URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Submission: On April 14 via api from IN — Scanned from DE

Summary

This website contacted 38 IPs in 6 countries across 32 domains to perform 219 HTTP transactions. The main IP is 2a04:4e42:4c::666, located in United States and belongs to FASTLY, US. The main domain is www.zdnet.com. The Cisco Umbrella rank of the primary domain is 57639.
TLS certificate: Issued by R3 on February 23rd 2022. Valid for: 3 months.
This is the only time www.zdnet.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
47 2a04:4e42:4c:... 54113 (FASTLY)
5 2606:4700::68... 13335 (CLOUDFLAR...)
5 2a06:98c1:312... 13335 (CLOUDFLAR...)
3 2a02:26f0:f7:... 20940 (AKAMAI-ASN1)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
2 34.227.250.239 14618 (AMAZON-AES)
3 151.101.2.154 54113 (FASTLY)
1 34.120.203.121 396982 (GOOGLE-CL...)
2 151.101.193.194 54113 (FASTLY)
9 142.250.186.130 15169 (GOOGLE)
1 18.66.139.72 16509 (AMAZON-02)
26 104.102.30.13 20940 (AKAMAI-ASN1)
1 2a02:26f0:170... 20940 (AKAMAI-ASN1)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 63.32.79.217 16509 (AMAZON-02)
2 52.208.32.237 16509 (AMAZON-02)
37 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
4 35.156.67.242 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
9 2a00:1450:400... 15169 (GOOGLE)
4 10 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
16 23.35.229.151 16625 (AKAMAI-AS)
1 185.170.60.112 27381 (CASALE-MEDIA)
8 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
2 8 104.102.29.65 20940 (AKAMAI-ASN1)
1 2 142.250.186.38 15169 (GOOGLE)
1 3.33.220.150 16509 (AMAZON-02)
1 2 216.58.212.130 15169 (GOOGLE)
1 2 209.54.176.128 16509 (AMAZON-02)
1 1 185.183.112.155 60350 (VP)
1 1 34.111.151.213 15169 (GOOGLE)
2 2 151.101.130.49 54113 (FASTLY)
1 2 169.50.137.184 36351 (SOFTLAYER)
1 151.101.66.137 54113 (FASTLY)
2 162.247.243.147 13335 (CLOUDFLAR...)
219 38
Apex Domain
Subdomains
Transfer
48 zdnet.com
www.zdnet.com — Cisco Umbrella Rank: 57639
urs.zdnet.com — Cisco Umbrella Rank: 239059
741 KB
32 googlesyndication.com
3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
tpc.googlesyndication.com — Cisco Umbrella Rank: 128
pagead2.googlesyndication.com — Cisco Umbrella Rank: 98
246 KB
29 moatads.com
z.moatads.com — Cisco Umbrella Rank: 390
mb.moatads.com — Cisco Umbrella Rank: 626
geo.moatads.com — Cisco Umbrella Rank: 583
px.moatads.com — Cisco Umbrella Rank: 419
90 KB
22 doubleclick.net
securepubads.g.doubleclick.net — Cisco Umbrella Rank: 193
googleads.g.doubleclick.net — Cisco Umbrella Rank: 40
ad.doubleclick.net — Cisco Umbrella Rank: 196
cm.g.doubleclick.net — Cisco Umbrella Rank: 211
223 KB
16 moatpixel.com
redventuresgamheader644747280705.s.moatpixel.com — Cisco Umbrella Rank: 46352
4 KB
15 ampproject.org
cdn.ampproject.org — Cisco Umbrella Rank: 343
333 KB
11 google.com
adservice.google.com — Cisco Umbrella Rank: 77
www.google.com — Cisco Umbrella Rank: 4
1 KB
8 casalemedia.com
a1181.casalemedia.com — Cisco Umbrella Rank: 587219
ssum-sec.casalemedia.com — Cisco Umbrella Rank: 556
dsum-sec.casalemedia.com — Cisco Umbrella Rank: 575
9 KB
5 myfinance.com
static.myfinance.com — Cisco Umbrella Rank: 13711
www.myfinance.com — Cisco Umbrella Rank: 12868
56 KB
5 cookielaw.org
cdn.cookielaw.org — Cisco Umbrella Rank: 497
117 KB
4 clarium.io
protected-by.clarium.io — Cisco Umbrella Rank: 1914
1 KB
3 redventures.io
at.adtech.redventures.io — Cisco Umbrella Rank: 26769
150 KB
3 go-mpulse.net
c.go-mpulse.net — Cisco Umbrella Rank: 558
52 KB
2 nr-data.net
bam-cell.nr-data.net — Cisco Umbrella Rank: 354
2 KB
2 simpli.fi
um.simpli.fi — Cisco Umbrella Rank: 825
842 B
2 everesttech.net
sync-tm.everesttech.net — Cisco Umbrella Rank: 576
644 B
2 amazon-adsystem.com
s.amazon-adsystem.com — Cisco Umbrella Rank: 281
1 KB
2 googletagservices.com
www.googletagservices.com — Cisco Umbrella Rank: 176
73 KB
2 gstatic.com
fonts.gstatic.com
32 KB
2 2mdn.net
s0.2mdn.net — Cisco Umbrella Rank: 262
581 KB
2 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 46
2 KB
2 fastly.net
confiant-integrations.global.ssl.fastly.net — Cisco Umbrella Rank: 1576
99 KB
2 myfidevs.io
a.myfidevs.io — Cisco Umbrella Rank: 14541
166 B
1 newrelic.com
js-agent.newrelic.com — Cisco Umbrella Rank: 380
18 KB
1 indexww.com
js-sec.indexww.com — Cisco Umbrella Rank: 723
425 B
1 brand-display.com
dmp.brand-display.com — Cisco Umbrella Rank: 2020
335 B
1 adotmob.com
sync.adotmob.com — Cisco Umbrella Rank: 1441
307 B
1 adsrvr.org
match.adsrvr.org — Cisco Umbrella Rank: 355
265 B
1 google.de
adservice.google.de — Cisco Umbrella Rank: 7579
792 B
1 akstat.io
684dd32e.akstat.io — Cisco Umbrella Rank: 61493
354 B
1 cohesionapps.com
cdn.cohesionapps.com — Cisco Umbrella Rank: 11048
24 KB
1 onetrust.com
geolocation.onetrust.com — Cisco Umbrella Rank: 809
457 B
219 32
Domain Requested by
47 www.zdnet.com www.zdnet.com
25 px.moatads.com www.zdnet.com
22 tpc.googlesyndication.com www.zdnet.com
cdn.ampproject.org
3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
googleads.g.doubleclick.net
16 redventuresgamheader644747280705.s.moatpixel.com www.zdnet.com
15 cdn.ampproject.org confiant-integrations.global.ssl.fastly.net
10 www.google.com 4 redirects www.zdnet.com
3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
googleads.g.doubleclick.net
9 googleads.g.doubleclick.net www.zdnet.com
3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
googleads.g.doubleclick.net
9 securepubads.g.doubleclick.net www.zdnet.com
8 pagead2.googlesyndication.com 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
googleads.g.doubleclick.net
www.zdnet.com
tpc.googlesyndication.com
5 dsum-sec.casalemedia.com 1 redirects ssum-sec.casalemedia.com
5 cdn.cookielaw.org www.zdnet.com
4 protected-by.clarium.io www.zdnet.com
3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
3 at.adtech.redventures.io www.zdnet.com
3 c.go-mpulse.net www.zdnet.com
c.go-mpulse.net
3 static.myfinance.com www.zdnet.com
2 bam-cell.nr-data.net www.zdnet.com
2 um.simpli.fi 1 redirects ssum-sec.casalemedia.com
2 sync-tm.everesttech.net 2 redirects
2 s.amazon-adsystem.com 1 redirects ssum-sec.casalemedia.com
2 cm.g.doubleclick.net 1 redirects ssum-sec.casalemedia.com
2 ad.doubleclick.net 1 redirects googleads.g.doubleclick.net
2 ssum-sec.casalemedia.com 1 redirects 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
2 www.googletagservices.com 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
googleads.g.doubleclick.net
2 fonts.gstatic.com fonts.googleapis.com
2 s0.2mdn.net www.zdnet.com
2 fonts.googleapis.com confiant-integrations.global.ssl.fastly.net
2 geo.moatads.com z.moatads.com
2 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com www.zdnet.com
2 confiant-integrations.global.ssl.fastly.net www.zdnet.com
2 www.myfinance.com www.zdnet.com
2 a.myfidevs.io www.zdnet.com
1 js-agent.newrelic.com www.zdnet.com
1 js-sec.indexww.com ssum-sec.casalemedia.com
1 dmp.brand-display.com 1 redirects
1 sync.adotmob.com 1 redirects
1 match.adsrvr.org ssum-sec.casalemedia.com
1 a1181.casalemedia.com 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
1 mb.moatads.com z.moatads.com
1 adservice.google.com www.zdnet.com
1 adservice.google.de www.zdnet.com
1 684dd32e.akstat.io www.zdnet.com
c.go-mpulse.net
1 z.moatads.com www.zdnet.com
1 cdn.cohesionapps.com www.zdnet.com
1 urs.zdnet.com www.zdnet.com
1 geolocation.onetrust.com www.zdnet.com
219 45
Subject Issuer Validity Valid
*.zdnet.com
R3
2022-02-23 -
2022-05-24
3 months crt.sh
cookielaw.org
Cloudflare Inc ECC CA-3
2021-06-01 -
2022-05-31
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-06-18 -
2022-06-17
a year crt.sh
akstat.io
DigiCert SHA2 Secure Server CA
2021-06-08 -
2022-06-13
a year crt.sh
onetrust.com
Cloudflare Inc ECC CA-3
2022-01-12 -
2023-01-12
a year crt.sh
*.myfidevs.io
Amazon
2021-12-07 -
2023-01-04
a year crt.sh
at.adtech.redventures.io
R3
2022-04-03 -
2022-07-02
3 months crt.sh
rv-urs.zdnet.com
GTS CA 1D4
2022-03-11 -
2022-06-09
3 months crt.sh
*.freetls.fastly.net
GlobalSign Atlas R3 DV TLS CA 2020
2021-04-27 -
2022-05-29
a year crt.sh
*.g.doubleclick.net
GTS CA 1C3
2022-03-21 -
2022-06-13
3 months crt.sh
cdn.cohesionapps.com
Amazon
2021-12-17 -
2023-01-14
a year crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2021-11-27 -
2022-11-29
a year crt.sh
*.google.de
GTS CA 1C3
2022-03-28 -
2022-06-20
3 months crt.sh
*.google.com
GTS CA 1C3
2022-03-28 -
2022-06-20
3 months crt.sh
*.moatads.com
DigiCert TLS RSA SHA256 2020 CA1
2021-05-25 -
2022-06-25
a year crt.sh
misc-sni.google.com
GTS CA 1C3
2022-03-28 -
2022-06-20
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2022-03-21 -
2022-06-13
3 months crt.sh
protected-by.clarium.io
Gandi Standard SSL CA 2
2020-04-03 -
2022-04-26
2 years crt.sh
*.doubleclick.net
GTS CA 1C3
2022-03-28 -
2022-06-20
3 months crt.sh
www.google.com
GTS CA 1C3
2022-03-28 -
2022-06-20
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1C3
2022-03-28 -
2022-06-20
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2022-03-28 -
2022-06-20
3 months crt.sh
casalemedia.com
Go Daddy Secure Certificate Authority - G2
2022-01-15 -
2023-01-13
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2021-12-12 -
2022-12-13
a year crt.sh
*.adsrvr.org
GlobalSign GCC R3 DV TLS CA 2020
2022-03-31 -
2023-05-02
a year crt.sh
js-agent.newrelic.com
GlobalSign Atlas R3 DV TLS CA H2 2021
2021-10-06 -
2022-11-07
a year crt.sh
*.nr-data.net
DigiCert TLS RSA SHA256 2020 CA1
2022-01-10 -
2023-02-10
a year crt.sh

This page contains 13 frames:

Primary Page: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Frame ID: 8AA4B8F04AF372F24F7BD68468218EEA
Requests: 132 HTTP requests in this frame

Frame: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Frame ID: BCDD57E1387299562F2706E1AFB389E2
Requests: 2 HTTP requests in this frame

Frame: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Frame ID: E55C5B15E4D1ADC345FE467FEAAFACAA
Requests: 1 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Frame ID: 40EFA45BC8F1DBC2CDFEAA729549D2BF
Requests: 19 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Frame ID: 70B08DB0F278D1D46549625C6C8A0C42
Requests: 13 HTTP requests in this frame

Frame: https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Frame ID: 1DFA1999FB375ACA864085DF54C2627A
Requests: 15 HTTP requests in this frame

Frame: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Frame ID: 56C364719E477D54867C7A46D6829F4B
Requests: 12 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Frame ID: 6E85E9F94D44E298592CC29C01E98101
Requests: 11 HTTP requests in this frame

Frame: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Frame ID: C8E8F9EE408A210505DC7CC2F5C6BA78
Requests: 10 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Frame ID: 43052F1477512BCE6EEDFDD807D42018
Requests: 2 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/bg/jCkUzW4MJun-Op3iOFNjK-GGKJG_m8_dpwU-GZUxlWM.js
Frame ID: 68E536C89DD47E7435C58B29AE81B615
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Frame ID: AC000AF3E8ABBD0A065E78790DD7AFF0
Requests: 3 HTTP requests in this frame

Frame: https://www.google.com/recaptcha/api2/aframe
Frame ID: E5F97B44179C61C327525B539FBBD36F
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Spring4Shell flaw is now being used to spread this botnet malware | ZDNet

Detected technologies

Overall confidence: 100%
Detected patterns
  • backbone.*\.js

Overall confidence: 100%
Detected patterns
  • require.*\.js

Overall confidence: 100%
Detected patterns
  • tpc\.googlesyndication\.com/safeframe

Overall confidence: 100%
Detected patterns
  • 2mdn\.net

Overall confidence: 100%
Detected patterns
  • googlesyndication\.com/
  • 2mdn\.net

Overall confidence: 100%
Detected patterns
  • moatads\.com

Overall confidence: 100%
Detected patterns
  • cdn\.cookielaw\.org
  • otSDKStub\.js

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

219
Requests

94 %
HTTPS

43 %
IPv6

32
Domains

45
Subdomains

38
IPs

6
Countries

2852 kB
Transfer

7538 kB
Size

29
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 108
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Request Chain 109
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Request Chain 113
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Request Chain 148
  • https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1 HTTP 302
  • https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Request Chain 151
  • https://ad.doubleclick.net/ddm/trackimp/N8714.2382313DOUBLECLICKBIDMANAG/B22807636.328475542;dc_trk_aid=520608733;dc_trk_cid=117012770;ord=2023755544;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd= HTTP 302
  • https://ad.doubleclick.net/ddm/trackimp/N8714.2382313DOUBLECLICKBIDMANAG/B22807636.328475542;dc_pre=CMfE2K7Qk_cCFUT4dwodJ4sOFg;dc_trk_aid=520608733;dc_trk_cid=117012770;ord=2023755544;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=
Request Chain 157
  • https://dsum-sec.casalemedia.com/rrum?ixi=1&cm_dsp_id=85&cb=https%3A%2F%2Fcm.g.doubleclick.net%2Fpixel%3Fgoogle_nid%3Dcasale_media2_dbm%26google_cm%26google_sc%26google_hm%3D&gdpr=1 HTTP 302
  • https://cm.g.doubleclick.net/pixel?gdpr=1&google_nid=casale_media2_dbm&google_cm&google_sc&google_hm=YlgdWeLIB6wphBUA3OYWHAAA HTTP 302
  • https://dsum-sec.casalemedia.com/crum?cm_dsp_id=45&external_user_id=CAESECGk-eGx09hE1fya6UMZKkk&google_cver=1&gdpr=1
Request Chain 159
  • https://s.amazon-adsystem.com/dcm?pid=78af914c-e755-4b90-bded-1b172aedc763&us_privacy=&gdpr=1&gdpr_consent=&id=YlgdWeLIB6wphBUA3OYWHAAABG4AAAIB HTTP 302
  • https://s.amazon-adsystem.com/dcm?pid=78af914c-e755-4b90-bded-1b172aedc763&us_privacy=&gdpr=1&gdpr_consent=&id=YlgdWeLIB6wphBUA3OYWHAAABG4AAAIB&dcc=t
Request Chain 160
  • https://sync.adotmob.com/cookie/indexexchange?r=https%3A%2F%2Fdsum-sec.casalemedia.com%2Fcrum%3Fcm_dsp_id%3D13%26external_user_id%3D%7bamob_user_id%7d%26expiration%3D%5bEXPIRATION%5d&gdpr=1 HTTP 302
  • https://dsum-sec.casalemedia.com/crum?cm_dsp_id=13&external_user_id=%7Bamob_user_id%7D&expiration=[EXPIRATION]&gdpr=1
Request Chain 161
  • https://dmp.brand-display.com/cm/api/index?cm_dsp_id=191&cm_user_id=%3CIndex_user_id%3E&gdpr=1 HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=191&expiration=63072000&external_user_id=5660610f-fe19-4bab-4050d045
Request Chain 162
  • https://sync-tm.everesttech.net/upi/pid/ZMAwryCI?redir=https%3A%2F%2Fdsum-sec.casalemedia.com%2Frum%3Fcm_dsp_id%3D88%26external_user_id%3D%24%7BTM_USER_ID%7D&gdpr=1 HTTP 302
  • https://sync-tm.everesttech.net/ct/upi/pid/ZMAwryCI?redir=https%3A%2F%2Fdsum-sec.casalemedia.com%2Frum%3Fcm_dsp_id%3D88%26external_user_id%3D%24%7BTM_USER_ID%7D&gdpr=1&_test=YlgdWQAB7ImrmgAZ HTTP 302
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=88&external_user_id=YlgdWQAB7ImrmgAZ&gdpr=1&_test=YlgdWQAB7ImrmgAZ
Request Chain 163
  • https://um.simpli.fi/pm_match?https://dsum-sec.casalemedia.com/crum?cm_dsp_id=90&external_user_id=$UID&gdpr=1 HTTP 302
  • https://um.simpli.fi/no_match_opted_out
Request Chain 167
  • https://www.google.com/pagead/drt/ui HTTP 302
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA

