4q
www.darkreading.com/ Name: darkreading%5Fvisits
Value: 3
www.darkreading.com/ Name: gatewayChecked
Value:
.darkreading.com/ Name: __cfduid
Value: db84c79f0b7b689e98385b76ac652d18b1579164118
.darkreading.com/ Name: s_vnum
Value: 1580511600359%26vn%3D1
.teads.tv/ Name: tt_skp
Value:
www.darkreading.com/ Name: cplChannelTagID
Value:
.darkreading.com/ Name: AMCVS_77FB1CFE532B22840A490D45%40AdobeOrg
Value: 1

7 Console Messages

Source Level URL
Text
console-api warning URL: https://epromos.ubmcanon.com/at.js?ormzkk(Line 9)
Message:
AT: Adobe Target content delivery is disabled. Update your DOCTYPE to support Standards mode.
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D(Line 493)
Message:
lpage==>notblocked
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D(Line 501)
Message:
interstitial unit found
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D(Line 506)
Message:
not empty Interstitial
console-api info URL: https://platform.twitter.com/widgets.js(Line 1)
Message:
You may have been affected by an update to settings in embedded timelines. See https://twittercommunity.com/t/deprecating-widget-settings/102295. [object HTMLAnchorElement]
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D(Line 496)
Message:
5 second timeout
console-api log URL: https://www.darkreading.com/attacks-breaches/widely-known-flaw-in-pulse-secure-vpn-being-used-in-ransomware-attacks/d/d-id/1336729?mkt_tok=eyJpIjoiWlRWaVlqYzNaREk0T1RZNSIsInQiOiJ1UkVBMGszWVByMlpNd0FMa1dVY2paWHhuR1pTRjF0VG5aZDZWd0xTaUVyYU9wSWF5SXNucXFyTlpwcWdSOWNZK2QrbDEwRVZsTkYwdDFia2hHang2YW1GdGlTdm91TFZjYkVGTWJFeVBGeWg2Q0xEZDJueEQ1SW5xUlppNFwvT1QifQ%3D%3D(Line 515)
Message:
unhide main content

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

a.teads.tv
ad.doubleclick.net
ads.celtra.com
adservice.google.de
bat.bing.com
cache-ssl.celtra.com
cdn.flipboard.com
cdn.syndication.twimg.com
cf-images.us-east-1.prod.boltdns.net
cm.everesttech.net
cmp.teads.mgr.consensu.org
connect.facebook.net
d.adroll.com
d.adroll.mgr.consensu.org
dpm.demdex.net
dsimg.ubm-us.net
epromos.ubmcanon.com
fonts.googleapis.com
fonts.gstatic.com
fpn.flipboard.com
geo.moatads.com
go.pulsesecure.net
googleads.g.doubleclick.net
googleads4.g.doubleclick.net
i.ubm-us.net
idsync.rlcdn.com
img.deusm.com
img.lightreading.com
in.ml314.com
ins.techweb.com
match.adsrvr.org
maxcdn.bootstrapcdn.com
ml314.com
ng.techweb.com
pagead2.googlesyndication.com
pbs.twimg.com
platform.linkedin.com
platform.twitter.com
ps.eyeota.net
px.moatads.com
s.adroll.com
s.ytimg.com
s0.2mdn.net
sb.scorecardresearch.com
securepubads.g.doubleclick.net
static.adsnative.com
staticxx.facebook.com
stats.g.doubleclick.net
sync.crwdcntrl.net
sync.teads.tv
syndication.twitter.com
t.teads.tv
tags.bluekai.com
ton.twimg.com
tpc.googlesyndication.com
track.celtra.com
twimgs.com
u.heatmap.it
ubm.demdex.net
ubmtech.d3.sc.omtrdc.net
www.darkreading.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.youtube.com
z.moatads.com
track.celtra.com
104.244.42.8
104.99.233.143
13.224.196.146
13.224.196.37
13.224.196.90
172.217.16.194
172.217.22.34
18.196.22.144
199.15.215.8
2.18.232.7
2001:4860:4802:34::75
2001:4de0:ac19::1:b:3b
216.58.205.226
216.58.205.230
23.210.248.216
23.210.250.213
23.45.108.93
23.45.99.242
23.5.109.152
2600:9000:20eb:fc00:e:5a70:ca47:86e1
2600:9000:21f3:6200:14:85db:2b40:93a1
2606:2800:133:7403:4a68:7eff:710b:1ddf
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:234:59:254c:406:2366:268c
2606:4700:20::6818:552
2606:4700:3035::681f:459e
2606:4700:30::6818:7875
2606:4700:30::6818:7975
2606:4700:30::681c:15a0
2606:4700:30::681c:3e5
2606:4700::6811:7863
2606:4700::6813:f508
2620:103::192:155:48:119
2620:1ec:c11::200
2a00:1450:4001:800::2002
2a00:1450:4001:80b::2002
2a00:1450:4001:814::2001
2a00:1450:4001:814::200e
2a00:1450:4001:815::2003
2a00:1450:4001:816::200e
2a00:1450:4001:818::2003
2a00:1450:4001:81f::2006
2a00:1450:4001:821::2008
2a00:1450:4001:824::200a
2a00:1450:4001:824::200e
2a00:1450:4001:825::2003
2a00:1450:400c:c00::9a
2a02:26f0:f1:1a2::2c92
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
3.10.14.242
3.124.210.90
34.206.149.41
35.190.72.21
46.105.202.39
52.206.101.225
52.211.89.62
52.215.103.126
52.30.34.11
52.31.190.58
52.50.81.152
52.51.104.248
54.246.172.91
66.117.28.86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