URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Submission: On May 17 via automatic, source hackernews

Summary

This website contacted 72 IPs in 6 countries across 55 domains to perform 332 HTTP transactions. The main IP is 2.18.233.143, located in Ascension Island and belongs to AKAMAI-AS - Akamai Technologies, Inc., US. The main domain is www.zdnet.com.
TLS certificate: Issued by GeoTrust RSA CA 2018 on April 23rd 2019. Valid for: a year.
This is the only time www.zdnet.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
5 2.18.233.143 16625 (AKAMAI-AS)
59 2.18.233.149 16625 (AKAMAI-AS)
7 2.19.184.136 20940 (AKAMAI-ASN1)
3 104.111.215.135 16625 (AKAMAI-AS)
4 104.111.214.229 16625 (AKAMAI-AS)
16 2a00:1450:400... 15169 (GOOGLE)
2 52.222.167.165 16509 (AMAZON-02)
2 34.198.36.32 14618 (AMAZON-AES)
1 3 216.58.207.70 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
15 172.217.22.66 15169 (GOOGLE)
14 68.232.35.180 15133 (EDGECAST)
1 151.101.38.133 54113 (FASTLY)
1 104.102.18.225 16625 (AKAMAI-AS)
1 2a02:26f0:f4:... 20940 (AKAMAI-ASN1)
5 2606:4700::68... 13335 (CLOUDFLAR...)
8 2606:4700::68... 13335 (CLOUDFLAR...)
4 16 54.171.224.12 16509 (AMAZON-02)
4 64.30.230.22 6623 (CBSI-1)
3 184.31.90.90 20940 (AKAMAI-ASN1)
2 2606:4700:20:... 13335 (CLOUDFLAR...)
1 2600:9000:204... 16509 (AMAZON-02)
1 18.184.145.163 16509 (AMAZON-02)
2 34.235.53.91 14618 (AMAZON-AES)
1 54.229.236.204 16509 (AMAZON-02)
2 2 104.102.52.135 16625 (AKAMAI-AS)
4 4 34.95.92.78 15169 (GOOGLE)
4 4 2.18.233.201 16625 (AKAMAI-AS)
4 4 34.251.85.190 16509 (AMAZON-02)
4 6 18.185.83.216 16509 (AMAZON-02)
1 4 52.30.113.91 16509 (AMAZON-02)
3 99.80.15.126 16509 (AMAZON-02)
1 23.99.128.52 8075 (MICROSOFT...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2606:4700:20:... 13335 (CLOUDFLAR...)
2 63.32.166.115 16509 (AMAZON-02)
3 52.0.145.219 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a04:4e42::621 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
5 185.33.223.208 29990 (ASN-APPNEXUS)
1 4 66.117.28.68 15224 (OMNITURE)
1 6 23.5.97.37 16625 (AKAMAI-AS)
1 184.31.82.196 20940 (AKAMAI-ASN1)
3 2a03:2880:f01... 32934 (FACEBOOK)
1 2 52.31.188.57 16509 (AMAZON-02)
24 151.101.2.2 54113 (FASTLY)
1 35.227.208.151 15169 (GOOGLE)
2 2 66.117.28.86 15224 (OMNITURE)
1 1 172.217.16.162 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
2 151.101.36.134 54113 (FASTLY)
1 1 172.217.18.2 15169 (GOOGLE)
1 5 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1288:110... 34010 (YAHOO-IRD)
1 18.185.4.39 16509 (AMAZON-02)
2 2a03:2880:f11... 32934 (FACEBOOK)
10 104.111.216.96 16625 (AKAMAI-AS)
6 104.111.230.142 16625 (AKAMAI-AS)
1 104.111.215.35 16625 (AKAMAI-AS)
3 213.19.162.21 26667 (RUBICONPR...)
4 151.101.1.181 54113 (FASTLY)
4 35.177.188.212 16509 (AMAZON-02)
1 3.9.25.189 16509 (AMAZON-02)
13 2a00:1450:400... 15169 (GOOGLE)
3 213.19.162.67 26667 (RUBICONPR...)