219 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
320 KB
104 KB
Document
General
Full URL
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
b4098e4e65f086b9ba7ec47621f201e3fa233b802e3f5976854f42bd133461a7
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
cache-control
max-age=5400, private
content-encoding
gzip
content-length
105150
content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-type
text/html; charset=UTF-8
date
Thu, 14 Apr 2022 13:10:44 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
expires
Thu, 14 Apr 2022 14:40:41 GMT
link
<https://www.zdnet.com/a/fly/css/core/main-2f4bc6d816-rev.css>; rel="preload"; as="style"; nopush
referrer-policy
no-referrer-when-downgrade
strict-transport-security
max-age=63072000; includeSubDomains; preload
vary
Accept-Encoding, User-Agent
via
1.1 varnish
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-tx-id
98cc8e2f-30c3-4655-84a7-283abbafac93
x-xss-protection
1; mode=block
main-2f4bc6d816-rev.css
www.zdnet.com/a/fly/css/core/
309 KB
53 KB
Stylesheet
General
Full URL
https://www.zdnet.com/a/fly/css/core/main-2f4bc6d816-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
baf13e18cc5a4dd96eb0bbcfee37b067d9de609f0de5c0c5ac110451b24a601c
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
54214
x-xss-protection
1; mode=block
last-modified
Wed, 13 Apr 2022 14:00:13 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"2cb86be5a54570fb1c721c4277da0d80"
strict-transport-security
max-age=31536000
content-type
text/css
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Apr 2022 14:01:26 GMT
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
20 KB
7 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
03aa6fcac2902227e1b66a01b87824692f708bbf9bfe441784f8ed22d677f6de
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 14 Apr 2022 13:10:44 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
+q2Bd0SvXowDeesSOf+0yw==
age
13397
vary
Accept-Encoding
content-length
6782
x-ms-lease-status
unlocked
last-modified
Wed, 13 Apr 2022 19:40:30 GMT
server
cloudflare
etag
0x8DA1D85779CF34D
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
e018de30-801e-00e6-097d-4fc916000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6fbcaeef4c923762-MXP
optanon-v1.1.0.js
www.zdnet.com/a/privacy/optanon/
36 KB
10 KB
Script
General
Full URL
https://www.zdnet.com/a/privacy/optanon/optanon-v1.1.0.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a0a97a5a7dc2b30e9a76ff211332f36d435293c19ed91ca1ad6a66adc1dc50cd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
10444
x-xss-protection
1; mode=block
last-modified
Thu, 04 Mar 2021 19:22:21 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"46e2aa30cbebb708b5fc468d57d56d8b"
strict-transport-security
max-age=31536000
content-language
en
via
1.1 varnish
cache-control
public, max-age=86400
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
application/javascript
expires
Mon, 11 Apr 2022 12:54:45 GMT
controls-89b03fc2d1-rev.css
www.zdnet.com/a/fly/css/video/htmlPlayerControls/
25 KB
4 KB
Stylesheet
General
Full URL
https://www.zdnet.com/a/fly/css/video/htmlPlayerControls/controls-89b03fc2d1-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
82f27cdd6f527e0f1f6eae64be146e6122079f731f8bdc53fd2a71411e560c57
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
4313
x-xss-protection
1; mode=block
last-modified
Wed, 13 Apr 2022 14:00:13 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"fba1e3918d808a45a60cca6d164f9e7e"
strict-transport-security
max-age=31536000
content-type
text/css
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Apr 2022 14:01:26 GMT
liam-tung.jpg
www.zdnet.com/a/img/resize/edd135640c2822791e2a2387e6b68798e65dbe9b/2014/07/22/b17789dd-1174-11e4-9732-00505685119a/
556 B
712 B
Image
General
Full URL
https://www.zdnet.com/a/img/resize/edd135640c2822791e2a2387e6b68798e65dbe9b/2014/07/22/b17789dd-1174-11e4-9732-00505685119a/liam-tung.jpg?width=50&height=50&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
3529432e436b8123ca2df05a4a476a896fa7b65cb006d8791049ceb8fc6e71e6
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
fastly-io-info
ifsz=10762 idim=350x250 ifmt=jpeg ofsz=556 odim=50x50 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1588631332891952
fastly-stats
io=1
content-length
556
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"IEsEQy9/ChDEetCGQea+1eWs7H8Pbp82Sh7i1gWxNmk"
vary
Accept-Encoding, Accept
strict-transport-security
max-age=31536000
content-language
en
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
image/webp
expires
Thu, 24 Mar 2022 08:35:29 GMT
liam-tung.jpg
www.zdnet.com/a/img/resize/cc3ee0705a7b41f052c8bf433cd85acb0d9f043e/2014/07/22/b17789dd-1174-11e4-9732-00505685119a/
810 B
1 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/cc3ee0705a7b41f052c8bf433cd85acb0d9f043e/2014/07/22/b17789dd-1174-11e4-9732-00505685119a/liam-tung.jpg?width=70&height=70&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a19be4c13f1cf157c3a5b885231c10d7243b8179b6b3fea088d0d8afbf26073a
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
fastly-io-info
ifsz=10762 idim=350x250 ifmt=jpeg ofsz=810 odim=70x70 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1588631332891952
fastly-stats
io=1
content-length
810
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"tXAz6j9jI/VXDtrQia85TJ18Ir7/sZ9yw6Kmsfl8dqM"
vary
Accept-Encoding, Accept
strict-transport-security
max-age=31536000
content-language
en
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
content-type
image/webp
expires
Sun, 20 Mar 2022 04:55:49 GMT
20220301-danny-crandall.jpg
www.zdnet.com/a/img/resize/670e3a9f620c5a430a577d997f50ab6523249903/2022/03/03/40dcf479-4298-4bda-a5f7-611f583421ff/
8 KB
8 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/670e3a9f620c5a430a577d997f50ab6523249903/2022/03/03/40dcf479-4298-4bda-a5f7-611f583421ff/20220301-danny-crandall.jpg?width=570&height=322&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
4a93d50e372217e77bf70c24745e2132981a354c047a593c1cfc247cd11d2ccd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=97867 idim=1920x1080 ifmt=jpeg ofsz=7698 odim=570x322 ofmt=webp
fastly-stats
io=1
content-length
7698
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"LV17BK1s88v0zJq82yEQZa69f6bx5Yas79gbOnddmNg"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Fri, 25 Mar 2022 12:53:25 GMT
unnamed.png
www.zdnet.com/a/img/resize/88f5d7eb2b9b78b240ce8f25d46bf7c4936f2038/2022/03/25/18ab5648-85f5-42f3-b80a-9b26cc484abe/
6 KB
6 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/88f5d7eb2b9b78b240ce8f25d46bf7c4936f2038/2022/03/25/18ab5648-85f5-42f3-b80a-9b26cc484abe/unnamed.png?width=170&height=128&fit=crop&format=pjpg&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
54d1f166812d43944c0896c4b9ea889017255712cb3e8c3ec95634deee1d5f39
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=930259 idim=1200x800 ifmt=png ofsz=6018 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
6018
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"RNGm7T7hQZq/ZXgL1+ABpyXLaTDJvX+5YOjoBYwwaPk"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Wed, 13 Apr 2022 09:34:21 GMT
shutterstock-1177798309.jpg
www.zdnet.com/a/img/resize/551d6d0b5eb0142c5621336aab3dd429e0926bd9/2021/09/16/c22aaa4d-4315-43d3-ba0a-f368b6073e2a/
4 KB
5 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/551d6d0b5eb0142c5621336aab3dd429e0926bd9/2021/09/16/c22aaa4d-4315-43d3-ba0a-f368b6073e2a/shutterstock-1177798309.jpg?width=170&height=128&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
092b76180bdaba9dc903e4b8c8c223552be1729d892c17259e232a63c6171ed4
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=2286684 idim=5500x3667 ifmt=jpeg ofsz=4606 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
4606
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"P1WPvrhknMXMdc1VA/XStt4PcGGzlM2tD1EhvN5mWE8"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Thu, 14 Apr 2022 12:23:53 GMT
istock-1205756496.jpg
www.zdnet.com/a/img/resize/0080f9abcd2378898ed778caa5df8edb2dfc76c3/2021/02/01/fe73d975-2631-453c-b5df-7f643a1f0ba7/
5 KB
6 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/0080f9abcd2378898ed778caa5df8edb2dfc76c3/2021/02/01/fe73d975-2631-453c-b5df-7f643a1f0ba7/istock-1205756496.jpg?width=170&height=128&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
3dce17622aeef95f975508f86f255b0523e53b72be048e12a54d9b99f6680b99
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=133056 idim=1254x836 ifmt=jpeg ofsz=5464 odim=170x128 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1612183582305443
fastly-stats
io=1
content-length
5464
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"dtNm3qqSBofhyc19weWuHGbrtzmoWTWEBj/++DPbX4o"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Wed, 13 Apr 2022 05:44:06 GMT
istock-701249404.jpg
www.zdnet.com/a/img/resize/283054f31ada38f8cdb7493cf0419b1de8c63f55/2020/09/16/1820f8a7-82a0-419e-967f-f89506886748/
3 KB
3 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/283054f31ada38f8cdb7493cf0419b1de8c63f55/2020/09/16/1820f8a7-82a0-419e-967f-f89506886748/istock-701249404.jpg?width=170&height=128&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
c2ff79ff3ce1e4421ca42e540be18a445290746497b604cdd52e53e93024675f
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=67899 idim=1393x752 ifmt=jpeg ofsz=2968 odim=170x128 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1600254887180894
fastly-stats
io=1
content-length
2968
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"bN1hheKiorlMv6PKd9ojWfnN2fqZC6mbC+5vhgbeFrA"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Thu, 14 Apr 2022 05:00:22 GMT
password.jpg
www.zdnet.com/a/img/resize/b183a66fb474a8419c733f34ce41afbe17e6e640/2021/09/22/523556c2-8609-4a31-b858-65b38065d24c/
4 KB
4 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/b183a66fb474a8419c733f34ce41afbe17e6e640/2021/09/22/523556c2-8609-4a31-b858-65b38065d24c/password.jpg?width=170&height=128&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
6074836cbb5f496cc92fcb4c95ac8820b8492cf4078f22d52eca1099ae263119
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=167872 idim=1600x1069 ifmt=jpeg ofsz=3756 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
3756
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"OEsOIRPMd3JyBrlVv9XM3fF/49HPidugTDPwdX/UYf8"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Mon, 11 Apr 2022 15:19:35 GMT
medical-device.jpg
www.zdnet.com/a/img/resize/378743994c4deebdd75507e38f2c1a26c9c5e174/2022/01/20/40842b6a-143d-4a85-90ed-6f6d1fa5c815/
7 KB
7 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/378743994c4deebdd75507e38f2c1a26c9c5e174/2022/01/20/40842b6a-143d-4a85-90ed-6f6d1fa5c815/medical-device.jpg?width=170&height=128&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
21d297fc3fb2f5065912e7b400d64120cfe992f7d046dc2b1d78e91ab003dfe1
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=1399698 idim=1600x1069 ifmt=jpeg ofsz=6992 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
6992
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"n/a4wolIAJ0gUhpvWkfwWLCC4lYmF1KCKrCZtBkEUMo"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Mon, 11 Apr 2022 13:43:27 GMT
iphone-secure.jpg
www.zdnet.com/a/img/resize/6abd7bf23c5ebf32c51ff59676f1bbe812d0abf8/2020/12/19/92c4bfdd-0924-48bd-854e-47d534f96e83/
6 KB
6 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/6abd7bf23c5ebf32c51ff59676f1bbe812d0abf8/2020/12/19/92c4bfdd-0924-48bd-854e-47d534f96e83/iphone-secure.jpg?width=170&height=128&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
763c3a399db8ae31b6b38f702a1be6d8c2e279fd699a8b4f8f802b0175117dfb
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=71278 idim=630x413 ifmt=jpeg ofsz=6268 odim=170x128 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1608390972280838
fastly-stats
io=1
content-length
6268
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"nhi11wNvOsMNPExl9pb9+4cfIo8vxXJ6p/nHOJvPL2o"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Wed, 13 Apr 2022 12:44:54 GMT
apple-ceo-tim-cook.png
www.zdnet.com/a/img/resize/4c6575bdb75e27093d387adbf000ce4b85fa405c/2021/01/29/f340c91c-272f-4a69-b8e7-4ba4378fed85/
3 KB
3 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/4c6575bdb75e27093d387adbf000ce4b85fa405c/2021/01/29/f340c91c-272f-4a69-b8e7-4ba4378fed85/apple-ceo-tim-cook.png?width=170&height=128&fit=crop&format=pjpg&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
146973f2cd6591d5f04644491629b7a8efded4b79c13fa6daaae2c1c34be1407
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=871603 idim=1512x1030 ifmt=png ofsz=2568 odim=170x128 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1611879834485783
fastly-stats
io=1
content-length
2568
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"YU40uNeUCyKVgm288+nc1DnKu+y3WYWdlRtVvJyO9Ok"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Tue, 12 Apr 2022 14:59:47 GMT
getty-hands-typing-on-a-laptop-keyboard.jpg
www.zdnet.com/a/img/resize/6558b1ab051cc4dccbd2c46c791942f1f4ff6520/2021/08/25/99bd596a-6b7d-47a5-9d50-5726551168c3/
4 KB
4 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/6558b1ab051cc4dccbd2c46c791942f1f4ff6520/2021/08/25/99bd596a-6b7d-47a5-9d50-5726551168c3/getty-hands-typing-on-a-laptop-keyboard.jpg?width=170&height=128&fit=crop&auto=webp
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
1633c8098dd3c8e48db8e25df584f096b7e812459edc24c3513a34289630a829
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=200063 idim=2121x1414 ifmt=jpeg ofsz=3860 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
3860
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"F8rDDxsx2qv8GaQ06JrXHgzznAgS9exG17gfw7wZrqg"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Sat, 09 Apr 2022 02:33:42 GMT
require-2.1.2.js
www.zdnet.com/a/fly/js/libs/
16 KB
6 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/require-2.1.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
a70d5b9ad136255942779acf94da5cc72316fde5c10c5e7707d6f1888f43dcb8
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
6169
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:15 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"3b96e8ec7ea3fd01f709a2c8d08eafa6"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 07:25:17 GMT
inlineMedia_core.js
static.myfinance.com/widget/
146 KB
51 KB
Script
General
Full URL
https://static.myfinance.com/widget/inlineMedia_core.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3121::7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eb014b40d7ae9f26ce51943a1e41f8fd4ca587940fa9d7c8cccf6fabc87bd213
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
4063
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
x-amz-request-id
VQFXH7J13SQNJNCR
x-amz-id-2
DWXl5+Sgf9IL+INcwmCLud1JHekzP9rxDeuzNOQY2Oa8vDJwIDT4i4ytRcv6eCiAsw602FwJPDs=
last-modified
Wed, 13 Apr 2022 13:38:18 GMT
server
cloudflare
etag
W/"196660b098e3c29d6cadfab9520cdaae"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=JEeIG%2FUYX3Yp7SfSzfPrPFKiHfJQ1qgBkJ9O1LWV70ugOrP%2FwyBIwCcZMhDf2QVYorIhow02jjWvPFwbia9E4ykcORJYTk8QDG%2BNnCfArlLQHwKF27IFMjfSDILt7CJHAUPNNl1nXUC%2BTqXU8nizMG134g%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6fbcaef3b8b859ef-MXP
e70f246a-fd9b-4805-9fd4-fcd89020aca5.json
cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/
3 KB
2 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/e70f246a-fd9b-4805-9fd4-fcd89020aca5.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eaf765d314b24473895a9ece61135d31023528c3b65129051b2c5a471d780604
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 14 Apr 2022 13:10:44 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
xkIaWO5Hr0+rNu9IdoYHdw==
age
6531
vary
Accept-Encoding
content-length
1425
x-ms-lease-status
unlocked
last-modified
Thu, 08 Jul 2021 15:15:53 GMT
server
cloudflare
etag
0x8D94223473B0939
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
06042b04-c01e-000f-0c15-b63510000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6fbcaef02a425a1f-MXP
expires
Thu, 14 Apr 2022 17:10:44 GMT
YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
c.go-mpulse.net/boomerang/ Frame BCDD
205 KB
50 KB
Script
General
Full URL
https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:f7:181::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Akamai Resource Optimizer /
Resource Hash
09ebd7f407439990aac227e70da23e1a819e8e30282928e324370805f480bec4

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 14 Apr 2022 13:10:45 GMT
Content-Encoding
br
Last-Modified
Sun, 12 Dec 2021 17:26:57 GMT
Server
Akamai Resource Optimizer
Vary
Accept-Encoding
Content-Type
application/javascript;charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800, s-maxage=604800
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
50393
truncated
/
31 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f3e2e0f12c5badfe408d69bf6c0fa9ce6247f9a45c849851a53b8647637cfcd0

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
dfd272053c730cd470302af475eb401d9be41c81f0081c20d7910f6c12732c9d

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
95783bf43b78701a92daf5ec7268db97c7144599c774821126b8cc5396724bfa

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Content-Type
image/png
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
182 B
457 B
XHR
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b944 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fd9308db31181fde13aca740757dcb439baf71d731011a87da483a28faae444f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

accept
application/json
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/json
access-control-allow-origin
*
strict-transport-security
max-age=31536000; includeSubDomains; preload
cf-ray
6fbcaef3cc785a2b-MXP
access-control-allow-headers
Content-Type
service-worker.js
www.zdnet.com/ Frame
0
0

Semibold.woff2
www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/
20 KB
20 KB
Font
General
Full URL
https://www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/Semibold.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
21c9c7889404394d4e4c780022b56b5fa39e83b19c34eb0508561a115a1dcc6a
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Origin
https://www.zdnet.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
20344
x-xss-protection
1; mode=block
last-modified
Tue, 15 Mar 2022 16:33:18 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a96ff4477074c6395b7305d2d98fde8e"
strict-transport-security
max-age=31536000
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Mar 2023 06:32:04 GMT
Regular.woff2
www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/
20 KB
20 KB
Font
General
Full URL
https://www.zdnet.com/a/fly/bundles/zdnetcss/fonts/Proxima%20Nova/Regular.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
7fa1c7b1686f9f116183456c39f7b3ed9cce063cfb428e575fe4a29ae05c4fa6
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Origin
https://www.zdnet.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
20256
x-xss-protection
1; mode=block
last-modified
Thu, 03 Mar 2022 15:19:47 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"2d636d9395b2da27ce67040250333ca4"
strict-transport-security
max-age=31536000
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 03 Mar 2023 15:27:21 GMT
ring-animated.svg
www.zdnet.com/a/fly/1649858264-asset/bundles/zdnetcss/images/video/
704 B
857 B
Image
General
Full URL
https://www.zdnet.com/a/fly/1649858264-asset/bundles/zdnetcss/images/video/ring-animated.svg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/css/video/htmlPlayerControls/controls-89b03fc2d1-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
0025565f0cddfceb7ebdbc4b21d2552c894998e443153f97a6e8b353dfd9bebd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/a/fly/css/video/htmlPlayerControls/controls-89b03fc2d1-rev.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
content-length
704
x-xss-protection
1; mode=block
last-modified
Tue, 12 Apr 2022 14:18:00 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"5f87ac7f571b5a0b1cdc101b49cdc8de"
strict-transport-security
max-age=31536000
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=604800
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Apr 2022 13:18:59 GMT
logo.png
www.zdnet.com/a/fly/1649858264-asset/bundles/zdnetcss/images/core/
4 KB
4 KB
Image
General
Full URL
https://www.zdnet.com/a/fly/1649858264-asset/bundles/zdnetcss/images/core/logo.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/a/fly/css/core/main-2f4bc6d816-rev.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/a/fly/css/core/main-2f4bc6d816-rev.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src https://*.zdnet.com:*
via
1.1 varnish
last-modified
Wed, 13 Apr 2022 13:41:54 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
date
Thu, 14 Apr 2022 13:10:44 GMT
vary
Accept-Encoding, Accept
content-type
image/png
cache-control
max-age=31536000
strict-transport-security
max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
content-length
4105
x-xss-protection
1; mode=block
expires
Wed, 20 Apr 2022 13:43:07 GMT
inlineMedia.css
static.myfinance.com/widget/
3 KB
2 KB
Stylesheet
General
Full URL
https://static.myfinance.com/widget/inlineMedia.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3121::7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c50d5d10df377bd960648973b53891bfcaf48f457503eed023ad2c29f28e49b2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
6867
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
x-amz-request-id
E76KD9X4369F809W
x-amz-id-2
I9BCNhq0gyVdNzbblL6qPJ0SC3f2+Z8AtMKFBBafXrZQ4acHVQyzXrqKxTuU4HKyzLKxIVuN2Ds=
last-modified
Mon, 12 Jul 2021 14:22:18 GMT
server
cloudflare
etag
W/"528a38ce39fc58a866c1226253bbb189"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Xoz%2BneHWkpDItNPO115b8wU6gz7CmjEbUMjQHrh58qidO0bTMgGwHgDe7P%2F3dhNff8ITJyFNLICXocwZyTpF3HuYiJAqGm%2FskXRrW2umPGQPZQfRIqt8iDyQ9bGxdbIFoidZvSbd4RD7DNrAlNcAtVlppQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/css
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6fbcaef3b8ba59ef-MXP
main.default.js
www.zdnet.com/a/fly/ba7f66-fly/js/
222 KB
70 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/ba7f66-fly/js/main.default.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
76672cfdab8a2d2ab9a44ebb4b7fb9cdae02678bbd2083773bf14d39beccc504
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:44 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
71552
x-xss-protection
1; mode=block
last-modified
Wed, 13 Apr 2022 14:00:04 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a19c7234f62847d408eae0dd05956f2f"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Apr 2022 14:01:26 GMT
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/6.20.0/
376 KB
84 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/6.20.0/otBannerSdk.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
295c66c14524b77dd1271317457dec037b5ef0943da346b9b73681e54da826e0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
jOOTzA5W9ewbfwCUPpt/mw==
age
13398
vary
Accept-Encoding
content-length
86053
x-ms-lease-status
unlocked
last-modified
Wed, 07 Jul 2021 06:41:48 GMT
server
cloudflare
etag
0x8D941124BEC2620
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
4aacb79a-501e-00a0-26ea-e71780000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6fbcaef4af7e3762-MXP
inlineMedia.css
static.myfinance.com/widget/
3 KB
1 KB
Stylesheet
General
Full URL
https://static.myfinance.com/widget/inlineMedia.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3121::7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c50d5d10df377bd960648973b53891bfcaf48f457503eed023ad2c29f28e49b2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
age
6867
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
x-amz-request-id
E76KD9X4369F809W
x-amz-id-2
I9BCNhq0gyVdNzbblL6qPJ0SC3f2+Z8AtMKFBBafXrZQ4acHVQyzXrqKxTuU4HKyzLKxIVuN2Ds=
last-modified
Mon, 12 Jul 2021 14:22:18 GMT
server
cloudflare
etag
W/"528a38ce39fc58a866c1226253bbb189"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=VigpeinTONfC%2BinWAx20pJoyOdvptkGjd8Jak9wqtGIDk%2Be4r%2FTZYAxPrZ3e7aAXEHuGk4NOPAPjcVW%2F60Nu3a%2F%2Fn%2BjLbvyHXtl3EoWppRhs%2Bd6mG3qs%2BafYtsN%2BZ5GXrS2ROl%2F2cWZf7B45vMQaAw0GYQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
text/css
vary
Accept-Encoding
cache-control
max-age=14400
cf-ray
6fbcaef54d0459ef-MXP
record
a.myfidevs.io/ Frame
0
0
Preflight
General
Full URL
https://a.myfidevs.io/record
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.250.239 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-250-239.compute-1.amazonaws.com
Software
Python/3.7 aiohttp/3.7.4.post0 /
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Headers
content-type,x-api-key
Access-Control-Request-Method
POST
Origin
https://www.zdnet.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

access-control-allow-credentials
true
access-control-allow-headers
*
access-control-allow-methods
POST
access-control-allow-origin
*
date
Thu, 14 Apr 2022 13:10:45 GMT
server
Python/3.7 aiohttp/3.7.4.post0
v1.5
www.myfinance.com/api/au/ Frame
0
0
Preflight
General
Full URL
https://www.myfinance.com/api/au/v1.5?imre=aHR0cHM6Ly93d3cuemRuZXQuY29tL2FydGljbGUvc3ByaW5nNHNoZWxsLWZsYXctaXMtbm93LWJlaW5nLXVzZWQtdG8tc3ByZWFkLXRoaXMtYm90bmV0LW1hbHdhcmUv
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3121::7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff

Request headers

Accept
*/*
Access-Control-Request-Headers
content-type
Access-Control-Request-Method
POST
Origin
https://www.zdnet.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

access-control-allow-credentials
true
access-control-allow-headers
x-requested-with, content-type, accept, origin, authorization, x-csrftoken, x-api-key, Access-Control-Allow-Origin
access-control-allow-methods
DELETE, GET, OPTIONS, PATCH, POST, PUT
access-control-allow-origin
https://www.zdnet.com
access-control-max-age
86400
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
6fbcaef67d137381-MRS
content-encoding
br
content-type
text/html; charset=utf-8
date
Thu, 14 Apr 2022 13:10:45 GMT
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=OmaK71ur3ANwfHXbkfwy0XBvA9waDCDBCPoiXn4YpSvqb0XwdYRbQOIrXIJv5HA8EJIhcwzWFcS0FxtdHgJv9l8cXjqX9Ria0u0IxgDxB84hyzyh%2FWn3vALw%2FfYe0no9yHG%2BNGmr7z1AmQxMZKVCCw%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
strict-transport-security
max-age=15552000
vary
Origin
x-content-type-options
nosniff
record
a.myfidevs.io/
0
166 B
XHR
General
Full URL
https://a.myfidevs.io/record
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.227.250.239 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-227-250-239.compute-1.amazonaws.com
Software
Python/3.7 aiohttp/3.7.4.post0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept
application/json
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
x-api-key
yuH27H1QId6afXAojow6Tafi7Vw9v1spaLD5Yznw
Content-Type
application/json

Response headers

access-control-allow-origin
*
date
Thu, 14 Apr 2022 13:10:45 GMT
access-control-allow-credentials
true
server
Python/3.7 aiohttp/3.7.4.post0
access-control-allow-headers
*
access-control-allow-methods
POST
v1.5
www.myfinance.com/api/au/
1 KB
1 KB
XHR
General
Full URL
https://www.myfinance.com/api/au/v1.5?imre=aHR0cHM6Ly93d3cuemRuZXQuY29tL2FydGljbGUvc3ByaW5nNHNoZWxsLWZsYXctaXMtbm93LWJlaW5nLXVzZWQtdG8tc3ByZWFkLXRoaXMtYm90bmV0LW1hbHdhcmUv
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a06:98c1:3121::7 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e51b96d8acfa6ef4c43a0cf924c0a32def4f0b9bccde57ddf6b55a4cc43a14ef
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
application/json
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
Content-Type
application/json

Response headers

date
Thu, 14 Apr 2022 13:10:46 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-type
application/json
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
allow
POST, GET
server
cloudflare
x-frame-options
SAMEORIGIN
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15552000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=yir2EafYToYDOLNYX050MPzV4RzYw4oEhN8NbK9%2FIwz2t%2BSPdLJ0xfs03v%2FU8MCOS4yX2TryG13I1NfaJPy%2BTLvWIJSAUHooL4pra%2BWB7IXZwWYW6Op9pqUdjH6XTGNaXYDV3pTrfhxfr5%2BgGB2ESg%3D%3D"}],"group":"cf-nel","max_age":604800}
content-language
en-us
access-control-allow-origin
https://www.zdnet.com
vary
Accept, Accept-Language, Origin, Cookie
cache-control
max-age=0, no-cache, no-store, must-revalidate, private
access-control-allow-credentials
true
cf-ray
6fbcaef99ab15fc4-MRS
expires
Thu, 14 Apr 2022 13:10:46 GMT
bidbarrel-zdnet-rv.min.js
at.adtech.redventures.io/lib/dist/prod/
494 KB
148 KB
Script
General
Full URL
https://at.adtech.redventures.io/lib/dist/prod/bidbarrel-zdnet-rv.min.js?adaptive=true
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.2.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
63bf27dff7ced42da82cbfbaaa8683e6baffea8fe94a888cecca56407667be1c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
via
1.1 c275031486c6f7b744b8d30847e98b14.cloudfront.net (CloudFront), 1.1 varnish
age
357
x-cache
Hit from cloudfront, HIT
content-encoding
gzip
content-length
151488
x-served-by
cache-hhn4041-HHN
last-modified
Wed, 30 Mar 2022 17:12:18 GMT
server
AmazonS3
x-timer
S1649941845.448486,VS0,VE2
etag
"6c0c6b149bbeb1421c7edb97221f7535"
vary
Accept-Encoding, Origin
content-type
application/javascript
cache-control
max-age=900, public, must-revalidate
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
x-amz-cf-id
FTRNo0VL3O6qQoNC-jf5aQH1z_aDx-8mLn1I-Bt6jWY_JpSrltxq9w==
x-cache-hits
1
urs.js
urs.zdnet.com/sdk/
50 KB
50 KB
Script
General
Full URL
https://urs.zdnet.com/sdk/urs.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.120.203.121 Kansas City, United States, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
121.203.120.34.bc.googleusercontent.com
Software
/
Resource Hash
fb7a86f12d2f0ac2f4111c147415ab30f9c7d84c5e15faba3875fce7ce590127
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
via
1.1 google
last-modified
Tue, 12 Jan 2021 17:00:48 GMT
etag
"5ffdd5c0-c803"
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript
accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
51203
en.json
cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/069e0a06-a1be-44f5-9a8f-926f2985d489/
93 KB
20 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/e70f246a-fd9b-4805-9fd4-fcd89020aca5/069e0a06-a1be-44f5-9a8f-926f2985d489/en.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c83de3876b70820a0a835648010dc49a5600d6c3dd65f1a1e19ff44d33663083
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
AlmWtxV11YCExQkuyz0PJA==
age
2591
vary
Accept-Encoding
content-length
20136
x-ms-lease-status
unlocked
last-modified
Thu, 08 Jul 2021 15:15:59 GMT
server
cloudflare
etag
0x8D942234AE979B3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
3343f274-d01e-0054-6315-b6326c000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6fbcaef65b1a5a1f-MXP
expires
Thu, 14 Apr 2022 17:10:45 GMT
mpulse-1.0.2.js
www.zdnet.com/a/fly/js/libs/
61 KB
12 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/mpulse-1.0.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
ea7373d7059ab32d4304249b48a91311f91d2dce5e1ebf10450f33f9a8c5f5ec
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
12449
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:15 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"f6937b2b8f749a38dd0c67be3ca5d61f"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 06:45:28 GMT
diff
at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/ Frame
0
0
Preflight
General
Full URL
https://at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/diff?variant=core
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.2.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
*/*
Access-Control-Request-Headers
cat,content-type,variant,version
Access-Control-Request-Method
GET
Origin
https://www.zdnet.com
Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

accept-ranges
bytes
access-control-allow-headers
*
access-control-allow-origin
https://www.zdnet.com
allow
GET,HEAD
content-length
8
content-type
text/html; charset=utf-8
date
Thu, 14 Apr 2022 13:10:45 GMT
etag
W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
server
Google Frontend
strict-transport-security
max-age=15552000; includeSubDomains
vary
Accept-Encoding, Origin
via
1.1 varnish
x-cache
MISS
x-cache-hits
0
x-cloud-trace-context
7c947f441bffecf7a0ca171f987b0402
x-content-type-options
nosniff
x-dns-prefetch-control
off
x-download-options
noopen
x-frame-options
SAMEORIGIN
x-served-by
cache-hhn4054-HHN
x-timer
S1649941846.692041,VS0,VE117
x-xss-protection
1; mode=block
config.js
confiant-integrations.global.ssl.fastly.net/J3UXFee1xclY-bfFlWh1mIZ_phU/gpt_and_prebid/
180 KB
37 KB
Script
General
Full URL
https://confiant-integrations.global.ssl.fastly.net/J3UXFee1xclY-bfFlWh1mIZ_phU/gpt_and_prebid/config.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.193.194 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
fc88657aee7f0dd4cc68e4f325c21b4c97e45964223f8b2c03a4569c08f9db1e

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 14 Apr 2022 13:10:45 GMT
Content-Encoding
gzip
Age
946
X-Cache
HIT
Connection
keep-alive
Content-Length
37712
x-amz-id-2
LqHy3sfGSBdoeZg8HP9Ag2RNZAskh4hcK2yeISmp7YysMf9wFri/tqxk3U8Buo4uUeYE3qV6tX8=
X-Served-By
cache-hhn4036-HHN
Last-Modified
Thu, 14 Apr 2022 11:52:02 GMT
Server
AmazonS3
X-Timer
S1649941846.664849,VS0,VE0
ETag
"5bcfac46f1e335f361a72f64f4e4597e"
x-amz-request-id
2J5C6WA44BSC4V21
Via
1.1 varnish
Cache-Control
public, max-age=900, stale-while-revalidate=3600
Accept-Ranges
bytes
Content-Type
text/javascript
X-Cache-Hits
46
diff
at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/
8 KB
2 KB
Fetch
General
Full URL
https://at.adtech.redventures.io/lib/api/v1/zdnet-rv/prod/config/diff?variant=core
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.2.154 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
Google Frontend /
Resource Hash
4d82db043569c6fa2d6bca94e9baa0b5cab0d180fabca6152df25111b8827b26
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

cat
DOmotVmQQ
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
Content-Type
application/json
Accept
application/json
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
variant
core
version
rv2.26.4

Response headers

strict-transport-security
max-age=15552000; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
age
35
x-dns-prefetch-control
off
x-cache
HIT
ttl
900s
content-length
1551
x-xss-protection
1; mode=block
x-served-by
cache-hhn4054-HHN
access-control-allow-origin
*
server
Google Frontend
x-timer
S1649941846.821439,VS0,VE1
x-frame-options
SAMEORIGIN
date
Thu, 14 Apr 2022 13:10:45 GMT
x-download-options
noopen
vary
Accept-Encoding, Origin
content-type
application/json; charset=utf-8
via
1.1 varnish
x-cloud-trace-context
1b240e26caf3b76399809fcbd68802a4
cache-control
max-age=900
etag
W/02bb4ca778a48bd5caff2a2146d0cda24a97c7c7
accept-ranges
bytes
access-control-allow-headers
*
x-cache-hits
1
otFlat.json
cdn.cookielaw.org/scripttemplates/6.20.0/assets/
13 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/6.20.0/assets/otFlat.json
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:9540 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
72562f00bd821b6edc0368065bf009468955ba01f8ead742d8bbc2470c4358c4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
content-md5
/OL7qnwFOarng5AW29V9Pw==
age
15338087
vary
Accept-Encoding
content-length
2950
x-ms-lease-status
unlocked
last-modified
Wed, 07 Jul 2021 06:41:42 GMT
server
cloudflare
etag
0x8D94112485FC2D3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
aa0c218f-101e-00ca-536c-c44b2b000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
6fbcaef7ef165a1f-MXP
gpt.js
securepubads.g.doubleclick.net/tag/js/
83 KB
28 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
sffe /
Resource Hash
c6dec0f40564ef3bd3d94ad102757fbce6068609abd1c337534e5b86ed4c7bb0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
28364
x-xss-protection
0
server
sffe
etag
"1186 / 232 of 1000 / last-modified: 1649934465"
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Thu, 14 Apr 2022 13:10:45 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1649941845798&s=c4d955e677d977d86344b243c8cbffa2dea3b84319b3c311d13eb043231080d3
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:f7:181::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
2b00ad392b52e2b3219f108f060612d47892561bf84cbf3ef26a429cacfbf621

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 14 Apr 2022 13:10:45 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
811
article-b95af240bf-rev.js
www.zdnet.com/a/fly/js/pages/
102 KB
26 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/pages/article-b95af240bf-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
29d4d789259c7ddd731be58e663493582c56f13684c28a09a164498cb074f829
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:45 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
26961
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 14:48:55 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"a130401e90a32addbc29f780a2438143"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 18 Apr 2022 15:47:20 GMT
wrap.js
confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/
192 KB
62 KB
Script
General
Full URL
https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.193.194 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
217b9e539bd55ad03f86545c4afc436c1d61f04aa131a4679181a3d30bde9480

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 14 Apr 2022 13:10:45 GMT
Content-Encoding
gzip
Age
522
X-Cache
HIT
Connection
keep-alive
Content-Length
62535
x-amz-id-2
Yk686UX3tf+sfw6s00j+izfI0JrqyGDELTeuED0o6vdJRolZ5EiShW+T+zVfuBcB3LCtNA9qHNs=
X-Served-By
cache-hhn4036-HHN
Last-Modified
Tue, 29 Mar 2022 15:47:05 GMT
Server
AmazonS3
X-Timer
S1649941846.947569,VS0,VE0
ETag
"52d00808545427ec106d5efaf477f68a"
x-amz-request-id
9PNTNSCKC5Z77DFH
Via
1.1 varnish
Cache-Control
public, max-age=31536000
Accept-Ranges
bytes
Content-Type
application/javascript; charset=utf-8
X-Cache-Hits
2148
cohesion-latest.min.js
cdn.cohesionapps.com/cohesion/
85 KB
24 KB
Script
General
Full URL
https://cdn.cohesionapps.com/cohesion/cohesion-latest.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
18.66.139.72 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-18-66-139-72.fra60.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
de10793a6d00c8d9f9717c7ce461d2898827f47ad9750bb0154bb4d73808f604

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-amz-version-id
null
content-encoding
gzip
etag
W/"f998de20ad3aafa9eae5283ad6d38094"
last-modified
Tue, 12 Apr 2022 12:00:24 GMT
server
AmazonS3
age
36637
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
via
1.1 d81b69368e6f8be2907e338480e58682.cloudfront.net (CloudFront)
date
Thu, 14 Apr 2022 12:00:30 GMT
x-amz-cf-pop
FRA60-P4
x-amz-cf-id
GQq8NDdEhHuSzVD6gdmvbP4N2CvpWC3exbZWxLQBjKdhQ56o7Opi5g==
pubads_impl_2022040701.js
securepubads.g.doubleclick.net/gpt/
368 KB
125 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2022040701.js?cb=31067065
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
sffe /
Resource Hash
4eba10304f45a9ca7d6b3b882e564a5dd00d3900dc515fbe6137765ed0fb45a3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 09:04:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
101190
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
127673
x-xss-protection
0
last-modified
Thu, 07 Apr 2022 08:34:53 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Thu, 13 Apr 2023 09:04:16 GMT
ppub_config
securepubads.g.doubleclick.net/pagead/
220 B
154 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/pagead/ppub_config?ippd=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
cafe /
Resource Hash
e5f7cfcae397d7a1faf00acf6eaf4a7c4d4bb3f749d638c1e7899ef6887e9ebe
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 14 Apr 2022 13:10:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private, max-age=3600, stale-while-revalidate=3600
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
129
x-xss-protection
0
expires
Thu, 14 Apr 2022 13:10:46 GMT
moatheader.js
z.moatads.com/redventuresgamheader644747280705/
241 KB
83 KB
Script
General
Full URL
https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
13675f970d6dfb0e12a632a85dc3c63ab511d64165770d11c1c09c5868cd0649

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:46 GMT
content-encoding
gzip
last-modified
Fri, 25 Mar 2022 21:18:02 GMT
server
AmazonS3
x-amz-request-id
NB2W8E3CW5CZAWJ7
etag
"33e1acc26c7bf4888dbc924de591e629"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=60141
accept-ranges
bytes
content-length
84049
x-amz-id-2
d92yoT9/8ygv0d5IcxtxMz72QaYX55gmWb2eZmb5Kt+jtsuO/7iNo02O3vW4YnbsZS4adYH/Guw=
/
684dd32e.akstat.io/
0
354 B
XHR
General
Full URL
https://684dd32e.akstat.io/?h.pg=article&h.ab=dapi_a_1&when=1649941846161&cdim.Site_View=desktop&t_other=custom4%7C346&d=zdnet.com&h.key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&h.d=zdnet.com&h.cr=e434956284005f720acb27b30abec6e252368876-42d22cf5-800602a4&h.t=1649941845867&http.initiator=api&rt.start=api&rt.si=98b266a2-fdfc-4686-959e-f7921f0484db&rt.ss=1649941847723&rt.sl=0&api=1&api.v=2&api.l=js&api.lv=0.0.1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:1700:38a::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:46 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Thu, 14 Apr 2022 13:10:46 GMT
config.json
c.go-mpulse.net/api/ Frame BCDD
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&d=www.zdnet.com&t=5499806&v=1.720.0&if=&sl=0&si=98b266a2-fdfc-4686-959e-f7921f0484db-rabz9w&plugins=ConfigOverride,Continuity,PageParams,IFrameDelay,AutoXHR,SPA,History,Angular,Backbone,Ember,RT,CrossDomain,BW,PaintTiming,NavigationTiming,ResourceTiming,Memory,CACHE_RELOAD,Errors,TPAnalytics,UserTiming,Akamai,Early,EventTiming,LOGN&acao=
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:f7:181::11a6 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
9511c202f7a77932a1abc2eb60ffd4be8124c349c101c621eb6bee9f778ae426

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 14 Apr 2022 13:10:46 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json
Access-Control-Allow-Origin
*
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
806
integrator.js
adservice.google.de/adsid/
107 B
792 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:831::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 14 Apr 2022 13:10:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3="googleads.g.doubleclick.net:443"; ma=2592000,h3=":443"; ma=2592000,h3-29="googleads.g.doubleclick.net:443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
107 B
549 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:830::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a4a1824defec1084ca81d496ee77891684c26196924bdc4fc21dd3482ce15e14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 14 Apr 2022 13:10:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
cache-control
private, no-cache, no-store
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
100
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
141 KB
20 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?pvsid=3464019518719246&correlator=3415850171302410&eid=31067065&output=ldjh&gdfp_req=1&vrg=2022040701&ptt=17&impl=fifs&npa=1&iu_parts=22309610186%2Caw-zdnet%2Cinnovation%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3%2C%2F0%2F1%2F2%2F3%2C%2F0%2F1%2F2%2F3&prev_iu_szs=728x90%7C970x66%7C5x5%2C300x250%7C300x600%2C300x250&ifi=1&adks=2152545444%2C192557409%2C2703023599&sfv=1-0-38&ecs=20220414&fsapi=false&prev_scp=pos%3Dnav%26sl%3Dnav-ad-plus-leader%253FT-1000%26iid%3Dunit%253Dnav-ad-plus-leader%257Cvguid%253Dca636edb-1976-477c-a3cd-ee9456e933d3%257Cpv%253D1%7Cpos%3Dtop%26sl%3Dmpu-plus-top%253FT-1000%26iid%3Dunit%253Dmpu-plus-top%257Cvguid%253Dca636edb-1976-477c-a3cd-ee9456e933d3%257Cpv%253D1%7Cpos%3Dmiddle%26sl%3Dmpu-middle%253FT-1000%26iid%3Dunit%253Dmpu-middle%257Cvguid%253Dca636edb-1976-477c-a3cd-ee9456e933d3%257Cpv%253D1&eri=1&cust_params=test%3Ddapi%257C1%257Ca%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dtrend-micro-inc%252Cpalo-alto-networks%252Cmicrosoft%252Cmirai-technologies%26tag%3Dmalware%252Csecurity%26pid%3Dtrend-micro-anti-spyware%252Clexmark-developer-kit-series%252Cmicrosoft-teams%26prodtype%3Ddeveloper-kits%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D4%26session%3Da%26pv%3D1%26vguid%3Dca636edb-1976-477c-a3cd-ee9456e933d3&sc=1&cookie_enabled=1&abxe=1&dt=1649941846813&lmt=1649941846&dlt=1649941844217&idt=2471&biw=1600&bih=1200&adxs=436%2C1050%2C1050&adys=50%2C451%2C1251&ucis=1%7C2%7C3&oid=2&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&dmc=8&bc=31&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIixbXSxmYWxzZV0.&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&frm=20&vis=1&scr_x=0&scr_y=0&psz=1600x100%7C370x280%7C370x30&msz=1600x100%7C370x30%7C370x30&fws=4%2C4%2C4&ohw=1600%2C370%2C370&ga_vid=553899598.1649941847&ga_sid=1649941847&ga_hid=1688001241&ga_fc=false&btvi=0%7C0%7C1&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
cafe /
Resource Hash
321f925978be92cbaf0fc5771b43642a09a7d446fffc6242c06a6199e350aa3b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:47 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
20230
x-xss-protection
0
google-lineitem-id
-1,-1,-1
pragma
no-cache
server
cafe
google-creative-id
-1,-1,-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
access-control-expose-headers
x-google-amp-ad-validated-version
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/ Frame E55C
6 KB
4 KB
Document
General
Full URL
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control
public, immutable, max-age=31536000
content-encoding
gzip
content-length
3108
content-type
text/html
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
cross-origin-resource-policy
cross-origin
date
Thu, 14 Apr 2022 13:10:46 GMT
expires
Fri, 14 Apr 2023 13:10:46 GMT
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
server
sffe
timing-allow-origin
*
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/
28 KB
12 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?pvsid=3464019518719246&correlator=2979664627601839&eid=31067065&output=ldjh&gdfp_req=1&vrg=2022040701&ptt=17&impl=fifs&npa=1&iu_parts=22309610186%2Caw-zdnet%2Cinnovation%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2F3&prev_iu_szs=300x250&ifi=4&adks=2231921556&sfv=1-0-38&ecs=20220414&fsapi=false&prev_scp=pos%3Dbottom%26sl%3Dmpu-bottom%253FLL%257CT-1000%26iid%3Dunit%253Dmpu-bottom%257Cvguid%253Dca636edb-1976-477c-a3cd-ee9456e933d3%257Cpv%253D1&eri=1&cust_params=test%3Ddapi%257C1%257Ca%26buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dtrend-micro-inc%252Cpalo-alto-networks%252Cmicrosoft%252Cmirai-technologies%26tag%3Dmalware%252Csecurity%26pid%3Dtrend-micro-anti-spyware%252Clexmark-developer-kit-series%252Cmicrosoft-teams%26prodtype%3Ddeveloper-kits%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%26env%3Dprod%26user%3Danon%26userGroup%3Dfirst_impression%26type%3Dgpt%26region%3Daw%26subses%3D4%26session%3Da%26pv%3D1%26vguid%3Dca636edb-1976-477c-a3cd-ee9456e933d3&sc=1&cookie_enabled=1&abxe=1&dt=1649941846989&lmt=1649941846&dlt=1649941844217&idt=2471&biw=1600&bih=1200&adxs=1050&adys=1567&ucis=4&oid=2&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&dmc=8&bc=31&uach=WyIiLCIiLCIiLCIiLCIiLFtdLG51bGwsbnVsbCwiIixbXSxmYWxzZV0.&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&frm=20&vis=1&scr_x=0&scr_y=0&psz=370x250&msz=370x30&fws=4&ohw=370&ga_vid=553899598.1649941847&ga_sid=1649941847&ga_hid=1688001241&ga_fc=false&btvi=2&nvt=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
cafe /
Resource Hash
c4f2280ff16e1e89f05f3fb67bce57fc0d1ec3c948eb40a1ce3297acc37045fe
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:47 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
289072
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
12279
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-mediationtag-id
448352
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
v2
mb.moatads.com/yi/
452 B
627 B
Script
General
Full URL
https://mb.moatads.com/yi/v2?ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&pcode=redventuresgamheader644747280705&rx=82318069005&callback=MoatNadoAllJsonpRequest_67909123
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.32.79.217 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-63-32-79-217.eu-west-1.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
4b418e525796d5b215092706d9dbfce36bf342a2419164ea033588ca3d8ec91c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:48 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"eb67d63e65ea92e7ff7b4a0db3dc05aa63752016"
content-length
452
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
84 B
258 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&i=REDVENTURES_GAM_HEADER1&hp=1&wf=1&sgs=3&vb=5&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1649941847143&de=287892259140&rx=82318069005&m=0&ar=3e87cfd1033-clean&iw=f366f1c&q=1&cb=0&cu=1649941847143&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&bo=undefined&bd=undefined&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&pe=1%3A834%3A995%3A0%3A1050&jk=-1&jm=-1&fs=197910&na=460589702&cs=0&ord=1649941847143&jv=1844290122&callback=DOMlessLLDcallback_67909123
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.208.32.237 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-208-32-237.eu-west-1.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
7f502c0a70919ce42aef0d7325dc406093418c05f8ac26838feecc0c6e330710

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:48 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"cee1ddf6d5c4af238053098e59fb0db807ad8414"
content-length
84
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
85 B
258 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&i=REDVENTURES_GAM_HEADER1&hp=1&wf=1&sgs=3&vb=5&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1649941847143&de=287892259140&rx=82318069005&m=0&ar=3e87cfd1033-clean&iw=f366f1c&q=2&cb=0&cu=1649941847143&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&bo=undefined&bd=undefined&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&pe=1%3A834%3A995%3A0%3A1050&jk=-1&jm=-1&fs=197910&na=2036814439&cs=0&callback=MoatDataJsonpRequest_67909123
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/redventuresgamheader644747280705/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.208.32.237 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-208-32-237.eu-west-1.compute.amazonaws.com
Software
TornadoServer/5.1.1 /
Resource Hash
ff520f83e01985e0e8122e01413b4e4543abc792c3fc9961d9173cb113efd95c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:48 GMT
cache-control
max-age=900
server
TornadoServer/5.1.1
timing-allow-origin
*
etag
"0f28beb59ce59d0bac58bb35a767a9743f66adc8"
content-length
85
content-type
text/html; charset=UTF-8
amp4ads-v0.mjs
cdn.ampproject.org/rtv/012203150226000/ Frame 40EF
222 KB
61 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b94ed570e00f5bba0eaed65da67bf6f2fc5e107446a682eb045f20dbd12ab0e8
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
62084
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"fa1474a6dd6481f4"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-ad-exit-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 40EF
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-ad-exit-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
aec5ee5147fdc283bcb601dc6231c234d9bec077d32756aef2a75eeedf78038f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5728
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d91e62368f79b48d"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-analytics-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 40EF
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-analytics-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
213738a8de7a1e55874dcbc92825c84599256579b64f60f19c2514e61844e6bb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29618
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"9a9baa9802fa29d2"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-fit-text-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 40EF
5 KB
3 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-fit-text-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2eb2a641ec9143273f4f5ba4f1526364fd4b1a040b628b4be54b77dbe362690f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1900
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"3393210d007db9ca"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-form-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 40EF
42 KB
13 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-form-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0b43999f77e447254a78e068f55a6cc9075071b252277337b901e095e607e474
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13669
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"565eca32a909292d"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
css
fonts.googleapis.com/ Frame 40EF
4 KB
691 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:400,500&lang=en
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
2e8fa2037c41372ddc72ea1e08a477ba37998b54b5416b8cff0554fa5b865e27
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Thu, 14 Apr 2022 11:23:33 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
date
Thu, 14 Apr 2022 13:10:48 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Thu, 14 Apr 2022 13:10:48 GMT
css
fonts.googleapis.com/ Frame 40EF
4 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Roboto:400,500&text=
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:812::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
2e8fa2037c41372ddc72ea1e08a477ba37998b54b5416b8cff0554fa5b865e27
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Thu, 14 Apr 2022 11:20:30 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
date
Thu, 14 Apr 2022 13:10:48 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Thu, 14 Apr 2022 13:10:48 GMT
amp4ads-v0.mjs
cdn.ampproject.org/rtv/012203150226000/ Frame 70B0
222 KB
61 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b94ed570e00f5bba0eaed65da67bf6f2fc5e107446a682eb045f20dbd12ab0e8
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
62084
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"fa1474a6dd6481f4"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-ad-exit-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 70B0
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-ad-exit-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
aec5ee5147fdc283bcb601dc6231c234d9bec077d32756aef2a75eeedf78038f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5728
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d91e62368f79b48d"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-analytics-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 70B0
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-analytics-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
213738a8de7a1e55874dcbc92825c84599256579b64f60f19c2514e61844e6bb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29618
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"9a9baa9802fa29d2"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-fit-text-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 70B0
5 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-fit-text-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2eb2a641ec9143273f4f5ba4f1526364fd4b1a040b628b4be54b77dbe362690f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1900
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"3393210d007db9ca"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-form-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 70B0
42 KB
13 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-form-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0b43999f77e447254a78e068f55a6cc9075071b252277337b901e095e607e474
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13669
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"565eca32a909292d"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
truncated
/ Frame 70B0
211 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
83006d6dac9c00aa30acd8f51ec7b6622463bbd8f560532ef4c9f08b22cf0d78

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Content-Type
image/png
amp4ads-v0.mjs
cdn.ampproject.org/rtv/012203150226000/ Frame 1DFA
222 KB
61 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b94ed570e00f5bba0eaed65da67bf6f2fc5e107446a682eb045f20dbd12ab0e8
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
62084
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"fa1474a6dd6481f4"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-ad-exit-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 1DFA
16 KB
6 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-ad-exit-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
aec5ee5147fdc283bcb601dc6231c234d9bec077d32756aef2a75eeedf78038f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5728
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"d91e62368f79b48d"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-analytics-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 1DFA
96 KB
29 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-analytics-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
213738a8de7a1e55874dcbc92825c84599256579b64f60f19c2514e61844e6bb
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
29618
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"9a9baa9802fa29d2"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-fit-text-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 1DFA
5 KB
2 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-fit-text-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2eb2a641ec9143273f4f5ba4f1526364fd4b1a040b628b4be54b77dbe362690f
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1900
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"3393210d007db9ca"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
amp-form-0.1.mjs
cdn.ampproject.org/rtv/012203150226000/v0/ Frame 1DFA
42 KB
13 KB
Script
General
Full URL
https://cdn.ampproject.org/rtv/012203150226000/v0/amp-form-0.1.mjs
Requested by
Host: confiant-integrations.global.ssl.fastly.net
URL: https://confiant-integrations.global.ssl.fastly.net/gptprebidnative/202203291145/wrap.js
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0b43999f77e447254a78e068f55a6cc9075071b252277337b901e095e607e474
Security Headers
Name Value
Content-Security-Policy default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

content-security-policy
default-src * blob: data:; script-src blob: https://cdn.ampproject.org/lts/ https://cdn.ampproject.org/rtv/ https://cdn.ampproject.org/sw/ https://cdn.ampproject.org/v0.js https://cdn.ampproject.org/v0.mjs https://cdn.ampproject.org/v0/ https://cdn.ampproject.org/viewer/; object-src 'none'; style-src 'unsafe-inline' https://cdn.ampproject.org/rtv/ https://cdn.materialdesignicons.com https://cloud.typography.com https://fast.fonts.net https://fonts.googleapis.com https://maxcdn.bootstrapcdn.com https://p.typekit.net https://pro.fontawesome.com https://use.fontawesome.com https://use.typekit.net; report-uri https://csp.withgoogle.com/csp/amp
content-encoding
br
x-content-type-options
nosniff
age
105949
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13669
x-xss-protection
0
server
sffe
date
Wed, 13 Apr 2022 07:44:59 GMT
strict-transport-security
max-age=31536000; includeSubDomains; preload
report-to
{"group":"amphtml-china-available","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/amphtml-china-available"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=31536000
etag
"565eca32a909292d"
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="amphtml-china-available"
expires
Thu, 13 Apr 2023 07:44:59 GMT
truncated
/ Frame 1DFA
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4470afbf7fa09d815951de468f3b86172e8f5106dcb70017741f84b8e8e49305

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Content-Type
image/png
pixel
protected-by.clarium.io/
68 B
345 B
Image
General
Full URL
https://protected-by.clarium.io/pixel?tag=wt_SjNVWEZlZTF4Y2xZLWJmRmxXaDFtSVpfcGhVLzI4NzA3ODYwNzU6NzI4eDkw&v=5&s=v31g0k3583p&sb=-1&h=www.zdnet.com&cb=1706924&d=eyJ3aCI6IlNqTlZXRVpsWlRGNFkyeFpMV0ptUm14WGFERnRTVnBmY0doVkx6STROekEzT0RZd056VTZOekk0ZURrdyIsIndkIjp7Im8iOjI4NzA3ODYwNzUsInciOiI3MjgiLCJoIjoiOTAifSwid3IiOjJ9
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.67.242 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-156-67-242.eu-central-1.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:48 GMT
Server
nginx/1.14.0 (Ubuntu)
Content-Type
image/png
Cache-Control
no-store, no-cache, must-revalidate, max-age=0
Connection
keep-alive
Content-Length
68
Expires
Sat, 26 Jul 1997 05:00:00 GMT
9979585427781444304
s0.2mdn.net/simgad/ Frame 40EF
425 KB
426 KB
Image
General
Full URL
https://s0.2mdn.net/simgad/9979585427781444304
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ee4ada3ff3e2c04c4988cadb05740f6c00f4e42cad85f994250e39d9251578ff
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Fri, 08 Apr 2022 13:30:07 GMT
x-content-type-options
nosniff
age
517241
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
435705
x-xss-protection
0
last-modified
Fri, 08 Apr 2022 09:41:13 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Sat, 08 Apr 2023 13:30:07 GMT
17844966266080545376
s0.2mdn.net/simgad/ Frame 40EF
154 KB
155 KB
Image
General
Full URL
https://s0.2mdn.net/simgad/17844966266080545376
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
d4042f9bfd89a8f156a1f7b4108d90ca443122dc2943cc5e37e598153ce37b07
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Fri, 08 Apr 2022 13:30:07 GMT
x-content-type-options
nosniff
age
517241
x-dns-prefetch-control
off
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
157777
x-xss-protection
0
last-modified
Fri, 08 Apr 2022 09:41:15 GMT
server
sffe
report-to
{"group":"ads-doubleclick-media","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-doubleclick-media"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-doubleclick-media"
expires
Sat, 08 Apr 2023 13:30:07 GMT
ad
googleads.g.doubleclick.net/dbm/ Frame 40EF
42 B
761 B
Image
General
Full URL
https://googleads.g.doubleclick.net/dbm/ad?dbm_c=AKAmf-DxjcSdhgLX1PP4t1-4tmc6r-qx17SvyO6JQQE4AYuke-16CtpJP94YIto_Po7KT7uybuv_pImB3yXC93NCqNi8nl3WW-xXfbhYzGks5uwqdEqyMkBGnvjZkhYWQxG0XjItnHaitHE9e8QUeeyykbhFtXqSJQ&dbm_d=AKAmf-A0QhYOO__MHe3qsuDuhtM-M3EOAnIDFSV-K-AC9wuXogqO-eZC4FaTI4KkYecZ705zZM8lyIV8yePP_lP5J_dFA1uCj40feOgfT9276MYOh0VT2TFe1dx-4nqvc1c61vAfsfhsh9VusdmZ3K-AkaIGLpnbXqoSXkw65_qiokzDV2VHvOqcPhbyN9u6j0JJAFNBW8GcOEuiqvgOFaJYf524C9dpHfw2K2DqzFOPgkLaRegGe2Fdgf7OFS87DXtrGosPWT3-YR7COD_s2jdzI_RjPPpUxplV7ZoFFfQicAAmXvPX9L2VXV2diLSs3NOrgvZz123IRmw1bwCnIalfNnosXVadfjWV_WHsM9tKDm1vb80kmJ69Nh3V72bhltfAkxeqa4C_11V2md-8pMe9Rc5VcMu0M4ydh0KrlNeTCTw4FUupNu6wIUFN35Jmha1mHQcgHBzpNlc44_xHiXdwPURl1HY02qxg_xLdg6cCVxRu6ywiP4QZkzID6coQxPMYBOPjdo4FhewbAO8JJW4Lwg7z_jZPCL5MR27MdGmN8h3k_Lu3Msmjhz3UOf6LrN8XUoUVrbKK2fxXEIMHslvLjZZQrCo9wNEEkw7n-0pQLFkZSl6wYXHWK80yqPPm9ImzzZbylMqVD6gcAv2UUqvTwrGO8exejO4RSnFj4f3vAR3Pogg1IOYsHDH7UIYwrb6-jduuQaMgkB4swTeSLWcSEK8cgPoBeTyTlZgQtGsazy5vW_C0FekySnkT12UbYIQJ-p6aOASRjDAKv0nc1370NFaiawtIWfpCvdXWyl5ogOBZKraZwZlsu3OkkG8wDZcimz6q3Fc5V60JjqG6xcG7ebT9HZSV5RTlCLGcG9O7xC1AQkneeA45DPRMmMIrIiUMaOiOpu9N9XYsV9yyRAoqni0E-jEhu4X4QXSMEsaEVu6_9MpxuVQ13LqnUsTbRznb5l7VRtTaGSgQ-mZzScmZjdc4-99a6YQDFjOQIA0bFz9GubZWhJyPqQ4vYvg_esVqWmFfQF6bzEo7H4ziD41woeoMXWXrWAcTSGBr8_BCL9Z_O2gyEgkMDoTSqIwRuEXddK257kI6YsrqyJBXNogd3KIuQ89wgpISimSrC6IWt1XwPY6mF7Dj_zwq0alJ4bKudWlMs3YSQpBmHWu-POoy2K1bqDdiJk1chE-umcDXPCZDEup4FSuL-oeSlff3OF99T3Mbzn6iq8UrQALKcADZI4FXuya6-fAhl7Yg7Ed09rZmhX6NeaJPKBpNk7R8TMrGSxoEoGSWjwjwAotkvRXB04MiaPP1tzIJbrpEqiS4R31VQb1dM_grj2xfJDAtYWfoiZfqur8SQzkvkAq07WTGpE4NnlLMxStzT6PtyMB_0iTMb3kwIkurOKgH9zygNclrwhZRN1hb40cxPQDeBrwjkz7YS9jt-4xHd82OQbCBENYGtLyaq-9_kMLlVeU-WNVNqCGG1itRQIr1b2EPQk-zzBlbFoeTrkU1M3cZldgFNpo_I1Bdf7lyMjFtz0m1TrvOtROonpXGqzrjZmXWzrxFegD44mFgNzGh7g-3X-ILcmaIPyrJYG4687LDRt7YGFHs-xs4yUVLQSJGQhWK535EMpcqJwe1q0qpZ7u3pX9pzFujQsdmu2VVgampIPdvFCNvtTUWe51Vw0VuO5wf8WAiVqTJFP-5rvKYYyEHRlCMHNjwcwvzb9J8o5mzb5bxa5wfXQ-_54lCwkh3A_4Xha-d4YBJGtIiqs0W9hxzzoEM288raCrwMzhiQcwn64iHSuH0ZoXOvCQr_dxPxyBakon8HfzbIPn6c05o-waW9Jk6qlVWWepOgiTNIVYtIJK6E_fbm9pQbvANgSF38HPi7lOngYBEZERxB7MA88NQaRa6WrLIGD8ixjwvAm_YCVtRVQMxCvdob5LnTZx2xrphV2chWVCvQpWQQsqrLZ-4PR6UEhzPKCNR7nQRSEZuuJmtNVJYi-IYCto6kGlxrV7xQnuEnGG2XusYGMpUzPLG-1ptYvWsdlfu24TmqMAfg2HvGqtydUDFREIOOL5f6b_P1bCLMBQGI94mMHaP69kn-P_v145MOrZ5vGRn9icFQugRaXpgZDhfSmwRSE14uP9CJGgIprXWHJuni81_Dxk0orOI7hLcLwsj5DD9pO1p8QPxy-hjWzSeGkCdP5FOhJrnINDCFUYvP07zkaM-_2sCRBBkqyNGHS3eDFR81fccPfi9uqL4TzoBu8l_I3RxzADWnQ_be132LjocauwbEBcQ837QWsS18IqwfMKRgxamEMSh1m362X71yDe2yOvAylGyTVXKLcvtHjZWOZpZP9q9cXbiZAFBDkgMwjzXMukeZ9XqSD80kn3nifFMm-y1JMr7cubtpIA01hV-U455Vqd2lQscTpyXCnRGzBgfgIYu-2aI2VUwjTjFdZQity-eYqHN2KfzGumlkDsHoY1zmjS4l8_pnqMhowwghIsVy2NChv54XutTg4mGg05iVzzLaLJkvAEGc7Ygsh9GGDvfK0UNPhKSnoIba9ftjLrDKLAZJ1WzNNutAk4J4tu8zoXeGBcKUHts41NCwKYXwGcaW76J4CXLMLCETGgm01s_nfg1iOQPX5FaQyWC3Mgaj40M6J4pAtSpTg9WGunILoXQvyA5dkVuJkXtAf1e28_vUJmTqOHFrfnO7t3FmYuFAdtchnrR5Ls-Qka2dKgj9ApqG3QwtYNxWNPMfb_jo7oaG11P09U47IeBK3vGxpjt7iRx-mfJwTUtGscVIVx5a1_djvXGrm14kB69sg5gvw09SnsYJ04wzAzakhZL-Guo8kn5kjjv2rLPl_JblYrSEYNhsAtt4RTvORbQU7bNHDV-Y9g0D_lUSNsUcyUcDDSUTO1jDxzYw8HF6FUP-E9SvWcxt20Rgrp1j3s7Zrio9texBHaues50rxkA4nk0erVGEaRgCxhN_M98uRTwJD2Tz60ujuWfz-YWC5NcsjOnNwgcD2wPpMs7ZII999XpQv3xTnXZ3xjfJyB1m3R8lK5Kz7-c7wTJU6V-yGbyJaaAdqKKWnv518Ze-EcqeffPIN6fopgL65FCldRfXZEX3idmPmv9r3Ehy46bIH1A87-YEiq263wEJtVlk86-v1kdMvoQLAD7B2Qk1So-8roC-QyFOrcYtWVh7IZ6iFn-JpQ1UWQUSZ-wgdpJiNCI0SXfpkoz9QQNXGMGc8CY4tSLNw6fuyUCG0dVzNQec6gZ8dqdlfWCurRdrj8Rz_NwUH5P1s5I2POrIIlkrM72yn5qSzfLnJakktXevkb9ab6uyCQEbmlMw803q-su4egmapOCkZtf&cid=CAASUORoPjGhvtuUNhkpqdohWXqIyg6e7QQFUSHmnUiRWAXK7CD2uJEa26hN08-5zY7khKkxrIu0xs4e5CQJ-BoJg2KbSA1stssC5oRtCPSO0ubY
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:48 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
adview
securepubads.g.doubleclick.net/pagead/ Frame 40EF
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CqBTAVh1YYs3nNo7U3gOQpJb4BOPXs8dp_8n6xOUP5-OivcABEAEg97vHgwFgleKQgqAHyAEGqQLX3YNie0yyPqgDAaoE4wFP0Hg-e1HVFzWpD5dRMmJMcd7s25JiSbZ5PkcprQTrySWfHiOIhGKoYNPxQM-usIa1WcQJWoixueF7wVvqygVEBWJPERV9J4eKklUHXXXsA5wclUkyBgIUtXECluuquPzGJrA9QDq6gn9BaGIS9A5avQ7ZMAY9QU-TTAr9zPurJ7jGeoKHwOOTdgTZ6ZOd2n5kiRbwZJ2VKNDtxEjvKSev9OqauGIeyJ1Qyas37j3j4TqSSOv9pUMNtCAXnaF8A1fI1ku2Oy3TcOkwCjZ_lYOy6_iPx3RrTJiFeuusXR7VSZtMWMAE5NnFh5gE4AQDiAW0rpjVPpIFBggbEAIYAZIFBggdEAQYAZIFBggdEAEYAZIFBggeEAEYAZAGAaAGN4AHzPXvzwKoB47OG6gHk9gbqAfulrECqAf-nrECqAeko7ECqAfVyRuoB6a-G9gHAfIHChCz9jMYuKjsxwHSCAkIiOGAcBABGB2ACgPICwGwE-uV6w7IE8iM5d8D0BMA2BMK2BQB0BUBgBcBshceChwIABIUcHViLTg4MjAzNjI2MDU3MTExOTYYyZt6&sigh=lf_LduG4WAE&uach_m=[UACH]&cid=CAQSPwCNIrLMijnxUtAHc6hXYDXkKo4PkLWDIXbP62FmX6Z39k7pPZIoQhn9ncT9_95out-ah2XzJ800Q8AaiY36tg&template_id=509&vt=10
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

l
www.google.com/ads/measurement/ Frame 40EF
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaS9DLF16TLXX_of9TJ_4bXcU2zZbFMpPPSudf4-I6AyEezaVecBw6ieBYI42DbpUaIhH58V
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 40EF
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 18:59:48 GMT
x-content-type-options
nosniff
server
cafe
age
65460
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
14819457070020093239
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Thu, 14 Apr 2022 18:59:48 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 40EF
295 B
757 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 05:43:34 GMT
x-content-type-options
nosniff
server
cafe
age
26834
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
426692510519060060
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Fri, 15 Apr 2022 05:43:34 GMT
pixel
protected-by.clarium.io/
68 B
345 B
Image
General
Full URL
https://protected-by.clarium.io/pixel?tag=wt_SjNVWEZlZTF4Y2xZLWJmRmxXaDFtSVpfcGhVLzI4NzA3ODYwNzU6MzAweDYwMA==&v=5&s=v31g0k3584v&sb=-1&h=www.zdnet.com&cb=5494675&d=eyJ3aCI6IlNqTlZXRVpsWlRGNFkyeFpMV0ptUm14WGFERnRTVnBmY0doVkx6STROekEzT0RZd056VTZNekF3ZURZd01BPT0iLCJ3ZCI6eyJvIjoyODcwNzg2MDc1LCJ3IjoiMzAwIiwiaCI6IjYwMCJ9LCJ3ciI6Mn0=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.67.242 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-156-67-242.eu-central-1.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:48 GMT
Server
nginx/1.14.0 (Ubuntu)
Content-Type
image/png
Cache-Control
no-store, no-cache, must-revalidate, max-age=0
Connection
keep-alive
Content-Length
68
Expires
Sat, 26 Jul 1997 05:00:00 GMT
12292965368575836593
tpc.googlesyndication.com/simgad/ Frame 70B0
66 KB
66 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/12292965368575836593?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qms813sT0Epg_A-hxkWXTAjJyRC7Q
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c43dcf156cbf8999aad6ccc1e0d5b9b39a7675ccd02679daa1aca4503205773a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Sun, 10 Apr 2022 07:04:45 GMT
x-content-type-options
nosniff
age
367563
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
67564
x-xss-protection
0
last-modified
Tue, 09 Mar 2021 23:57:40 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Mon, 10 Apr 2023 07:04:45 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 70B0
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 18:59:48 GMT
x-content-type-options
nosniff
server
cafe
age
65460
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
14819457070020093239
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Thu, 14 Apr 2022 18:59:48 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 70B0
295 B
353 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 05:43:34 GMT
x-content-type-options
nosniff
server
cafe
age
26834
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
426692510519060060
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Fri, 15 Apr 2022 05:43:34 GMT
l
www.google.com/ads/measurement/ Frame 70B0
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaR5CCH8WBZSz8Aq9PzVBZ0lssLUQBltiDSsxqrA1Bm-rK46LHQwuc_vOdbcGc7EneKlywS7
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

adview
securepubads.g.doubleclick.net/pagead/ Frame 70B0
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CO8leVh1YYs7nNo7U3gOQpJb4BKjOg9RoiKbFyIoP2_zqggEQASD3u8eDAWCV4pCCoAegAbOosvsByAEC4AIAqAMByAMIqgStAk_QvBugKDvZCMV8_yjpBk3N7_nioWabmx8Esfm7O4zO8iXm3LGZZAcS4tTilQgcvYx7ngZp6gW91T83Pe_-Q90j7pFIjcURUa1pwgIdr0ZeBbskTXeLaBrjHll3s2BhVAGffNTfX2438VP1bZ_hvg-Gwh2L5oktr0E8aikcD8PLQz0rKbifLMC8uz3xatavcsBA23LnGO2XdkIBq6n17OJj-1DnES3n6IYpWDSrdEArdQmbcyQkuYnhxaIHmwvcCidUOpN4fuHS6k9MI0hIGqivLndefEmwzI9Zv2CAbPbHm303e10k09nzpnE29csfByz1vJyIo3nuw8eZxVeI_ebT_vFmrCcVq5Rdp7LdQibuMYqs7K-6XZsGmNvAaTe_K_llBVJJ1mjEPzeKgDvABOr17fHsA-AEAZIFBAgEGAGSBQQIBRgEoAYCgAe1182EAqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB6SjsQKoB9XJG6gHpr4b2AcB8gcEEJXycNIICQiI4YBwEAEYHYAKA8gLAdgTDdAVAZgWAYAXAbIXHgocCAASFHB1Yi04ODIwMzYyNjA1NzExMTk2GMmbeg&sigh=mG28YYW4z-w&uach_m=[UACH]
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pixel
protected-by.clarium.io/
68 B
345 B
Image
General
Full URL
https://protected-by.clarium.io/pixel?tag=wt_SjNVWEZlZTF4Y2xZLWJmRmxXaDFtSVpfcGhVLzI4NzA3ODYwNzU6MzAweDI1MA==&v=5&s=v31g0k3586m&sb=-1&h=www.zdnet.com&cb=7442071&d=eyJ3aCI6IlNqTlZXRVpsWlRGNFkyeFpMV0ptUm14WGFERnRTVnBmY0doVkx6STROekEzT0RZd056VTZNekF3ZURJMU1BPT0iLCJ3ZCI6eyJvIjoyODcwNzg2MDc1LCJ3IjoiMzAwIiwiaCI6IjI1MCJ9LCJ3ciI6Mn0=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.67.242 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-156-67-242.eu-central-1.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:48 GMT
Server
nginx/1.14.0 (Ubuntu)
Content-Type
image/png
Cache-Control
no-store, no-cache, must-revalidate, max-age=0
Connection
keep-alive
Content-Length
68
Expires
Sat, 26 Jul 1997 05:00:00 GMT
10255267196295054454
tpc.googlesyndication.com/simgad/ Frame 1DFA
23 KB
23 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10255267196295054454?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qlX4fQVJAdj8vTGP1wZT_sg5G9GjQ
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
54c7d03bc73c7b64fd03ca605848afe0470c78abad139b4888f319c9dbf90d9a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Tue, 12 Apr 2022 19:10:41 GMT
x-content-type-options
nosniff
age
151207
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
23601
x-xss-protection
0
last-modified
Wed, 22 Sep 2021 20:29:17 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Wed, 12 Apr 2023 19:10:41 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 1DFA
2 KB
3 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 18:59:48 GMT
x-content-type-options
nosniff
server
cafe
age
65460
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
14819457070020093239
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Thu, 14 Apr 2022 18:59:48 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 1DFA
295 B
353 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 05:43:34 GMT
x-content-type-options
nosniff
server
cafe
age
26834
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
426692510519060060
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Fri, 15 Apr 2022 05:43:34 GMT
l
www.google.com/ads/measurement/ Frame 1DFA
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaTp8uMe2mjq4wes9wcyXP6KR2l2yXO6DtP6Xu2CiFyXRtqVwCEdxewRCD50LTN4oV1ZrSud
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

adview
securepubads.g.doubleclick.net/pagead/ Frame 1DFA
0
0
Image
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CjL0qVh1YYs_nNo7U3gOQpJb4BKjOg9Ro6J_FyIoP2_zqggEQASD3u8eDAWCV4pCCoAegAbOosvsByAEC4AIAqAMByAMIqgSwAk_QmeVI_WsgkBWZK6pUWq4TvlvYQJjqu1N_kKKI_CSHwyVoN80zg9xXIrhmsHYePr3IQ18abJougFbnoscnfAqnlfLE9mZP-9Yliatrvqll3ALVTK_6j-LH5ik3gj4DNPMmM6ayrcU_RHVnmj2pPHsXvbXQqw2QAofw42cBKi_ApUg5TaB-KrD6m8VRw6GI4eg7BXolI5Ve1_gSk7-HxUhMLzjLq-x8kdU-kVwXuikCP5_Xr3nocdOenraQ6x6ORA1tayHEmoSkfvhUBEwxYP0DW3sRYiAEmVUa1CnapBc23sWTcM5dZJBB3Q33SYrTkWRkTTde2Prq6zoElKHeMFlYKAiDQVgcciQmfCG_OSmhYI6qog49i4oY2SavrttNU0ZjJAnFvAhb8f7PJHH9suXABOr17fHsA-AEAZIFBAgEGAGSBQQIBRgEoAYCgAe1182EAqgHjs4bqAeT2BuoB-6WsQKoB_6esQKoB6SjsQKoB9XJG6gHpr4b2AcB8gcEEMuLKdIICQiI4YBwEAEYHYAKA8gLAdgTDdAVAZgWAYAXAbIXHgocCAASFHB1Yi04ODIwMzYyNjA1NzExMTk2GMmbeg&sigh=6iCHNBsdNSU&uach_m=[UACH]
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

truncated
/ Frame 40EF
213 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8f9e1478a44492a6b128064c66e9c3b91984fdabd99015e51ce2c329194811a3

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_HEADER1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1649941847143&de=910337326107&rx=82318069005&m=0&ar=3e87cfd1033-clean&iw=f366f1c&q=3&cb=0&cu=1649941847143&ll=2&lm=0&ln=0&em=0&en=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&zMoatAType=content_article&zMoatTest=zdnet&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&bo=aw-zdnet&bd=security&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&zMoatpos=nav&zMoatvguid=-&zMoatptype=-&zMoatsl=nav-ad-plus-leader%3FT-1000&pe=1%3A834%3A995%3A0%3A1050&jk=-1&jm=-1&fs=197910&na=532470138&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:48 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:48 GMT
container.html
3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/ Frame 56C3
6 KB
3 KB
Document
General
Full URL
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82a::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a73730123a43c3040d889aaee11ec35094277ce5f778076b262c23a293870adb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
age
2
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control
public, immutable, max-age=31536000
content-encoding
gzip
content-length
3108
content-type
text/html
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
cross-origin-resource-policy
cross-origin
date
Thu, 14 Apr 2022 13:10:46 GMT
expires
Fri, 14 Apr 2023 13:10:46 GMT
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
server
sffe
timing-allow-origin
*
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v29/ Frame 40EF
15 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v29/KFOmCnqEu92Fr1Mu4mxK.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Roboto:400,500&lang=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
cc46322d5c4d41da447f26f7fa714827f2ec9a112968c12ef5736c7494985eca
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.zdnet.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Tue, 12 Apr 2022 18:59:49 GMT
x-content-type-options
nosniff
age
151859
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15688
x-xss-protection
0
last-modified
Wed, 22 Sep 2021 16:13:19 GMT
server
sffe
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="apps-themes"
expires
Wed, 12 Apr 2023 18:59:49 GMT
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v29/ Frame 40EF
16 KB
16 KB
Font
General
Full URL
https://fonts.gstatic.com/s/roboto/v29/KFOlCnqEu92Fr1MmEU9fBBc4.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Roboto:400,500&lang=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
bb46ed079c3dd3c39af5051b4ada48f29f49151dad4fa218117bad2fdb5e616f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://www.zdnet.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 05:33:18 GMT
x-content-type-options
nosniff
age
113850
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
15920
x-xss-protection
0
last-modified
Wed, 22 Sep 2021 16:13:21 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 13 Apr 2023 05:33:18 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_HEADER1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&m=0&ar=3e87cfd1033-clean&iw=f366f1c&q=4&cb=0&cu=1649941847143&ll=2&lm=0&ln=0&em=0&en=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&zMoatAType=content_article&zMoatTest=zdnet&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&bo=aw-zdnet&bd=security&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&pe=1%3A834%3A995%3A0%3A1050&jk=-1&jm=-1&fs=197910&na=1954123735&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:48 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:48 GMT
si
googleads.g.doubleclick.net/pagead/drt/ Frame 70B0
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Redirect headers

date
Thu, 14 Apr 2022 13:10:48 GMT
x-content-type-options
nosniff
server
cafe
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
cache-control
private
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
si
googleads.g.doubleclick.net/pagead/drt/ Frame 40EF
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Redirect headers

date
Thu, 14 Apr 2022 13:10:48 GMT
x-content-type-options
nosniff
server
cafe
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
cache-control
private
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=30&fi=1&apd=59&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=910337326107&t=meas&os=1&fi2=0&div1=0&ait=0&gpt_target_pos=nav&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=nav-ad-plus-leader%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=30&fi=1&apd=59&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=910337326107&t=fv&os=1&fi2=0&div1=0&ait=0&gpt_target_pos=nav&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=nav-ad-plus-leader%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=30&fi=1&apd=59&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=910337326107&t=nht&os=1&fi2=0&div1=0&ait=0&gpt_target_pos=nav&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=nav-ad-plus-leader%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
si
googleads.g.doubleclick.net/pagead/drt/ Frame 1DFA
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
0
0
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Redirect headers

date
Thu, 14 Apr 2022 13:10:49 GMT
x-content-type-options
nosniff
server
cafe
content-type
text/html; charset=UTF-8
location
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
cache-control
private
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=54&fi=1&apd=83&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=910337326107&t=hdn&os=1&fi2=0&div1=0&ait=0&gpt_target_pos=nav&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=nav-ad-plus-leader%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=4&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=12&fi=1&apd=24&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=356672333922&t=meas&os=1&fi2=0&div1=0&ait=0&gpt_target_pos=top&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-plus-top%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=12&fi=1&apd=24&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=356672333922&t=fv&os=1&fi2=0&div1=0&ait=0&gpt_target_pos=top&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-plus-top%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=12&fi=1&apd=24&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=356672333922&t=nht&os=1&fi2=0&div1=0&ait=0&gpt_target_pos=top&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-plus-top%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=27&fi=1&apd=39&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=356672333922&t=hdn&os=1&fi2=0&div1=0&ait=0&gpt_target_pos=top&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-plus-top%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=4&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=15&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=425126416796&t=meas&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-middle%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=15&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=425126416796&t=nht&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-middle%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
10255267196295054454
tpc.googlesyndication.com/simgad/ Frame 1DFA
23 KB
23 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/10255267196295054454?sqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&rs=AOga4qlX4fQVJAdj8vTGP1wZT_sg5G9GjQ
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
54c7d03bc73c7b64fd03ca605848afe0470c78abad139b4888f319c9dbf90d9a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Tue, 12 Apr 2022 19:10:41 GMT
x-content-type-options
nosniff
age
151208
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
23601
x-xss-protection
0
last-modified
Wed, 22 Sep 2021 20:29:17 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Wed, 12 Apr 2023 19:10:41 GMT
en.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 1DFA
2 KB
2 KB
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/en.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
36133ca07927c88a7cc578fddbaed3c668ab75087834d0ca13dca5de4ec856c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 18:59:48 GMT
x-content-type-options
nosniff
server
cafe
age
65461
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
14819457070020093239
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
2502
x-xss-protection
0
expires
Thu, 14 Apr 2022 18:59:48 GMT
icon.png
tpc.googlesyndication.com/pagead/images/adchoices/ Frame 1DFA
295 B
319 B
Image
General
Full URL
https://tpc.googlesyndication.com/pagead/images/adchoices/icon.png
Requested by
Host: cdn.ampproject.org
URL: https://cdn.ampproject.org/rtv/012203150226000/amp4ads-v0.mjs
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7fd59024b6ca83f11f7a3448ec148309a13b705725716df134f699e60a96eb1b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 05:43:34 GMT
x-content-type-options
nosniff
server
cafe
age
26835
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
etag
426692510519060060
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
295
x-xss-protection
0
expires
Fri, 15 Apr 2022 05:43:34 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_HEADER1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1649941847143&de=425126416796&rx=82318069005&m=0&ar=3e87cfd1033-clean&iw=f366f1c&q=5&cb=0&cu=1649941847143&ll=2&lm=0&ln=0&em=0&en=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&zMoatAType=content_article&zMoatTest=zdnet&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&bo=aw-zdnet&bd=security&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&zMoatpos=middle&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-middle%3FT-1000&pe=1%3A834%3A995%3A0%3A1050&jk=-1&jm=-1&fs=197910&na=134248247&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
adview
securepubads.g.doubleclick.net/pagead/ Frame 56C3
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pagead/adview?ai=CLsx0Vx1YYvHFA4eV3wP28IL4CJ6hoa5cofno_p8DwI23ARABIABgleKQgqAHggEXY2EtcHViLTg4MjAzNjI2MDU3MTExOTbIAQngAgCoAwGqBMECT9BH_BetI_Dh_7U8VxyW3_Z-2ygajtBjX8L1b3kkD0ggR9ReY2RQ6bIvjQhHI1EApcwCvTBIrdnQ7zsluh9LQY4XiVbESWPBrC01hqh6H8V_FuQTcfyebu-dir4LZHvnr-hTolAY0OAIJ6sTHKckJVxrosJByzbro_U47uT_PYsjh4Wk4VFXZDCpVNbuXg-t3_bC0HIur_1MY8puGnB6DvCWl0YXkFEtN-UmqisMVA3k8aPJMN4YcJc96ATh8DjdYVvORbigaRTmMeNmxeEfKNEyerEkBg6gWnj7mCKYlUXKoFRLXhJo1dAmJWlPmCl4dOJ9i7XiKmhfQikjay78GwQLwIjkxM1d9HFSL1tt35mWLwnSP_ue10Rx_lqqALW6YlVB5COPjJ1z7D0L5Vj04yY8_8oNyQP8l7eyNBuI0LWO4AQBgAaozYmq0KGOiRegBiGoB6a-G6gHltgbqAeqm7ECqAffn7EC2AcA0ggHCIjhgHAQAYAKA_oLAggBgAwB0BUBgBcBshccChoSFHB1Yi04ODIwMzYyNjA1NzExMTk2GMmbeg&sigh=XjH9502VSZw&uach_m=[UACH]&cid=CAQSPwCNIrLMREMqzcn18Cw8IukFxnYbLxZa8ovFO5EKRi73XZgSuazFwZjcwrZ7D0SV_rw0DzTy9cSlTV8Ckj0uLxgB
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
142.250.186.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s07-in-f2.1e100.net
Software
/
Resource Hash

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

adfetch
googleads.g.doubleclick.net/pagead/ Frame 6E85
81 KB
31 KB
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
7af4168890f918c5da58e2e7db084248a0ec6d32d13162fd56fd56896b9bf391
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-encoding
br
content-length
32133
content-type
text/html; charset=UTF-8
cross-origin-resource-policy
cross-origin
date
Thu, 14 Apr 2022 13:10:49 GMT
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
server
cafe
timing-allow-origin
*
x-content-type-options
nosniff
x-xss-protection
0
xbfe_backfill.js
googleads.g.doubleclick.net/pagead/ Frame 56C3
11 KB
5 KB
Script
General
Full URL
https://googleads.g.doubleclick.net/pagead/xbfe_backfill.js
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
cd97a5bac90d9e2f62d8ef7ff715c53c56312bcb2ddde01e3454485ba317df37
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 12:24:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2768
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
4875
x-xss-protection
0
server
cafe
etag
7698967424627035244
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Thu, 14 Apr 2022 13:24:41 GMT
v1
a1181.casalemedia.com/impression/ Frame 56C3
43 B
303 B
Image
General
Full URL
https://a1181.casalemedia.com/impression/v1?bidID=7fbfdfd4-4a45-4a2d-b17a-2fb263503188&traceID=c9c1qlvc3grv0v9d6sug&dspID=85&userID=&cmpro=0&deviceType=2&expiryTime=1649942207&ap=YlgdVwAA4vEKd8qHAAC4dilnkGQUqM9DIjwT2w&siteID=676657&creativeID=5b339a&pubID=194991&format=banner&channel=site
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
185.170.60.112 , Canada, ASN27381 (CASALE-MEDIA, CA),
Reverse DNS
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:49 GMT
Server
Apache
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=1, max=100
Content-Length
43
Expires
0
gen_204
pagead2.googlesyndication.com/pagead/ Frame 56C3
0
433 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=awbid&awbid_b=AKAmf-CDvej9Buo0XNrRknYV3YMvxSVtPyK6IvaWKNhfv9iQ5PsvMyfWJhIFe9l6MsRJyqeTtB77petbK80MkDX-HsqOSnlDQw&pr=13:YlgdVwAAAABF69H3CFzIuJLF4Q51phThNObMqQ
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/ Frame 56C3
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/window_focus_fy2019.js
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
8aa048082094d36080fc028ab1584264596c64fb5b362038c4761ac9838d6b14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 12:54:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
986
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1359
x-xss-protection
0
server
cafe
etag
1484984001845508991
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 28 Apr 2022 12:54:23 GMT
qs_click_protection_fy2019.js
tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/ Frame 56C3
15 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/qs_click_protection_fy2019.js
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
4a29964e922a0ddad04e2feb2b4496f1019838b0cd9754da5bc95f6e20a14e98
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:03:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
460
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6409
x-xss-protection
0
server
cafe
etag
15284592792851369840
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 28 Apr 2022 13:03:09 GMT
l
www.google.com/ads/measurement/ Frame 56C3
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaS78Vd4D0_uNzGxQhzFo0xsKVky6C4qQ3n37NEgAmKGhfopfIN_JGavNDcDD2VNGAc30GmA
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

ext.js
tpc.googlesyndication.com/safeframe/1-0-38/js/ Frame 56C3
22 KB
7 KB
Script
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-38/js/ext.js
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0bcac89d72d5f0b2bef20f815406384ff05489e4294acee57409060c2eccffc5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 10:47:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
8590
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7022
x-xss-protection
0
last-modified
Tue, 02 Mar 2021 20:17:03 GMT
server
sffe
vary
Accept-Encoding
report-to
{"group":"ads-gpt-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/ads-gpt-scs"}]}
content-type
text/javascript
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="ads-gpt-scs"
expires
Fri, 14 Apr 2023 10:47:39 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 56C3
119 KB
37 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a5c76c5cdd769bc7a048c8f65c56a7000adb29c8472d36eb4514af572a5ec5f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
36908
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1649677559247379"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel
protected-by.clarium.io/ Frame 56C3
68 B
345 B
Image
General
Full URL
https://protected-by.clarium.io/pixel?tag=wt_SjNVWEZlZTF4Y2xZLWJmRmxXaDFtSVpfcGhVLzUwMjM1NzI2NDQ6MzAweDI1MA==&v=5&s=v31g0k358uq&id=eyJkZnAiOnsiYWQiOjUwMjQ0OTY5MTEsImMiOm51bGwsImwiOjAsIm8iOjI4NzA3ODYwNzUsIkEiOiIvMjIzMDk2MTAxODYvYXctemRuZXQvaW5ub3ZhdGlvbi9zZWN1cml0eSIsInkiOjI4OTA3MiwiY28iOjUwMjM1NzI2NDQsInMiOiJtcHUtYm90dG9tIn19&sb=undefined&cb=2367421&h=www.zdnet.com&d=eyJ3aCI6IlNqTlZXRVpsWlRGNFkyeFpMV0ptUm14WGFERnRTVnBmY0doVkx6VXdNak0xTnpJMk5EUTZNekF3ZURJMU1BPT0iLCJ3ZCI6eyJjbyI6NTAyMzU3MjY0NCwidyI6IjMwMCIsImgiOiIyNTAifSwid3IiOjZ9
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.156.67.242 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-35-156-67-242.eu-central-1.compute.amazonaws.com
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:49 GMT
Server
nginx/1.14.0 (Ubuntu)
Content-Type
image/png
Cache-Control
no-store, no-cache, must-revalidate, max-age=0
Connection
keep-alive
Content-Length
68
Expires
Sat, 26 Jul 1997 05:00:00 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=180&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=425126416796&t=hdn&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=middle&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-middle%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=165&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=899989888913&t=meas&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=bottom&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-bottom%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=1&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=165&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=899989888913&t=nht&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=bottom&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-bottom%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=2&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=191&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=899989888913&t=hdn&os=0&fi2=0&div1=0&ait=0&gpt_target_pos=bottom&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-bottom%3FLL%7CT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=3&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=REDVENTURES_GAM_HEADER1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&bq=11&f=0&j=&t=1649941847143&de=899989888913&rx=82318069005&m=0&ar=3e87cfd1033-clean&iw=f366f1c&q=6&cb=0&cu=1649941847143&ll=2&lm=0&ln=0&em=0&en=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&zMoatAType=content_article&zMoatTest=zdnet&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&bo=aw-zdnet&bd=security&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&gw=redventuresgamheader644747280705&fd=1&ac=1&it=500&zMoatpos=bottom&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-bottom%3FLL%7CT-1000&pe=1%3A834%3A995%3A0%3A1050&jk=-1&jm=-1&fs=197910&na=664952019&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
6355733318004511893
tpc.googlesyndication.com/simgad/ Frame 6E85
18 KB
18 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/6355733318004511893?sqp=4sqPyQQrQikqJwhfEAEdAAC0QiABKAEwCTgDQPCTCUgAUAFYAWBfcAJ4AcUBLbKdPg&rs=AOga4qkO2q-RGuqzSwF4J7NQHPihhAPn0w
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
28936cfc158a480d7c764c3dafaf86068dcfa66e17bd7846f8257edfa625f0a3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 13 Apr 2022 16:40:22 GMT
x-content-type-options
nosniff
age
73827
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18870
x-xss-protection
0
last-modified
Tue, 23 Nov 2021 18:04:41 GMT
server
sffe
report-to
{"group":"content-ads-owners","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/content-ads-owners"}]}
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
cross-origin-opener-policy-report-only
same-origin; report-to="content-ads-owners"
expires
Thu, 13 Apr 2023 16:40:22 GMT
abg_lite.js
tpc.googlesyndication.com/pagead/js/r20220412/r20110914/ Frame 6E85
25 KB
10 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220412/r20110914/abg_lite.js
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e66bfceb15a6ee125dff79826be02a07b766843e6c660edf55ec0c22d1a407c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:04:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
360
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
9777
x-xss-protection
0
server
cafe
etag
12512753850102923420
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 28 Apr 2022 13:04:49 GMT
window_focus.js
tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/ Frame 6E85
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/window_focus.js
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
b59e198c356c79d1ba89670c50cdb7e54181037f277ee106126caf570278bc11
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:08:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
150
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
1432
x-xss-protection
0
server
cafe
etag
15450667304708860052
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 28 Apr 2022 13:08:19 GMT
rx_lidar.js
www.googletagservices.com/activeview/js/current/ Frame 6E85
119 KB
36 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a5c76c5cdd769bc7a048c8f65c56a7000adb29c8472d36eb4514af572a5ec5f8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/active-view-scs-read-write-acl
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
36908
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="active-view-scs-read-write-acl"
etag
"1649677559247379"
vary
Accept-Encoding
report-to
{"group":"active-view-scs-read-write-acl","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Thu, 14 Apr 2022 13:10:49 GMT
qs_click_protection.js
tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/ Frame 6E85
19 KB
8 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/qs_click_protection.js
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
068e2ad9020fdc590c232b49e3ebbb8b540719796165ad86ab75bb6a7f54bf20
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 12:57:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
791
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
7667
x-xss-protection
0
server
cafe
etag
7504708142712926003
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 28 Apr 2022 12:57:38 GMT
l
www.google.com/ads/measurement/ Frame 6E85
0
0
Image
General
Full URL
https://www.google.com/ads/measurement/l?ebcid=ALh7CaT9z6ZcMPw61B3FYAgNUe2Wu2y3djJVMY0g1anM6ET-LIpHRRTYJlx7jm2t_am7b2ADpYro5AaU1xo_WxCpwZDDDg3TrQ
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

one_click_handler_one_afma.js
tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/ Frame 6E85
39 KB
15 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20220412/r20110914/client/one_click_handler_one_afma.js
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
a6c25e591394ea7aa5b84b25e9e6b44e38773a3289a2db50987b2cf946c100ab
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 01:42:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
41294
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
14839
x-xss-protection
0
server
cafe
etag
8993619844746972551
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Thu, 28 Apr 2022 01:42:35 GMT
usermatch
ssum-sec.casalemedia.com/ Frame C8E8
Redirect Chain
  • https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1
  • https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
2 KB
3 KB
Document
General
Full URL
https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Requested by
Host: 3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
URL: https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/safeframe/1-0-38/html/container.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.102.29.65 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-29-65.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
a32ddfc7c136ffeec33f5180a5548274526288540c93d418246213ad127a7c8c

Request headers

Referer
https://3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Length
1864
Content-Type
text/html
Date
Thu, 14 Apr 2022 13:10:49 GMT
Dropped-Udsids
39|45|230|241|13|191|88|90
Expires
Thu, 14 Apr 2022 13:10:49 GMT
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Pragma
no-cache
Server
Apache
Vary
Is-Traffic-Usersync

Redirect headers

Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Length
364
Content-Type
text/html; charset=iso-8859-1
Date
Thu, 14 Apr 2022 13:10:49 GMT
Expires
Thu, 14 Apr 2022 13:10:49 GMT
Location
https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Pragma
no-cache
Server
Apache
truncated
/ Frame 56C3
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b82a37eca2e42234de16d97decdfcf6c5009043e4a45403737af78c45ef6cdc8

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Fs0.2mdn.net%2Fsimgad%2F9979585427781444304&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=nav&zMoatvguid=-&zMoatptype=-&zMoatsl=nav-ad-plus-leader%3FT-1000&g=0&h=87&w=168&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1&gp=1&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=910337326107&rx=82318069005&cu=1649941847143&m=1791&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=0&ag=30&an=0&gf=30&gg=0&ix=30&ic=30&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=30&bx=0&dj=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=59&cd=0&ah=59&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=3&jm=-1&tc=0&fs=197910&na=1431633771&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
B22807636.328475542;dc_pre=CMfE2K7Qk_cCFUT4dwodJ4sOFg;dc_trk_aid=520608733;dc_trk_cid=117012770;ord=2023755544;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=
ad.doubleclick.net/ddm/trackimp/N8714.2382313DOUBLECLICKBIDMANAG/ Frame 6E85
Redirect Chain
  • https://ad.doubleclick.net/ddm/trackimp/N8714.2382313DOUBLECLICKBIDMANAG/B22807636.328475542;dc_trk_aid=520608733;dc_trk_cid=117012770;ord=2023755544;dc_lat=;dc_rdid=;tag_for_child_directed_treatme...
  • https://ad.doubleclick.net/ddm/trackimp/N8714.2382313DOUBLECLICKBIDMANAG/B22807636.328475542;dc_pre=CMfE2K7Qk_cCFUT4dwodJ4sOFg;dc_trk_aid=520608733;dc_trk_cid=117012770;ord=2023755544;dc_lat=;dc_rd...
42 B
63 B
Image
General
Full URL
https://ad.doubleclick.net/ddm/trackimp/N8714.2382313DOUBLECLICKBIDMANAG/B22807636.328475542;dc_pre=CMfE2K7Qk_cCFUT4dwodJ4sOFg;dc_trk_aid=520608733;dc_trk_cid=117012770;ord=2023755544;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=?
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Server
142.250.186.38 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra24s04-in-f6.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
content-type
text/html; charset=UTF-8
location
https://ad.doubleclick.net/ddm/trackimp/N8714.2382313DOUBLECLICKBIDMANAG/B22807636.328475542;dc_pre=CMfE2K7Qk_cCFUT4dwodJ4sOFg;dc_trk_aid=520608733;dc_trk_cid=117012770;ord=2023755544;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;gdpr=;gdpr_consent=;ltd=?
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
follow-only-when-prerender-shown
1
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
adview
googleads.g.doubleclick.net/pagead/ Frame 6E85
0
17 B
Image
General
Full URL
https://googleads.g.doubleclick.net/pagead/adview?ai=Cbic2Vx1YYua2CYjcb6StlOAHvaHdvmnlxsH3qQ_AjbcBEAEgt-WEIWCV4pCCoAegAZW2r54DyAECqAMByAPJBKoEmAJP0BbidvsJD_JjJQwqSRnzvdnd_GArOo635WzXAlkZhAcavGC8P6SJiiXmrDrOrPbvah6IeQOtmWh8jbxzDz-F4FvxgIFQ81jbeMhcOYWwml5mzrCj2UEmEUgKtHdV6S03jxNJFfgQb-cDvz_vVV43xef7jAlm9WdcVpB9g5RRIYmxVgHKfT3hrTjb7wLEx6ao34X0P90aPE1lsAH-0yiCwAQn14pfEHD7lBsNNT18tbZAvbsKnv-aPtGgVKseiSACBRCLU43PsOuyd-Q8-ymzgOP2x0uU_jKHVNJj9EG1RUtypXeyLISDecNqSfA40R3kpwaD6fz7GP0M4lQGcswdP752s5joK8lCovBco-TggH60ZfHBPqbCwATgpsWCyAGSBQQIBBgBkgUECAUYBKAGAoAH08nQYagHjs4bqAeT2BuoB-6WsQKoB_6esQKoB6SjsQKoB9XJG6gHpr4b2AcB0ggJCIDhgBAQARgA8ggNYmlkZGVyLTY3NjY1N4AKBMgLAdgTDNAVAZgWAYAXAbIXCAoGCAASABgA&sigh=jV4xZYh0ZnA&uach_m=[UACH]&pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg&vis=1
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy script-src 'none'; object-src 'none'
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

timing-allow-origin
*
content-security-policy
script-src 'none'; object-src 'none'
x-content-type-options
nosniff
server
cafe
date
Thu, 14 Apr 2022 13:10:49 GMT
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
cross-origin-resource-policy
cross-origin
content-type
text/html; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
s
googleads.g.doubleclick.net/pagead/drt/ Frame 4305
143 B
163 B
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
18088c10e79c926292732af98a0ce470e90f3fbcba4bb4896ab3310c2d94e421
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

age
154
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control
public, max-age=3600
content-encoding
gzip
content-length
145
content-type
text/html; charset=UTF-8
date
Thu, 14 Apr 2022 13:08:15 GMT
server
cafe
x-content-type-options
nosniff
x-xss-protection
0
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F12292965368575836593%3Fsqp%3D4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4%26rs%3DAOga4qms813sT0Epg_A-hxkWXTAjJyRC7Q&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&g=0&h=600&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&cu=1649941847143&m=1814&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=0&ag=12&an=0&gf=12&gg=0&ix=12&ic=12&ez=1&aj=1&pg=100&pf=0&ib=1&cc=0&bw=12&bx=0&dj=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=24&cd=0&ah=24&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=3&jm=-1&tc=0&fs=197910&na=334112354&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
truncated
/ Frame 6E85
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4923153b4c840fac3560239b3592d3427b0218726b47f36df330a079b93e4d66

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Content-Type
image/png
casale
match.adsrvr.org/track/cmf/ Frame C8E8
70 B
265 B
Image
General
Full URL
https://match.adsrvr.org/track/cmf/casale?gdpr=1
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.33.220.150 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
a12b7a488abeaa9e4.awsglobalaccelerator.com
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
cache-control
private,no-cache, must-revalidate
x-aspnet-version
4.0.30319
content-type
image/gif
content-length
70
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
crum
dsum-sec.casalemedia.com/ Frame C8E8
Redirect Chain
  • https://dsum-sec.casalemedia.com/rrum?ixi=1&cm_dsp_id=85&cb=https%3A%2F%2Fcm.g.doubleclick.net%2Fpixel%3Fgoogle_nid%3Dcasale_media2_dbm%26google_cm%26google_sc%26google_hm%3D&gdpr=1
  • https://cm.g.doubleclick.net/pixel?gdpr=1&google_nid=casale_media2_dbm&google_cm&google_sc&google_hm=YlgdWeLIB6wphBUA3OYWHAAA
  • https://dsum-sec.casalemedia.com/crum?cm_dsp_id=45&external_user_id=CAESECGk-eGx09hE1fya6UMZKkk&google_cver=1&gdpr=1
43 B
1 KB
Image
General
Full URL
https://dsum-sec.casalemedia.com/crum?cm_dsp_id=45&external_user_id=CAESECGk-eGx09hE1fya6UMZKkk&google_cver=1&gdpr=1
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
HTTP/1.1
Server
104.102.29.65 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-29-65.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:50 GMT
Server
Apache
Vary
Is-Traffic-Usersync
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Thu, 14 Apr 2022 13:10:50 GMT

Redirect headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
server
HTTP server (unknown)
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
location
https://dsum-sec.casalemedia.com/crum?cm_dsp_id=45&external_user_id=CAESECGk-eGx09hE1fya6UMZKkk&google_cver=1&gdpr=1
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
text/html; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
325
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel
cm.g.doubleclick.net/ Frame C8E8
170 B
502 B
Image
General
Full URL
https://cm.g.doubleclick.net/pixel?google_nid=index&google_cm&google_hm=YlgdWeLIB6wphBUA3OYWHAAABG4AAAIB&gdpr_consent=&us_privacy=&gdpr=1
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.212.130 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
ams15s21-in-f130.1e100.net
Software
HTTP server (unknown) /
Resource Hash
0b8a20373c6dd04e091902226d922b3688143a8938afb9d283d889de7b55ceb5
Security Headers
Name Value
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
server
HTTP server (unknown)
content-type
image/png
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
170
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
dcm
s.amazon-adsystem.com/ Frame C8E8
Redirect Chain
  • https://s.amazon-adsystem.com/dcm?pid=78af914c-e755-4b90-bded-1b172aedc763&us_privacy=&gdpr=1&gdpr_consent=&id=YlgdWeLIB6wphBUA3OYWHAAABG4AAAIB
  • https://s.amazon-adsystem.com/dcm?pid=78af914c-e755-4b90-bded-1b172aedc763&us_privacy=&gdpr=1&gdpr_consent=&id=YlgdWeLIB6wphBUA3OYWHAAABG4AAAIB&dcc=t
43 B
645 B
Image
General
Full URL
https://s.amazon-adsystem.com/dcm?pid=78af914c-e755-4b90-bded-1b172aedc763&us_privacy=&gdpr=1&gdpr_consent=&id=YlgdWeLIB6wphBUA3OYWHAAABG4AAAIB&dcc=t
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
HTTP/1.1
Server
209.54.176.128 Ashburn, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Server /
Resource Hash
c21e2c1246fe45a6750ae6208db2b5965ff6ed63eb80d2ecec3be9c83813428e
Security Headers
Name Value
Strict-Transport-Security max-age=47474747; includeSubDomains; preload

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:50 GMT
Vary
Content-Type,Accept-Encoding,X-Amzn-CDN-Cache,X-Amzn-AX-Treatment,User-Agent
Server
Server
x-amz-rid
Z256QM5QJNZYNFAHESX0
Strict-Transport-Security
max-age=47474747; includeSubDomains; preload
p3p
policyref="https://www.amazon.com/w3c/p3p.xml", CP="PSAo PSDo OUR SAM OTR DSP COR"
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Permissions-Policy
interest-cohort=()
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:50 GMT
Vary
Content-Type,Accept-Encoding,X-Amzn-CDN-Cache,X-Amzn-AX-Treatment,User-Agent
Server
Server
x-amz-rid
HBZE464ZD1MMNMAEK1JG
Strict-Transport-Security
max-age=47474747; includeSubDomains; preload
p3p
policyref="https://www.amazon.com/w3c/p3p.xml", CP="PSAo PSDo OUR SAM OTR DSP COR"
Location
https://s.amazon-adsystem.com/dcm?pid=78af914c-e755-4b90-bded-1b172aedc763&us_privacy=&gdpr=1&gdpr_consent=&id=YlgdWeLIB6wphBUA3OYWHAAABG4AAAIB&dcc=t
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Permissions-Policy
interest-cohort=()
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
crum
dsum-sec.casalemedia.com/ Frame C8E8
Redirect Chain
  • https://sync.adotmob.com/cookie/indexexchange?r=https%3A%2F%2Fdsum-sec.casalemedia.com%2Fcrum%3Fcm_dsp_id%3D13%26external_user_id%3D%7bamob_user_id%7d%26expiration%3D%5bEXPIRATION%5d&gdpr=1
  • https://dsum-sec.casalemedia.com/crum?cm_dsp_id=13&external_user_id=%7Bamob_user_id%7D&expiration=[EXPIRATION]&gdpr=1
43 B
990 B
Image
General
Full URL
https://dsum-sec.casalemedia.com/crum?cm_dsp_id=13&external_user_id=%7Bamob_user_id%7D&expiration=[EXPIRATION]&gdpr=1
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
HTTP/1.1
Server
104.102.29.65 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-29-65.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:49 GMT
Server
Apache
Vary
Is-Traffic-Usersync
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Thu, 14 Apr 2022 13:10:49 GMT

Redirect headers

location
https://dsum-sec.casalemedia.com/crum?cm_dsp_id=13&external_user_id=%7Bamob_user_id%7D&expiration=[EXPIRATION]&gdpr=1
date
Thu, 14 Apr 2022 13:10:49 GMT
access-control-allow-credentials
true
x-powered-by
Express
content-length
0
vary
Origin
keep-alive
timeout=5
rum
dsum-sec.casalemedia.com/ Frame C8E8
Redirect Chain
  • https://dmp.brand-display.com/cm/api/index?cm_dsp_id=191&cm_user_id=%3CIndex_user_id%3E&gdpr=1
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=191&expiration=63072000&external_user_id=5660610f-fe19-4bab-4050d045
43 B
999 B
Image
General
Full URL
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=191&expiration=63072000&external_user_id=5660610f-fe19-4bab-4050d045
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
HTTP/1.1
Server
104.102.29.65 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-29-65.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:49 GMT
Server
Apache
Vary
Is-Traffic-Usersync
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Thu, 14 Apr 2022 13:10:49 GMT

Redirect headers

date
Thu, 14 Apr 2022 13:10:49 GMT
via
1.1 google
server
nginx/1.20.2
access-control-allow-origin
*
p3p
CP='This is not a P3P policy!'
location
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=191&expiration=63072000&external_user_id=5660610f-fe19-4bab-4050d045
cache-control
max-age=3600
content-type
text/html; charset=utf-8
alt-svc
clear
content-length
146
rum
dsum-sec.casalemedia.com/ Frame C8E8
Redirect Chain
  • https://sync-tm.everesttech.net/upi/pid/ZMAwryCI?redir=https%3A%2F%2Fdsum-sec.casalemedia.com%2Frum%3Fcm_dsp_id%3D88%26external_user_id%3D%24%7BTM_USER_ID%7D&gdpr=1
  • https://sync-tm.everesttech.net/ct/upi/pid/ZMAwryCI?redir=https%3A%2F%2Fdsum-sec.casalemedia.com%2Frum%3Fcm_dsp_id%3D88%26external_user_id%3D%24%7BTM_USER_ID%7D&gdpr=1&_test=YlgdWQAB7ImrmgAZ
  • https://dsum-sec.casalemedia.com/rum?cm_dsp_id=88&external_user_id=YlgdWQAB7ImrmgAZ&gdpr=1&_test=YlgdWQAB7ImrmgAZ
43 B
988 B
Image
General
Full URL
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=88&external_user_id=YlgdWQAB7ImrmgAZ&gdpr=1&_test=YlgdWQAB7ImrmgAZ
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
HTTP/1.1
Server
104.102.29.65 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-29-65.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 14 Apr 2022 13:10:49 GMT
Server
Apache
Vary
Is-Traffic-Usersync
P3p
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Thu, 14 Apr 2022 13:10:49 GMT

Redirect headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
via
1.1 varnish
server
Varnish
x-timer
S1649941850.911057,VS0,VE0
x-served-by
cache-hhn4036-HHN
x-cache
HIT
location
https://dsum-sec.casalemedia.com/rum?cm_dsp_id=88&external_user_id=YlgdWQAB7ImrmgAZ&gdpr=1&_test=YlgdWQAB7ImrmgAZ
cache-control
no-cache
accept-ranges
bytes
content-length
0
retry-after
0
x-cache-hits
0
no_match_opted_out
um.simpli.fi/ Frame C8E8
Redirect Chain
  • https://um.simpli.fi/pm_match?https://dsum-sec.casalemedia.com/crum?cm_dsp_id=90&external_user_id=$UID&gdpr=1
  • https://um.simpli.fi/no_match_opted_out
0
272 B
Image
General
Full URL
https://um.simpli.fi/no_match_opted_out
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
H2
Server
169.50.137.184 , United States, ASN36351 (SOFTLAYER, US),
Reverse DNS
b8.89.32a9.ip4.static.sl-reverse.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubdomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

access-control-allow-origin
*
date
Thu, 14 Apr 2022 13:10:49 GMT
x-content-type-options
nosniff
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
strict-transport-security
max-age=63072000; includeSubdomains; preload
access-control-allow-methods
GET, POST, OPTIONS

Redirect headers

date
Thu, 14 Apr 2022 13:10:49 GMT
x-content-type-options
nosniff
server
nginx
location
/no_match_opted_out
strict-transport-security
max-age=63072000; includeSubdomains; preload
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/html
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
content-length
138
expires
Wed, 13 Apr 2022 13:10:49 GMT
htw-pixel.gif
js-sec.indexww.com/ht/ Frame C8E8
43 B
425 B
Image
General
Full URL
https://js-sec.indexww.com/ht/htw-pixel.gif?YlgdWeLIB6wphBUA3OYWHAAABG4AAAIB?gdpr=1
Requested by
Host: ssum-sec.casalemedia.com
URL: https://ssum-sec.casalemedia.com/usermatch?ix_um=1&cb=https%3A%2F%2Fjs-sec.indexww.com%2Fht%2Fhtw-pixel.gif%3F&s=194991&us_privacy=&gdpr_consent=&gdpr=1&C=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.102.29.65 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-29-65.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ssum-sec.casalemedia.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 14 Apr 2022 13:10:49 GMT
Last-Modified
Tue, 24 Jan 2017 19:36:04 GMT
Server
Apache
ETag
"761e21-2b-546dc3a097100"
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=2772
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
image/gif
Content-Length
43
Expires
Thu, 14 Apr 2022 13:57:01 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F10255267196295054454%3Fsqp%3D4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4%26rs%3DAOga4qlX4fQVJAdj8vTGP1wZT_sg5G9GjQ&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=middle&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-middle%3FT-1000&g=0&h=250&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=425126416796&rx=82318069005&cu=1649941847143&m=1824&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=15&cd=0&ah=15&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=2&jm=-1&tc=0&fs=197910&na=285020017&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2F3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com%2Fsafeframe%2F1-0-38%2Fhtml%2Fcontainer.html&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=bottom&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-bottom%3FLL%7CT-1000&g=0&h=250&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1050&gp=2154.0625&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=899989888913&rx=82318069005&cu=1649941847143&m=1989&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=2154.0625&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=165&cd=0&ah=165&am=0&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=2&jm=-1&tc=0&fs=197910&na=1701654704&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
si
googleads.g.doubleclick.net/pagead/drt/ Frame 4305
Redirect Chain
  • https://www.google.com/pagead/drt/ui
  • https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
0
16 B
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:82b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://googleads.g.doubleclick.net/pagead/drt/s?v=r20120211
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control
private
content-length
0
content-type
text/html; charset=UTF-8
date
Thu, 14 Apr 2022 13:10:49 GMT
expires
Thu, 14 Apr 2022 13:10:49 GMT
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
server
cafe
x-content-type-options
nosniff
x-xss-protection
0

Redirect headers

alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control
private
content-length
0
content-type
text/html; charset=UTF-8
date
Thu, 14 Apr 2022 13:10:49 GMT
location
https://googleads.g.doubleclick.net/pagead/drt/si?st=NO_DATA
server
cafe
x-content-type-options
nosniff
x-xss-protection
0
jCkUzW4MJun-Op3iOFNjK-GGKJG_m8_dpwU-GZUxlWM.js
pagead2.googlesyndication.com/bg/ Frame 68E5
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/jCkUzW4MJun-Op3iOFNjK-GGKJG_m8_dpwU-GZUxlWM.js
Requested by
Host: googleads.g.doubleclick.net
URL: https://googleads.g.doubleclick.net/pagead/adfetch?adk=940117968&adsafe=medium&client=ca-pub-5722610347565274&format=300x250_as&ip=45.141.152.0&output=html&unviewed_position_start=1&url=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&sub_client=bidder-676657&aceid=MKwatACOG7QA-VU0AQ9oNAEiajQB-XA0AchyNAGqczQBKHU0AXV1NAHHdTQBMHY0AUx2NAFQdjQBbnY0AXx2NAF9djQBkHY0AZ52NAGjdjQBtXY0AbZ2NAG7djQBvXY0Acp2NAHSdjQB2XY0AeB2NAHkdjQBBHc0AQV3NAEGdzQBFXc0ARp3NAE0dzQBP3c0AUtzQQFTc0EBOPzZAYIf-AE8HlwCc_mIAidCqgIoQqoCwE6qAv5_qgJqgaoCeYWqAo2OqgJxj6oCrpGqAoCbqgKBm6oCgpuqAk2gqgKiqKoC4qmqAiysqgIBr6oCuLCqAp6zqgK2tKoCqL2qAs7HqgIyyqoCy82qAhrUqgKU1KoCddqqAkrdqgJV3qoCXOWqAqDlqgIP6aoCN-mqAhbqqgIz6qoCIeyqArzsqgKB7aoCYe-qAtfxqgK68qoCWvSqAoL0qgKK9aoC8_WqAlr2qgJd9qoCw_aqArP3qgIO-KoCRviqArj4qgI1-qoCqvqqAib7qgJC-6oCg_uqAgb8qgIY_KoCTf2qAmH9qgJx_aoCKf6qAmD-qgKC_qoC-f6qAnT_qgLw_6oC9f-qAjoBqwKEAasCygGrAswBqwI3AqsCawKrArACqwLsAqsCgQOrAjUFqwKV8xQDaZxRA9gzTAWbs8UFW1BTCQPnnwvC2KEO08r7Eqfa-xK73PsSUOv7EgXt-xJk7fsS2-37Em3u-xLP7vsSqe_7ElHy-xKc8vsSv_L7Ehv2-xJN9vsS2vb7Eur2-xIt9_sSi_f7Epj3-xLpW9ATwvUDFdzHDBUaZXEWmsscGPdWaxqx8Fkoysu1Lg&awbid_c=AKAmf-A2INzd1n8UMsFO-KihCKUJ8CNzap9g5LXUcXN04QNbbvg6btzgQ4MtJ_v8RMTooZrlTIOHsai9AE4Ygp3KPN-WQP427ZJKUB9EJBlvGa9AgSULZlW5wF3T1lMq6U5OkKJLV31fPYFoQHTtZtLcYyfMMUazBxJCYOQzvx9aFU-TZoikqy4&awbid_d=AKAmf-CQMPOkAUjNw4SdrTrm7tg-3icyPt7-F_Y9TKYFukPw6ZkPGf5RndzGJHVKKSrL3kWOyt6JCtHuejASgGQq1H893HAcr-QDDEnFbUV1dcdSP_P2GmYah49SYZyQKvmUCyORnGfF8JB2K2_iMI8dLTDsKpab501QZ2fA7FqH-GsZlkGFCg-TC-01ndGYLSoqaTVdGHrMuKTBBfp3RmA5mwhxIDFTscjpwmfbvZsXf7cKRLGJxYh5awKHtIoP6N7hWH902-xOsCzJKDBqRFO2gJ5KFRERCwxNiaUZAWp-yWVIENhUHfTuoM07lNxDirMrAofXjix0Vu1j-32GiSWjR_teDGthkkRLFd50kaDQJMYfCcKp2LTDEojxa2w-TAiRu8Fiu50UOZ76QGQGwfH_z1GLueDJhxXeUYv1uWoB5jQjY13Edumvt3Ge-gu0nIkiWFXrLhMunTGsb_Xc_RNud5UV2yk7hiwKQnGrq_uTTKZU0laI5KscoQZKT6Qq1elzk8x8jVGOW8ssrd4GodFpdN0CU3vyk4Ym_j7uJMcj_iuJ-SjicCp9jks4wJQpZ5W3L0LCtII02_UYYWKt9KGcmvMd0YsnrGXJ2IUbZ_S-NzxHn62tTxWqtdGpsxLa_D6N3X1feMf2Wc4mVEVXv1IVwuiwhSnmeGld7I7-5K3q2an6sDe_9gpzM0Q6C8VL7RPzV1N_Idan_kE42DlXHPa0DhyTC0xBlQ&cid=CAASBORokHs&exk=1019709486&rfl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&a_pr=13:YlgdVwAAAAB6ZrPFN86puKv5wmtZMAAGKTspQg
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8c2914cd6e0c26e9fe3a9de23853632be1862891bf9bcfdda7053e1995319563
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://googleads.g.doubleclick.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 12:00:10 GMT
content-encoding
br
x-content-type-options
nosniff
age
4239
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13627
x-xss-protection
0
last-modified
Mon, 11 Apr 2022 15:48:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Fri, 14 Apr 2023 12:00:10 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=nav&zMoatvguid=-&zMoatptype=-&zMoatsl=nav-ad-plus-leader%3FT-1000&g=1&h=87&w=168&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1&gp=1&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=910337326107&rx=82318069005&cu=1649941847143&m=2794&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=1&ag=1041&an=30&gi=1&gf=1041&gg=30&ix=1041&ic=1041&ez=1&ck=1041&kw=865&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1041&bx=30&ci=1041&jz=865&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=865&cd=59&ah=865&am=59&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=4&jm=-1&tc=0&fs=197910&na=783573516&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=865&tet=1041&fi=1&apd=1070&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=0&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=910337326107&t=iv&os=1&fi2=0&div1=1&ait=0&gpt_target_pos=nav&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=nav-ad-plus-leader%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=5&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:49 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:49 GMT
pixel.gif
redventuresgamheader644747280705.s.moatpixel.com/
43 B
260 B
Image
General
Full URL
https://redventuresgamheader644747280705.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=1011&tet=1202&fi=1&apd=1214&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=5024496911&L2id=2870786075&L3id=5718138840&L4id=138352803033&S1id=aw-zdnet&S2id=security&ord=1649941847143&r=356672333922&t=iv&os=1&fi2=0&div1=1&ait=0&gpt_target_pos=top&gpt_target_vguid=-&gpt_target_ptype=-&gpt_target_sl=mpu-plus-top%3FT-1000&fullAdUnitPath=%2F22309610186%2Faw-zdnet%2Finnovation%2Fsecurity&bedc=1&q=5&nu=1&ib=0&dc=1&ob=0&oh=0&lt=0&ab=0&n=1&nm=1&sp=0&pt=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.35.229.151 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-35-229-151.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:50 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:50 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=nav&zMoatvguid=-&zMoatptype=-&zMoatsl=nav-ad-plus-leader%3FT-1000&g=2&h=87&w=168&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1&gp=1&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=910337326107&rx=82318069005&cu=1649941847143&m=2794&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=1&ag=1041&an=1041&gi=1&gf=1041&gg=1041&ix=1041&ic=1041&ez=1&ck=1041&kw=865&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1041&bx=1041&ci=1041&jz=865&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=865&cd=865&ah=865&am=865&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=4&jm=-1&tc=0&fs=197910&na=1031693449&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:50 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:50 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=nav&zMoatvguid=-&zMoatptype=-&zMoatsl=nav-ad-plus-leader%3FT-1000&g=3&h=87&w=168&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1&gp=1&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=910337326107&rx=82318069005&cu=1649941847143&m=2795&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=1&ag=1041&an=1041&gi=1&gf=1041&gg=1041&ix=1041&ic=1041&ez=1&ck=1041&kw=865&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1041&bx=1041&ci=1041&jz=865&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=865&cd=865&ah=865&am=865&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=4&jm=-1&tc=0&fs=197910&na=626082121&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:50 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:50 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 40EF
42 B
64 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstX1JcD7Gko_6jUBxVXDJNyDd6hZsc1eQZ2Crhgphhu20i6ApSV9H1wlXn9CQ_O-Ju_vF1_OsM7UfM8HkqhDtGJsvhLrfbCxy_Sjk8p&sai=AMfl-YSGFQ2ogoyaImwthD-ECxycI0SzNAiOPlg7MvjCKVrxZMtgFkpiNGU3H6jIZEo4jF_spFVLBf4Z-PMYXEzxULrdtdcmGwoOtJPW3acGAyJBTVfzhwWSPyrqc9ZjPHj6&sig=Cg0ArKJSzAsRchXEb79DEAE&cid=CAASUORoPjGhvtuUNhkpqdohWXqIyg6e7QQFUSHmnUiRWAXK7CD2uJEa26hN08-5zY7khKkxrIu0xs4e5CQJ-BoJg2KbSA1stssC5oRtCPSO0ubY&id=ampim&o=436,5&d=728,90&ss=1600,1200&bs=1600,1200&mcvt=1001&mtos=0,0,1001,1001,1001&tos=0,0,1001,0,0&tfs=1114&tls=2115&g=100&h=100&tt=2115&r=v&avms=ampa&uap=&uapv=&uaa=&uam=&uafv=&uab=&adk=2152545444
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:50 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 70B0
42 B
64 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssFhKU48x7lT0aBSAQLKtgXY71mkRT0k7m0jLl5Wuij8RBoSdP2fLIxaMdzaxh52cyrFi9ATbuhz1q0H-h8IjagJeP4WLFwGUnER0Yf4EPi9K15P_8SwQ&sai=AMfl-YRDdHszkEF5tY8xe1amYT3_UyN-v3q7Jz--D7LyjkA-xuM6o4hbYL6giKDYs-IixrLt-_JLAaBIgOCYjzTlTXZ_6VL3F-SCyO0lrPwJfnRNwz3rmbxQpPaSQh-FGqnn&sig=Cg0ArKJSzBXWUjdmEPGdEAE&cid=CAASUORo_CRdm4zycpETvAb39yHobCVQcsyysK7sqekyNdZGqg7WjKKSdNJ8iXI0uzWQMHu7USjsna--UXR34iycyqxnG9qzipdcog8trbwNI8eI&id=ampim&o=1050,451&d=300,600&ss=1600,1200&bs=1600,1200&mcvt=1007&mtos=0,0,1007,1007,1007&tos=0,0,1007,0,0&tfs=1044&tls=2051&g=100&h=100&tt=2051&r=v&avms=ampa&uap=&uapv=&uaa=&uam=&uafv=&uab=&adk=192557409
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:50 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&g=1&h=600&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&cu=1649941847143&m=2997&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=1&ag=1202&an=12&gi=1&gf=1202&gg=12&ix=1202&ic=1202&ez=1&ck=1202&kw=1011&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1202&bx=12&ci=1202&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1011&cd=24&ah=1011&am=24&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=4&jm=-1&tc=0&fs=197910&na=1278978807&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:50 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:50 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&g=2&h=600&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&cu=1649941847143&m=2998&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=1&ag=1202&an=1202&gi=1&gf=1202&gg=1202&ix=1202&ic=1202&ez=1&ck=1202&kw=1011&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1202&bx=1202&ci=1202&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1011&cd=1011&ah=1011&am=1011&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=4&jm=-1&tc=0&fs=197910&na=425275314&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:50 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:50 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&g=3&h=600&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&cu=1649941847143&m=2998&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A0%3A1050&as=1&ag=1202&an=1202&gi=1&gf=1202&gg=1202&ix=1202&ic=1202&ez=1&ck=1202&kw=1011&aj=1&pg=100&pf=100&ib=1&cc=1&bw=1202&bx=1202&ci=1202&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1011&cd=1011&ah=1011&am=1011&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=4&jm=-1&tc=0&fs=197910&na=1745334319&cs=0
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:50 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:50 GMT
nr-spa-1215.min.js
js-agent.newrelic.com/
47 KB
18 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-spa-1215.min.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.66.137 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
dd2d8d288526b88b0eae53168e31b4092acf39ed38d40ffcbc6d0ab2f7a4aa66

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

x-amz-version-id
zcmP9QP8YWQtiPZETZozJGQXbXQvWuWT
content-encoding
gzip
etag
"7e1862f7a390ed9fc02c299216395547"
x-amz-request-id
2TR2RRYMRD54RVTY
x-cache
HIT
cross-origin-resource-policy
cross-origin
content-length
17465
x-amz-id-2
PuDDgzwCEreeWa9jCqxopTliCdGbSIFq3MMKdZKQttdHry9qD8vIXFkbsO/1owUimlj+TkooQmo=
x-served-by
cache-hhn4058-HHN
last-modified
Mon, 24 Jan 2022 22:13:54 GMT
server
AmazonS3
x-timer
S1649941851.745538,VS0,VE0
date
Thu, 14 Apr 2022 13:10:50 GMT
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
2034
sodar
pagead2.googlesyndication.com/getconfig/
14 KB
10 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2022040701&st=env
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
bb8c5dbd0f81ac8de594e2b6fcd5c3d10d5882eba6436f9c2aaa407669916cd5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
10517
x-xss-protection
0
/
www.zdnet.com/components/breaking-news/xhr/
1 KB
1 KB
XHR
General
Full URL
https://www.zdnet.com/components/breaking-news/xhr/?slug=breaking-news-banner
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
4784a7fa28967339052496454ea4229726564e4737ed289acc24d2e12a704d34
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

X-NewRelic-ID
VgEBVlJWCRAGXVRVDwMDUlc=
tracestate
78034@nr=0-1-2767451-695782612-d59b5d05a544a50b----1649941850635
traceparent
00-bbbb2f0d600168e421e1006e988c1fb0-d59b5d05a544a50b-01
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI3Njc0NTEiLCJhcCI6IjY5NTc4MjYxMiIsImlkIjoiZDU5YjVkMDVhNTQ0YTUwYiIsInRyIjoiYmJiYjJmMGQ2MDAxNjhlNDIxZTEwMDZlOTg4YzFmYjAiLCJ0aSI6MTY0OTk0MTg1MDYzNSwidGsiOiI3ODAzNCJ9fQ==
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
X-Requested-With
XMLHttpRequest

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 14 Apr 2022 13:01:08 GMT
vary
Accept-Encoding, User-Agent
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
x-newrelic-app-data
PxQFVlBUDAYBR1dbAgYPVFAFBRFORDQHUjZKA1ZLVVFHDFYPbU5yARBfWA86TFtcXRQODFJfQzkGQ1NSCQ8NBW8MXRVLGhgCHVUJUQFRH1JKBgRRU1oUHgFIQ1ADVAEEBlVSUAEEUlAAAVxAFF5VXkAAZA==
x-frame-options
SAMEORIGIN
date
Thu, 14 Apr 2022 13:10:50 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
c6806abd-a945-4540-88ae-47a4da325f3e
content-type
application/json
via
1.1 varnish
cache-control
max-age=5400, private
accept-ranges
bytes
expires
Thu, 14 Apr 2022 14:31:08 GMT
track-cwv-72dfb3ae38-rev.js
www.zdnet.com/a/fly/js/components/
239 B
335 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/track-cwv-72dfb3ae38-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
9b7909cb9edd007095b41a13617b66208e4210fff9c5e411a7db116efefc8e71
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
199
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:20 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"c3e0520fe2dc05378ab5920300443eab"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 07:01:30 GMT
author-modal-5b949f9436-rev.js
www.zdnet.com/a/fly/js/components/
1 KB
565 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/author-modal-5b949f9436-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
7f1639eeb6e3eb3e2de52c35e650ac2fe53ea34ee8e8cac73807facad51e9b7f
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
435
x-xss-protection
1; mode=block
last-modified
Wed, 13 Apr 2022 14:00:16 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"f351bba683b83a54079aa1ac236a770f"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 21 Apr 2022 04:05:55 GMT
zdnet-video-ea6f24fc09-rev.js
www.zdnet.com/a/fly/js/components/
31 KB
10 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/zdnet-video-ea6f24fc09-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
53bd7793655d078b47da2e0dd784bb15c68ca2b79e0d242ef4f41c5dfa87b0a7
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
9744
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:21 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"3ce674c50e78890c934a4cfc0444e5d0"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 06:27:29 GMT
disqus-loader-f09d8d6993-rev.js
www.zdnet.com/a/fly/js/components/
1 KB
793 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/disqus-loader-f09d8d6993-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
3c591927cc6254cd17a33c78e3293b8456851a88c736b300647f7d263dd31740
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
703
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:20 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"1ca1696fbf503cfcf689ba1696a0e3de"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 11:00:11 GMT
front-door-carousel-dcdcc78ebc-rev.js
www.zdnet.com/a/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/front-door-carousel-dcdcc78ebc-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
0f23aaa9d0fec5942a9907b88ad801ff3eff3abede69bf286d869061201c67fe
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
1651
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:21 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"03423c075cb9004038f51c164238d6a4"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 07:06:50 GMT
/
www.zdnet.com/newsletter/xhr/widget-login/
2 KB
1 KB
XHR
General
Full URL
https://www.zdnet.com/newsletter/xhr/widget-login/?topic=security
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
86abc817b0f43562d7e93d2e152cf0eefce190e7b5cefdbaa904604cb0921e10
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

X-NewRelic-ID
VgEBVlJWCRAGXVRVDwMDUlc=
tracestate
78034@nr=0-1-2767451-695782612-70c4127c86124b44----1649941850643
traceparent
00-60174907b97269dc347aba47736f1d80-70c4127c86124b44-01
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI3Njc0NTEiLCJhcCI6IjY5NTc4MjYxMiIsImlkIjoiNzBjNDEyN2M4NjEyNGI0NCIsInRyIjoiNjAxNzQ5MDdiOTcyNjlkYzM0N2FiYTQ3NzM2ZjFkODAiLCJ0aSI6MTY0OTk0MTg1MDY0MywidGsiOiI3ODAzNCJ9fQ==
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
X-Requested-With
XMLHttpRequest

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
vary
Accept-Encoding, User-Agent
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
x-newrelic-app-data
PxQFVlBUDAYBR1dbAgYPVFAFBRFORDQHUjZKA1ZLVVFHDFYPbU5yARBfWA86TFZWRxcNB0NFUhQ7Rl9XBQMXPUMKVxVnVFtVWgsbTQFPA1JUBgdNVk0IBwJQWE4aABtEXVMPCgEHUVdTUwtbCQFWURFJXwBdElY/
x-frame-options
SAMEORIGIN
date
Thu, 14 Apr 2022 13:10:50 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
64e571fe-a146-4de3-87cd-950ea7ef594a
content-type
application/json
via
1.1 varnish
cache-control
max-age=0, must-revalidate, private
accept-ranges
bytes
expires
Thu, 14 Apr 2022 13:10:50 GMT
dapi-decision-a9bfe572cd-rev.js
www.zdnet.com/a/fly/js/components/
989 B
627 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/dapi-decision-a9bfe572cd-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
6c4dd80172d421bbc901ff35a3244a2014a3d55ecf5b2b4510e486e11adea0d9
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
504
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 14:48:54 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"6b817eea1c2ba417508f334dd848b3da"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 18 Apr 2022 15:47:21 GMT
sodar2.js
tpc.googlesyndication.com/sodar/
17 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
61c32059a5e94075a7ecff678b33907966fc9cfa384daa01aa057f872da14dbb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
6386
x-xss-protection
0
server
sffe
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
etag
"1637097310169751"
vary
Accept-Encoding
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
content-type
text/javascript
cache-control
private, max-age=3000
accept-ranges
bytes
expires
Thu, 14 Apr 2022 13:10:50 GMT
core-web-vitals-16efe3ae21-rev.js
www.zdnet.com/a/fly/js/managers/
545 B
523 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/managers/core-web-vitals-16efe3ae21-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
82f947d14a0a198dfe3cec2fde7896f6e332eb798cc193dad8da9ed2225277cd
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
366
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:21 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"82c725a6ea6974179cc8421b1f30010a"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 11:04:48 GMT
/
www.zdnet.com/dapi-decision/xhr/
24 KB
4 KB
XHR
General
Full URL
https://www.zdnet.com/dapi-decision/xhr/?session=e9384f45-be20-49bd-aa6b-fdd5f276ad98&write=wk_1kYsAdHsx1XVwT5EbX9OQYl4nJM&currentAsset%5Bid%5D=5174bf06-1193-4658-8c63-7bd1f2ed0cbf&currentAsset%5Btitle%5D=Spring4Shell+flaw+is+now+being+used+to+spread+this+botnet+malware&currentAsset%5Bdescription%5D=Hackers+have+started+to+use+the+Spring4Shell+flaw+to+install+Mirai+malware+on+vulnerable+systems.&currentAsset%5Bslug%5D=spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware&currentAsset%5BajaxUrl%5D=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2Fxhr%2F&currentAsset%5Burl%5D=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
d7e89d26d8e099bd21c6ade62f50cf53dd44f4671de17798cbfbe24037de2a80
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

X-NewRelic-ID
VgEBVlJWCRAGXVRVDwMDUlc=
tracestate
78034@nr=0-1-2767451-695782612-6b7cb3a024837b16----1649941850749
traceparent
00-9cce01b87a9f1f48dfd84d0e67cd94a0-6b7cb3a024837b16-01
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjI3Njc0NTEiLCJhcCI6IjY5NTc4MjYxMiIsImlkIjoiNmI3Y2IzYTAyNDgzN2IxNiIsInRyIjoiOWNjZTAxYjg3YTlmMWY0OGRmZDg0ZDBlNjdjZDk0YTAiLCJ0aSI6MTY0OTk0MTg1MDc0OSwidGsiOiI3ODAzNCJ9fQ==
Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
X-Requested-With
XMLHttpRequest

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
x-newrelic-app-data
PxQFVlBUDAYBR1dbAgYPVFAFBRFORDQHUjZKA1ZLVVFHDFYPbU5yARBfWA86TFxSQA0+BlJSXhUNXlhsGg4RQBxSFlIICAQCH1UXUgVRAVJIGwZNRAYIBQcHWAAEAwcDVFMFBFFETwRRDksHZQ==
x-frame-options
SAMEORIGIN
date
Thu, 14 Apr 2022 13:10:51 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
vary
Accept-Encoding, User-Agent
x-tx-id
c7c270d1-7afe-4ba2-962d-57cccee8a85e
content-type
application/json
via
1.1 varnish
cache-control
no-cache, private
accept-ranges
bytes
video-58056d34a8-rev.js
www.zdnet.com/a/fly/js/translations/
704 B
561 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/translations/video-58056d34a8-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
de3450b75712ff6900adf144159d25698de8adc14989f342a6b67be749b78760
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
452
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:21 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"6ef70175f2f4db43b0e31750e4f3d6a1"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 08:20:29 GMT
video-player.js
www.zdnet.com/a/video-player/uvpjs-rv/3.2.1/
933 KB
248 KB
Script
General
Full URL
https://www.zdnet.com/a/video-player/uvpjs-rv/3.2.1/video-player.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
f97926aa27fe2056e80467cdfe9c6bbbc8e628e28467f1bb7c5a4a36a4bfadf4
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
253770
x-xss-protection
1; mode=block
last-modified
Wed, 18 Aug 2021 20:22:22 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"5c5fa9a5d2e282f0d520cd290ff4328d"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=604800
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Thu, 07 Apr 2022 09:08:48 GMT
waypoints.inview.js
www.zdnet.com/a/fly/js/libs/jquery/
3 KB
966 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/libs/jquery/waypoints.inview.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
6965b96e7b7a71a5f93c220862b5ac3397c5c81352ad6b6e47b46a27fb93b4b0
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
829
x-xss-protection
1; mode=block
last-modified
Thu, 07 Apr 2022 16:13:20 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"b05505cf725430b01b35d6cac560df54"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 18 Apr 2022 12:14:50 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/225/ Frame AC00
13 KB
5 KB
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
55a119c0394f901a8a297e109c17b5e5402689708b999ab10691c16179f32a4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
age
45
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control
public, max-age=31536000
content-encoding
gzip
content-length
5046
content-type
text/html
cross-origin-opener-policy
same-origin; report-to="adspam-signals-scs"
cross-origin-resource-policy
cross-origin
date
Thu, 14 Apr 2022 13:10:05 GMT
expires
Fri, 14 Apr 2023 13:10:05 GMT
last-modified
Mon, 21 Jun 2021 20:47:05 GMT
report-to
{"group":"adspam-signals-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/adspam-signals-scs"}]}
server
sffe
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
aframe
www.google.com/recaptcha/api2/ Frame E5F9
783 B
534 B
Document
General
Full URL
https://www.google.com/recaptcha/api2/aframe
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
f44f55370ef70f5d49ba500f7e6344b465dcc60c2d68a55035378cb749422560
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-lV2KeNTmewHSY0LmmPaDMQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control
private, max-age=300
content-encoding
gzip
content-length
512
content-security-policy
script-src 'report-sample' 'nonce-lV2KeNTmewHSY0LmmPaDMQ' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri https://csp.withgoogle.com/csp/recaptcha/1
content-type
text/html; charset=utf-8
cross-origin-embedder-policy
require-corp
cross-origin-resource-policy
cross-origin
date
Thu, 14 Apr 2022 13:10:50 GMT
expires
Thu, 14 Apr 2022 13:10:50 GMT
report-to
{"group":"recaptcha","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/recaptcha"}]}
server
GSE
x-content-type-options
nosniff
x-xss-protection
1; mode=block
show-hide-1.0-2b8cfc35ab-rev.js
www.zdnet.com/a/fly/js/components/
2 KB
973 B
Script
General
Full URL
https://www.zdnet.com/a/fly/js/components/show-hide-1.0-2b8cfc35ab-rev.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
1a703d617fb31d56238372d5bf78e9861b3a09b7447a0184bd5f1c178461ed12
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
content-encoding
gzip
vary
Accept-Encoding, Accept
content-length
710
x-xss-protection
1; mode=block
last-modified
Mon, 11 Apr 2022 16:42:20 GMT
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"7596e199bb50686bbad7927e78fc2c25"
strict-transport-security
max-age=31536000
content-type
application/javascript
via
1.1 varnish
cache-control
max-age=604800,no-transform
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 19 Apr 2022 06:43:07 GMT
jCkUzW4MJun-Op3iOFNjK-GGKJG_m8_dpwU-GZUxlWM.js
pagead2.googlesyndication.com/bg/ Frame AC00
35 KB
13 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/bg/jCkUzW4MJun-Op3iOFNjK-GGKJG_m8_dpwU-GZUxlWM.js
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8c2914cd6e0c26e9fe3a9de23853632be1862891bf9bcfdda7053e1995319563
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 12:00:10 GMT
content-encoding
br
x-content-type-options
nosniff
age
4240
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/botguard-scs
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13627
x-xss-protection
0
last-modified
Mon, 11 Apr 2022 15:48:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="botguard-scs"
vary
Accept-Encoding
report-to
{"group":"botguard-scs","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/botguard-scs"}]}
content-type
text/javascript
cache-control
public, max-age=31536000
accept-ranges
bytes
expires
Fri, 14 Apr 2023 12:00:10 GMT
sodar
pagead2.googlesyndication.com/pagead/ Frame E5F9
0
0
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/sodar?id=sodar2&v=225&li=gpt_2022040701&jk=3464019518719246&rc=
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.google.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

generate_204
tpc.googlesyndication.com/ Frame AC00
0
10 B
Image
General
Full URL
https://tpc.googlesyndication.com/generate_204?9fUGNA
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:810::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tpc.googlesyndication.com/sodar/sodar2/225/runner.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:50 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/1/
49 B
1 KB
Script
General
Full URL
https://bam-cell.nr-data.net/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1215.1253ab8&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=7245&ck=1&ref=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/&ap=184&be=381&fe=6701&dc=1050&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1649941843873,%22n%22:0,%22f%22:6,%22dn%22:35,%22dne%22:37,%22c%22:37,%22s%22:53,%22ce%22:76,%22rq%22:76,%22rp%22:340,%22rpe%22:394,%22dl%22:344,%22di%22:1050,%22ds%22:1050,%22de%22:1051,%22dc%22:6700,%22l%22:6701,%22le%22:6728%7D,%22navigation%22:%7B%7D%7D&fp=834&fcp=995&at=GkEWQAhCSx5HAxIDThwe&jsonp=NREUM.setToken
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dac715f087720dd7ff7067f5d2ec1988851fa93140ae8a9cbfaa15659dd7fd82

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

Date
Thu, 14 Apr 2022 13:10:51 GMT
Content-Encoding
gzip
CF-Cache-Status
DYNAMIC
NEL
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
Transfer-Encoding
chunked
Cross-Origin-Resource-Policy
cross-origin
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Connection
keep-alive
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=wG3X0HMdMyI3iYr5FFww%2B0wEDPnlsXe9fvNFytq7zTUWnHhPbEi5zzB4ZwzuvhiM3VYcwEJpcrgdbf2OiMwU1%2BPiHH2wLKnwoIVhG%2BQNrPtUf96QtbRe4M1daaHF14cweeNTaB59"}],"group":"cf-nel","max_age":604800}
Content-Type
text/javascript
Access-Control-Allow-Origin
*
access-control-allow-credentials
true
CF-Ray
6fbcaf19cda29070-FRA
getty-hacker-hands-on-a-keyboard.jpg
www.zdnet.com/a/img/resize/820bec160ecff7f1b2c171b925d42237d63d2e72/2022/02/16/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d/
6 KB
6 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/820bec160ecff7f1b2c171b925d42237d63d2e72/2022/02/16/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d/getty-hacker-hands-on-a-keyboard.jpg?width=170&height=128&fit=crop&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
9d2cbdc6cf9191b94d365dace4a4bbb7e5a106f1d715a6a087756b1cbb5e0e0c
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=1266146 idim=2002x1497 ifmt=jpeg ofsz=6330 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
6330
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"4Se3yVrqfT+ahhMntQ82NNAgxLAvjCKnmdp/WcAvCaw"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Wed, 06 Apr 2022 22:02:01 GMT
istock-worried-woman-using-a-smartphone.jpg
www.zdnet.com/a/img/resize/000cbda6c10c029bfd1d69d99e21feeeaf363e45/2020/09/24/165bfe7b-df67-48b2-bd03-21b60e4db339/
4 KB
4 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/000cbda6c10c029bfd1d69d99e21feeeaf363e45/2020/09/24/165bfe7b-df67-48b2-bd03-21b60e4db339/istock-worried-woman-using-a-smartphone.jpg?width=170&height=128&fit=crop&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
aeb99c3592904e3bd4ca2e7c33dab4f9d61412134cab16a1b7024df772aa31aa
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=192023 idim=2121x1414 ifmt=jpeg ofsz=3740 odim=170x128 ofmt=webp
x-goog-meta-x-goog-reserved-source-generation
1600946847854981
fastly-stats
io=1
content-length
3740
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"BRS6FXjDzbA6Pm9dQdRL8S6vldOt7pSHBUfq5b6jDy0"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Mon, 04 Apr 2022 06:08:01 GMT
vmware.jpg
www.zdnet.com/a/img/resize/2cdaabcdc212e1a784a8eaea602b431dbfe94e5e/2022/01/11/6005ba87-2a82-4d5d-a352-f25e33a510c0/
3 KB
3 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/2cdaabcdc212e1a784a8eaea602b431dbfe94e5e/2022/01/11/6005ba87-2a82-4d5d-a352-f25e33a510c0/vmware.jpg?width=170&height=128&fit=crop&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
87b75065ff550a459d1b41b72d39c4e116603f9b5b7d52364bfca925b2c544e5
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=569602 idim=1600x1069 ifmt=jpeg ofsz=2676 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
2676
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"0kA4/QWxtNdZDqpH5GO0iPrXX0VKfvJMUn+DWs+h6Cw"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Wed, 30 Mar 2022 13:05:46 GMT
hacker-hands-typing-on-a-keyboard.jpg
www.zdnet.com/a/img/resize/080a87ee8fce5456a5a5eb1ed806014a5f93e1e0/2021/12/06/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195/
3 KB
3 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/080a87ee8fce5456a5a5eb1ed806014a5f93e1e0/2021/12/06/65e99cdf-bb9a-43e6-b9f2-7bbcfab2c195/hacker-hands-typing-on-a-keyboard.jpg?width=170&height=128&fit=crop&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
8e6a6df79eaea627135cdc90fa96a9855768113ec5eb5ff1e214c25a2e8d4e43
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=1098648 idim=2121x1414 ifmt=jpeg ofsz=2636 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
2636
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"TC42MZhi8KMSmKUpH4zdFFTEb2J9BDX6i3N6BuSjpxs"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Tue, 15 Mar 2022 02:12:40 GMT
global-cybersecurity-cyberattack-network-gps.jpg
www.zdnet.com/a/img/resize/04e8b2868a95aeb9ec5624568453c0e9cc9c8cf0/2021/08/02/9500e900-070f-49e2-b214-e088fa9e3f9b/
7 KB
7 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/04e8b2868a95aeb9ec5624568453c0e9cc9c8cf0/2021/08/02/9500e900-070f-49e2-b214-e088fa9e3f9b/global-cybersecurity-cyberattack-network-gps.jpg?width=170&height=128&fit=crop&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
02041c86be905726395b1b2e1e63482de89f04a8c1a33d42d8336a7958c11500
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=97780 idim=1067x600 ifmt=jpeg ofsz=6940 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
6940
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"Hdm4aiOVFlevUSWc7GT5KciBADiSKKfwW+NliZzewq0"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Mon, 28 Mar 2022 13:13:47 GMT
getty-a-woman-looking-at-a-laptop-with-a-concerned-expression.jpg
www.zdnet.com/a/img/resize/c4a7d4d5f05929b8803a5ede541a3eea746dbfc2/2022/04/11/3af9f479-c716-4fed-8d06-5abd74b79a86/
4 KB
5 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/c4a7d4d5f05929b8803a5ede541a3eea746dbfc2/2022/04/11/3af9f479-c716-4fed-8d06-5abd74b79a86/getty-a-woman-looking-at-a-laptop-with-a-concerned-expression.jpg?width=170&height=128&fit=crop&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
2677802222e5c79b2c050f8ea7e2bdbfeb2ab9b6daff4556b26e9fffb6561ab8
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=990754 idim=2121x1414 ifmt=jpeg ofsz=4510 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
4510
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"M8ljQMxdZxSABKPEc2A9+/SZ4hc6w4HQdbNQLq6jYLY"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Mon, 11 Apr 2022 11:42:47 GMT
zd-ultimate-pyhon.jpg
www.zdnet.com/a/img/resize/c424bd41c8216b698311aa40120becf486f934f6/2022/04/05/8975db3d-3cef-4288-8740-a1d5a115763f/
4 KB
4 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/c424bd41c8216b698311aa40120becf486f934f6/2022/04/05/8975db3d-3cef-4288-8740-a1d5a115763f/zd-ultimate-pyhon.jpg?width=170&height=128&fit=crop&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
54da0496a0cc1aceb2b31ac3a614ec27bbf8097c3532f6a4165c92eb654a8924
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=159813 idim=1200x800 ifmt=jpeg ofsz=4208 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
4208
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"ezq+ALz6FUS3B1AAsTt08Yj5lg+sIWKsZ/4W/I7tuTA"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Fri, 08 Apr 2022 22:30:31 GMT
samsung-galaxy-a53-5g.png
www.zdnet.com/a/img/resize/954f8da71028d80bb45e8b98758317d753f353e4/2022/03/17/f16ba3f2-01b5-4cfc-a3ef-787c8bf71033/
2 KB
2 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/954f8da71028d80bb45e8b98758317d753f353e4/2022/03/17/f16ba3f2-01b5-4cfc-a3ef-787c8bf71033/samsung-galaxy-a53-5g.png?width=170&height=128&fit=crop&format=pjpg&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
bcad190baf662a4f4c5a41fa7ae477621fa639a9a65ba2db92277f14317f7de6
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=1145159 idim=3372x1992 ifmt=png ofsz=1646 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
1646
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"A4yRQ72ynUbYAEtE/9fg4bQ7AC8ndWou7hWS2e8vA9A"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Thu, 31 Mar 2022 19:31:21 GMT
screenshot-2022-03-31-at-14-29-42.png
www.zdnet.com/a/img/resize/dd5f8eda8b113c491a83e81afb7c52047638b33f/2022/03/31/8391a496-9eb0-460e-b3a6-2988b7b39ee3/
2 KB
2 KB
Image
General
Full URL
https://www.zdnet.com/a/img/resize/dd5f8eda8b113c491a83e81afb7c52047638b33f/2022/03/31/8391a496-9eb0-460e-b3a6-2988b7b39ee3/screenshot-2022-03-31-at-14-29-42.png?width=170&height=128&fit=crop&format=pjpg&auto=webp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:4c::666 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
ContentServer /
Resource Hash
fd2c3d875363973b45c18fee3ab67642b37c651b755452ebac1839f46bc00d45
Security Headers
Name Value
Content-Security-Policy default-src https://*.zdnet.com:*
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Thu, 14 Apr 2022 13:10:51 GMT
via
1.1 varnish
vary
Accept-Encoding, Accept
fastly-io-info
ifsz=188173 idim=1356x672 ifmt=png ofsz=1748 odim=170x128 ofmt=webp
fastly-stats
io=1
content-length
1748
x-xss-protection
1; mode=block
server
ContentServer
x-frame-options
SAMEORIGIN
etag
"p8Sgi8AJGVajApoBJS9hkH/ScoL41bQlbwNwXc06I5s"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
max-age=31536000
content-security-policy
default-src https://*.zdnet.com:*
accept-ranges
bytes
expires
Tue, 05 Apr 2022 12:37:51 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
20 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=225&t=2&li=gpt_2022040701&jk=3464019518719246&bg=!Q0ClQATNAAZvJBiFTyQ7ACkAdvg8Wi_4ULucZ3q8Sx1Ti_mGPdT9BYKO4eHXfCl6dApB0U8IsXyE1wIAAABfUgAAAAJoAQcKAEb6cJjEjHe2uRzNX0ED2IJFFnqVPAbUrSpNjjRAMpI2uoK4pstgQqsrVV2AYU0IQ324-WgASOfx7IfA7WQYKnWorKEuHgu_mQKT9PXzBday7KXEPBmwdaINKq3nQsfwy2S7i8DW39UQlONE2jK4pUnX-ms7x_-7xHh5_IfhiMHq1w20AA7utSEIQFE91DZzvcACEpy_u5AMXrk2WetuSzLbD3VvjxT-J97qdcoK8-UrrUrGbhzXriy-tRvMTbvWX8MW0JJ5irJhJICOckslJFObnBblcfbyKX5X2NwnJcDEEm3rM8n2NlA-LNHnMXqMleMFAn_9vUzzPDAAMmirJ7UWcl-gr405NLxKP7Z8g4trV_OG4ftnguLfOWv_nwcWdNfno2HbTGtOKTcYkgrhmctTlB0LiqiMkGvWOyH0fFpDWsqp1RBdi9RXh5R0vyO_UeotPOmHEkgaJsXdw3ZfAEIBXLF2vbemrU9t_Ci94FLc5-HQqeJAeArY1u0IF61cGggfBD27UTkeV1wZ7b-LDXzj06-_qLv48ZA296LSUF9BxaqB8E1ontQzCJOVosO7GBfYLFXlc_xuYT1k0WsVUWkIn9oVCcwm_XQGmI-ojh4hSpx5omee-abfvRhKhP_GXoiCJWNeRUxm8t-GZDLL84Gj5QAxKjzDQLRoVtC1x7-uip8e8pYFPhktb8JfQeHWRNu-1AXmjJmGys-867kz1bA1-mYAu79yMc18NAItYAq9PdzvURMM_JsDVwOw2O5wV0HI7nIr4yCZFJCd4jmY1EDe9GX1anSLKhPNFVKaROWVC7hCicapjsjpbPyzL675oX4VHA9KgeEGYvJMfwurJdAc1OtLPP2txDQdgJwvc9eXsBFKnOmiAca5CTYHKXITmAGVaJXdfyzu2yVCp11BWoM3WAGmo-wwyb7JOGS28RL-CDHe1tcWpRSacuQ44HaneFbT9iws0uERrqVPLAA
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:827::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:51 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cache-control
no-cache, must-revalidate
cross-origin-resource-policy
cross-origin
content-type
image/gif
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
684dd32e.akstat.io/
0
0

/
684dd32e.akstat.io/
0
0

pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=nav&zMoatvguid=-&zMoatptype=-&zMoatsl=nav-ad-plus-leader%3FT-1000&g=4&h=87&w=168&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1&gp=1&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=910337326107&rx=82318069005&cu=1649941847143&m=6922&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=1&ag=5169&an=1041&gi=1&gf=5169&gg=1041&ix=5169&ic=5169&ez=1&ck=1041&kw=865&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5169&bx=1041&ci=1041&jz=865&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4996&cd=865&ah=4996&am=865&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=5&jm=-1&tc=0&fs=197910&na=305459632&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:54 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:54 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&g=4&h=600&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&cu=1649941847143&m=6932&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=1&ag=5127&an=1202&gi=1&gf=5127&gg=1202&ix=5127&ic=5127&ez=1&ck=1202&kw=1011&aj=1&pg=100&pf=100&ib=1&cc=1&bw=5127&bx=1202&ci=1202&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4937&cd=1011&ah=4937&am=1011&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=5&jm=-1&tc=0&fs=197910&na=1580268227&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:54 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:54 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=middle&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-middle%3FT-1000&g=1&h=250&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=425126416796&rx=82318069005&cu=1649941847143&m=7138&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5115&cd=15&ah=5115&am=15&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=3&jm=-1&tc=0&fs=197910&na=1381079005&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:54 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:54 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=bottom&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-bottom%3FLL%7CT-1000&g=1&h=250&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1050&gp=2080.84375&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=899989888913&rx=82318069005&cu=1649941847143&m=7139&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=2080.84375&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5100&cd=165&ah=5100&am=165&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=3&jm=-1&tc=0&fs=197910&na=722386787&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:54 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:54 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=nav&zMoatvguid=-&zMoatptype=-&zMoatsl=nav-ad-plus-leader%3FT-1000&g=5&h=87&w=168&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1&gp=1&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=910337326107&rx=82318069005&cu=1649941847143&m=11790&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=1&ag=10038&an=5169&gi=1&gf=10038&gg=5169&ix=10038&ic=10038&ez=1&ck=1041&kw=865&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10038&bx=5169&ci=1041&jz=865&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9866&cd=4996&ah=9866&am=4996&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=5&jm=-1&tc=0&fs=197910&na=1592057045&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:58 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:58 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&g=5&h=600&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&cu=1649941847143&m=11993&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=1&ag=10198&an=5127&gi=1&gf=10198&gg=5127&ix=10198&ic=10198&ez=1&ck=1202&kw=1011&aj=1&pg=100&pf=100&ib=1&cc=1&bw=10198&bx=5127&ci=1202&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10008&cd=4937&ah=10008&am=4937&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=5&jm=-1&tc=0&fs=197910&na=1526598344&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:59 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsimgad%2F12292965368575836593%3Fsqp%3D4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4%26rs%3DAOga4qms813sT0Epg_A-hxkWXTAjJyRC7Q&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&g=6&h=600&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&cu=1649941847143&m=12195&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=1&ag=10400&an=10198&gi=1&gf=10400&gg=10198&ix=10400&ic=10400&ez=1&ck=1202&kw=1011&aj=1&pg=100&pf=100&ib=1&cc=1&bw=10400&bx=10198&ci=1202&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10210&cd=10008&ah=10210&am=10008&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=5&jm=-1&tc=0&fs=197910&zsqp=4sqPyQQ7QjkqNxABHQAAtEIgASgBMAk4A0DwkwlYAWBfcAKAAQGIAQGdAQAAgD-oAQGwAYCt4gS4AV_FAS2ynT4&zrs=AOga4qms813sT0Epg_A-hxkWXTAjJyRC7Q&na=517792230&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:59 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=middle&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-middle%3FT-1000&g=2&h=250&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=425126416796&rx=82318069005&cu=1649941847143&m=12196&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10186&cd=5115&ah=10186&am=5115&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=3&jm=-1&tc=0&fs=197910&na=1080605327&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:59 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=bottom&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-bottom%3FLL%7CT-1000&g=2&h=250&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1050&gp=2080.84375&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=899989888913&rx=82318069005&cu=1649941847143&m=12196&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=2080.84375&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=0&vx=0%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&aj=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&dj=0&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10171&cd=5100&ah=10171&am=5100&xd=00&rf=0&re=0&wb=1&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&zMoatJS=3%3A-&jk=3&jm=-1&tc=0&fs=197910&na=137199064&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:10:59 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:10:59 GMT
NRBR-a22c617a7b2aab2da1c
bam-cell.nr-data.net/events/1/
24 B
841 B
XHR
General
Full URL
https://bam-cell.nr-data.net/events/1/NRBR-a22c617a7b2aab2da1c?a=695782443&v=1215.1253ab8&to=NgYBNkBYWEEEAURQWg9MIgFGUFlcSgNCTVwCDwY9QVBYVQkH&rst=17246&ck=1&ref=https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300

Request headers

Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
content-type
text/plain

Response headers

Date
Thu, 14 Apr 2022 13:11:01 GMT
CF-Cache-Status
DYNAMIC
NEL
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, HEAD, OPTIONS
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=dv8myg2F84gavS%2FkU8UW6QBZIGvy5wKWt6YB2ccYY419PBN3Cm1Vjt5I3DXG%2Futpr%2BKVvb5pS1fJXuXtv%2BfD3zRMj%2FI92GeFK4LN3HPk5gzEPW%2FE%2FvamBXjdvPGNyhYlzobL%2FeaT"}],"group":"cf-nel","max_age":604800}
access-control-allow-credentials
true
Connection
keep-alive
CF-Ray
6fbcaf580eea9070-FRA
Content-Length
24
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=https%3A%2F%2Fs0.2mdn.net%2Fsimgad%2F9979585427781444304&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=nav&zMoatvguid=-&zMoatptype=-&zMoatsl=nav-ad-plus-leader%3FT-1000&g=6&h=87&w=168&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=1&gp=1&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=910337326107&rx=82318069005&cu=1649941847143&m=16834&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=1&ag=15082&an=10038&gi=1&gf=15082&gg=10038&ix=15082&ic=15082&ez=1&ck=1041&kw=865&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15082&bx=10038&ci=1041&jz=865&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14910&cd=9866&ah=14910&am=9866&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=5&jm=-1&tc=0&fs=197910&na=354392945&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:11:03 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:11:03 GMT
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=3&hp=1&zMoatAdUnit1=aw-zdnet&zMoatAdUnit2=innovation&zMoatAdUnit3=security&wf=1&ra=3&sgs=3&vb=5&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=0&ak=-&i=REDVENTURES_GAM_HEADER1&ol=0&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~tM!90vv9L%24%2FoDb%2FG)lKr%23l9jmUdTfN%5Bqir1fcSC%3AU%3FWOvTh%7CzFK%3F%5B%22l!j%3F%5DV%22%3BU!%2FBwj%5DUG0U20!9%3Am%5EG..%2C*%5D%407%25rxaxcpaO%2BZ%5EhG%22%3ExZq%224%7CQjw%60.%7Bi%3F%5DQZ%2CA2%2BNhloI%40s1%7CZ5*%3FVl%3Fe3%7CqL5%40J%3D%5B987jmPgh_%3CXT%23Vyt9.aS%3B4oD%7D%60%3Fjc!L2LmqMs%3Cex1bxNTK7%2BuCTpY%3CZ.T%5B%2B%22gbzbSSr1r4YvKUntB&tf=1_nMzjG---CSa7H-1SJH-bW7qhB-LRwqH-nMzjG-&vi=111111&rc=1%2C1%2C0%2C3%2C3326192205%2C1%2C4%2C0%2Cprobably%2Cprobably&rb=1-Do%2F9O0QsCUp3NAjXwwClNhIVsVBk9l%2Bd1Ss78ABRGBCPEpCfxlXpQB8EOC0dEk1CVCWz&rs=1-cQYmwN5deFpMDA%3D%3D&sc=1&os=1-uw%3D%3D&qp=10000&is=BBBBB2BBEYBvGl2BBCBBtUTE1RmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7Oxib8MxOtJYHCBdm5kBhIcC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBBBj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNwxBbBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJeRzBqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&to=000&po=1-0020002000002120&vy=ot%24b%5Bh%40%22oD~T_Gr1%3E%3AB%40NVt7%3BY%3EhyMmxNXJZPV8t6%3D%3Dh_GW3r4Aj!L%3E%2BbK0pH%23H&qr=0&ql=%3B%5BpwxnRd%7Dt%3Aal9EU%22y%2F.D%5B5%2F%5BGI%3Fi6%5EB61%2F%3DSqcMr1%7B%2CTu9LJJ(a.P%2B)s1(uA&qo=0&vf=1&vg=100&bq=11&zMoatpos=top&zMoatvguid=-&zMoatptype=-&zMoatsl=mpu-plus-top%3FT-1000&g=7&h=600&w=300&hq=0&hs=0&hu=0&hr=0&ht=1&dnt=0&rm=1&fy=0&gp=0&zGSRS=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&id=1&ii=4&f=0&j=&t=1649941847143&de=356672333922&rx=82318069005&cu=1649941847143&m=16835&ar=3e87cfd1033-clean&iw=f366f1c&cb=0&rd=1&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=3378&le=1&lf=855&lg=1&lh=550&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&pe=1%3A834%3A995%3A6728%3A1050&as=1&ag=15040&an=10400&gi=1&gf=15040&gg=10400&ix=15040&ic=15040&ez=1&ck=1202&kw=1011&aj=1&pg=100&pf=100&ib=1&cc=1&bw=15040&bx=10400&ci=1202&jz=1011&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14851&cd=10210&ah=14851&am=10210&xd=00&rf=0&re=0&wb=2&cl=0&at=0&d=5024496911%3A2870786075%3A5718138840%3A138352803033&bo=aw-zdnet&bd=security&gw=redventuresgamheader644747280705&zMoatOrigSlicer1=undefined&zMoatOrigSlicer2=undefined&zMoatAType=content_article&zMoatTest=zdnet&hv=Standard%20Image%20Ad%20finding%20&ab=1&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&jk=5&jm=-1&tc=0&fs=197910&na=1590194009&cs=0
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.102.30.13 Milan, Italy, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-102-30-13.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 14 Apr 2022 13:11:04 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Thu, 14 Apr 2022 13:11:04 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.zdnet.com
URL
https://www.zdnet.com/service-worker.js
Domain
684dd32e.akstat.io
URL
https://684dd32e.akstat.io/
Domain
684dd32e.akstat.io
URL
https://684dd32e.akstat.io/

Verdicts & Comments Add Verdict or Comment

157 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails object| NREUM object| newrelic function| __nr_require object| OneTrustStub object| cbsoptanon object| soastaTracking object| ZdnetPageVars string| chsn_post_id string| chsn_pageType object| ZdnetFunctions number| BOOMR_lstart object| _sf_async_config number| _sf_startpt object| _cbq object| knownServiceWorkers object| BidBarrel function| uuidv4 object| webVitals string| _cbsotstate function| UUIDv4 string| __tealium_data_guid object| utag_data string| key function| loadMyFinance function| requirejs function| require function| define string| OnetrustActiveGroups string| OptanonActiveGroups object| dataLayer object| otStubData object| BOOMR object| BOOMR_mq function| $ function| jQuery object| Modernizr object| mf function| iFrameResize string| MYFI_SCRIPT_FOLDER function| initializeMyFinance function| requestMyFinanceAds function| initializeInline function| requestInlineAds function| updateMyFinanceAds function| updateInlineAds boolean| MF_OVERWRITE_CONTAINER object| MF_DEBUG_URL object| mfEmbed boolean| mfInitialized string| _mfuuid_ string| chsn_ad_id number| _sf_endpt function| VideoStrategy object| _cbv_strategies object| core object| adFlow object| googletag function| OptanonWrapper object| confiant object| pbjs object| _pbjsGlobals object| mnet object| Optanon object| OneTrust object| CryptoJS object| mPulseApp undefined| easyXDM object| AudEng object| URS object| _Cohesion object| _Preamp object| _Fuse object| _Tagular function| cohesion function| preamp function| fuse function| tagular object| ggeac object| google_tag_data object| google_js_reporting_queue object| adsbygoogle object| viacbs_at function| blankAdCallback function| CbsMoatListener function| moatYieldReady function| setMoatPrebidData function| Waypoint undefined| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken number| google_unique_id object| gaGlobal object| debug object| jQuery183021535442564459073 number| BOOMR_configt object| __Cohesion object| _Taggy function| taggy object| _Monarch function| monarch object| _bmrEvents undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| tagType undefined| pxSrc undefined| moat_px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_67909123 object| Moat#PML#26#1.2 boolean| Moat#EVA object| DOMlessLLDcallback_67909123 object| MoatDataJsonpRequest_67909123 object| moatPrebidApi boolean| isPxlSent object| ampInaboxIframes object| ampInaboxPendingMessages object| ampInaboxPositionObserver object| ampInaboxFrameOverlayManager string| keyName number| BOOMR_onload object| $tealium boolean| searchOpen string| pageType object| GoogleGcLKhOms string| relatedHtml string| cohesionSessionId undefined| _ function| Hls undefined| uuid function| addResizeListener function| removeResizeListener function| Spinner object| uvpjs function| Class object| mpulseUserTiming string| waypointContextKey object| google_image_requests

29 Cookies

Domain/Path Name / Value
www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware Name: pv
Value: 1
www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware Name: zdnet_ad
Value: %7B%22type%22%3A%22gpt%22%2C%22region%22%3A%22aw%22%2C%22subses%22%3A%224%22%2C%22session%22%3A%22a%22%7D
.zdnet.com/ Name: nemo_highlander
Value: dapi:1:a
.zdnet.com/ Name: fly_geo
Value: {"countryCode": "de"}
.zdnet.com/ Name: fly_device
Value: desktop
.zdnet.com/ Name: fly_preferred_edition
Value: eu
.zdnet.com/ Name: fly_default_edition
Value: eu
www.zdnet.com/ Name: _mfuuid_
Value: fc1857dd-4d37-447b-965f-f3627f7e38b5
.zdnet.com/ Name: OptanonConsent
Value: isIABGlobal=false&datestamp=Thu+Apr+14+2022+13%3A10%3A46+GMT%2B0000+(GMT)&version=6.20.0&hosts=&consentId=7eafaa1b-c567-4ec0-924e-9ebd4e0aac27&interactionCount=0&landingPath=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fspring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware%2F&groups=C0001%3A1%2CC0002%3A0%2CC0003%3A0%2CC0004%3A0
.zdnet.com/ Name: arrowImp
Value: true
.zdnet.com/ Name: arrowImpCnt
Value: 1
.zdnet.com/ Name: zdnetSessionStarted
Value: true
.zdnet.com/ Name: zdnetSessionCount
Value: 1
.www.zdnet.com/ Name: chsn_cnsnt
Value: www.zdnet.com%3AC0001
.zdnet.com/ Name: __gads
Value: ID=da015d7ff6ac190e-22f7a9dd76cd0056:T=1649941847:S=ALNI_MaiwKabxt5gYdfzPft-ZshsAhyX4Q
.doubleclick.net/ Name: IDE
Value: AHWqTUnBQ14IHAya8DMThInza_VQS0bq8X1ZoqLPCk1KL4Otc1vqmYu_XzrWkiwt2Fs
.doubleclick.net/ Name: DSID
Value: NO_DATA
.casalemedia.com/ Name: CMID
Value: YlgdWeLIB6wphBUA3OYWHAAA
.casalemedia.com/ Name: CMPS
Value: 3184
.casalemedia.com/ Name: CMPRO
Value: 1134
.simpli.fi/ Name: suid
Value: 6FA984DE78FD490F8BB5FD47ED4692AB
.everesttech.net/ Name: everest_g_v2
Value: g_surferid~YlgdWQAB7ImrmgAZ
.brand-display.com/ Name: _knxq_
Value: 5660610f-fe19-4bab-4050d045.1649941849.0.1649941849.1649941849
.casalemedia.com/ Name: CMRUM3
Value: 2d62581d5a2760CAESECGk-eGx09hE1fya6UMZKkk&f162581d5905a0&5a62581d5905a0&5862581d5905a0&2762581d590b40&bf62581d5905a0&e662581d592760
.casalemedia.com/ Name: CMST
Value: YlgdWWJYHVoA
www.zdnet.com/ Name: viewGuid
Value: ca636edb-1976-477c-a3cd-ee9456e933d3
.zdnet.com/ Name: fly_session
Value: 8ca272bd63d2ddc7a2be7c5a327aeeec
.nr-data.net/ Name: JSESSIONID
Value: f1afe6fe5dcef69b
.zdnet.com/ Name: RT
Value: "z=1&dm=zdnet.com&si=2a1700f8-d450-4eb1-b8db-44a07f961437&ss=l1z0ruld&sl=1&tt=5rc&bcn=%2F%2F684dd32e.akstat.io%2F&ld=6ju"

5 Console Messages

Source Level URL
Text
other warning URL: https://cdn.ampproject.org/rtv/012203150226000/v0/amp-ad-exit-0.1.mjs(Line 1)
Message:
Unrecognized feature: 'attribution-reporting'.
other warning URL: https://cdn.ampproject.org/rtv/012203150226000/v0/amp-ad-exit-0.1.mjs(Line 1)
Message:
Unrecognized feature: 'attribution-reporting'.
other warning URL: https://cdn.ampproject.org/rtv/012203150226000/v0/amp-ad-exit-0.1.mjs(Line 1)
Message:
Unrecognized feature: 'attribution-reporting'.
javascript error URL: https://www.zdnet.com/article/spring4shell-flaw-is-now-being-used-to-spread-this-botnet-malware/
Message:
Access to XMLHttpRequest at 'https://684dd32e.akstat.io/' from origin 'https://www.zdnet.com' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://684dd32e.akstat.io/
Message:
Failed to load resource: net::ERR_FAILED

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

3e7401883c2782a631587bf51e1bde61.safeframe.googlesyndication.com
684dd32e.akstat.io
a.myfidevs.io
a1181.casalemedia.com
ad.doubleclick.net
adservice.google.com
adservice.google.de
at.adtech.redventures.io
bam-cell.nr-data.net
c.go-mpulse.net
cdn.ampproject.org
cdn.cohesionapps.com
cdn.cookielaw.org
cm.g.doubleclick.net
confiant-integrations.global.ssl.fastly.net
dmp.brand-display.com
dsum-sec.casalemedia.com
fonts.googleapis.com
fonts.gstatic.com
geo.moatads.com
geolocation.onetrust.com
googleads.g.doubleclick.net
js-agent.newrelic.com
js-sec.indexww.com
match.adsrvr.org
mb.moatads.com
pagead2.googlesyndication.com
protected-by.clarium.io
px.moatads.com
redventuresgamheader644747280705.s.moatpixel.com
s.amazon-adsystem.com
s0.2mdn.net
securepubads.g.doubleclick.net
ssum-sec.casalemedia.com
static.myfinance.com
sync-tm.everesttech.net
sync.adotmob.com
tpc.googlesyndication.com
um.simpli.fi
urs.zdnet.com
www.google.com
www.googletagservices.com
www.myfinance.com
www.zdnet.com
z.moatads.com
684dd32e.akstat.io
www.zdnet.com
104.102.29.65
104.102.30.13
142.250.186.130
142.250.186.38
151.101.130.49
151.101.193.194
151.101.2.154
151.101.66.137
162.247.243.147
169.50.137.184
18.66.139.72
185.170.60.112
185.183.112.155
209.54.176.128
216.58.212.130
23.35.229.151
2606:4700:10::6814:b944
2606:4700::6810:9540
2a00:1450:4001:800::2002
2a00:1450:4001:800::2003
2a00:1450:4001:80e::2006
2a00:1450:4001:810::2001
2a00:1450:4001:812::200a
2a00:1450:4001:827::2002
2a00:1450:4001:827::2004
2a00:1450:4001:82a::2001
2a00:1450:4001:82b::2002
2a00:1450:4001:830::2002
2a00:1450:4001:831::2002
2a02:26f0:1700:38a::11a6
2a02:26f0:f7:181::11a6
2a04:4e42:4c::666
2a06:98c1:3121::7
3.33.220.150
34.111.151.213
34.120.203.121
34.227.250.239
35.156.67.242
52.208.32.237
63.32.79.217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