1 52.222.167.30 16509 (AMAZON-02)
13 23.210.250.213 16625 (AKAMAI-AS)
2 2a00:1450:400... 15169 (GOOGLE)
1 54.154.175.204 16509 (AMAZON-02)
1 52.59.128.192 16509 (AMAZON-02)
3 52.72.207.232 14618 (AMAZON-AES)
1 52.222.167.189 16509 (AMAZON-02)
1 2a04:4e42::720 54113 (FASTLY)
2 104.101.253.141 16625 (AKAMAI-AS)
1 34.233.1.251 14618 (AMAZON-AES)
332 72
Apex Domain
Subdomains
Transfer
59 cbsistatic.com
zdnet3.cbsistatic.com
zdnet4.cbsistatic.com
zdnet2.cbsistatic.com
zdnet1.cbsistatic.com
1 MB
24 taboola.com
cdn.taboola.com
trc.taboola.com
images.taboola.com
335 KB
24 doubleclick.net
ad.doubleclick.net
securepubads.g.doubleclick.net
cm.g.doubleclick.net
googleads.g.doubleclick.net
189 KB
18 ml314.com
ml314.com
in.ml314.com
32 KB
17 moatads.com
z.moatads.com
geo.moatads.com
px.moatads.com
938 KB
16 googletagservices.com
www.googletagservices.com
414 KB
15 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
526 KB
14 tiqcdn.com
tags.tiqcdn.com
89 KB
13 moatpixel.com
cbsdfp5832910442.s.moatpixel.com
5 KB
12 rubiconproject.com
ads.rubiconproject.com
optimized-by.rubiconproject.com
beacon-eu-ams3.rubiconproject.com
eus.rubiconproject.com
28 KB
9 lightboxcdn.com
www.lightboxcdn.com
api1.lightboxcdn.com
155 KB
9 viglink.com
cdn.viglink.com
api.viglink.com
84 KB
9 sharethrough.com
native.sharethrough.com
platform-cdn.sharethrough.com
btlr.sharethrough.com
b.sharethrough.com
static.sharethrough.com
123 KB
8 cbsi.com
dw.cbsi.com
saa.cbsi.com
rev.cbsi.com
14 KB
7 evidon.com
c.evidon.com
81 KB
6 scorecardresearch.com
sb.scorecardresearch.com
4 KB
6 everesttech.net
pixel.everesttech.net
cm.everesttech.net
3 KB
6 demdex.net
dpm.demdex.net
cbsi.demdex.net
4 KB
6 eyeota.net
ps.eyeota.net
2 KB
6 google.com
adservice.google.com
www.google.com
1 KB
6 google.de
adservice.google.de
www.google.de
976 B
5 adnxs.com
secure.adnxs.com
6 KB
5 zdnet.com
www.zdnet.com
133 KB
4 perfectmarket.com
widget.perfectmarket.com
94 KB
4 crwdcntrl.net
sync.crwdcntrl.net
3 KB
4 mathtag.com
pixel.mathtag.com
2 KB
4 rlcdn.com
idsync.rlcdn.com
1 KB
3 facebook.net
connect.facebook.net
72 KB
3 tru.am
tru.am
beacon.tru.am
14 KB
3 everestjs.net
www.everestjs.net
6 KB
3 go-mpulse.net
c.go-mpulse.net
57 KB
2 google-analytics.com
www.google-analytics.com
18 KB
2 facebook.com
www.facebook.com
323 B
2 disqus.com
zdnet-1.disqus.com
2 KB
2 imrworldwide.com
secure-us.imrworldwide.com
827 B
2 casalemedia.com
as-sec.casalemedia.com
1 KB
2 akstat.io
5f651e64.akstat.io
0211c816.akstat.io
708 B
2 bluekai.com
tags.bluekai.com
2 KB
2 agkn.com
js.agkn.com
d.agkn.com
3 KB
2 betrad.com
l.betrad.com
242 B
1 imgix.net
str-assets.imgix.net
7 KB
1 summerhamster.com
www.summerhamster.com
181 B
1 yieldmanager.com
ad.yieldmanager.com
341 B
1 googleadservices.com
www.googleadservices.com
304 B
1 urbanairship.com
web-sdk.urbanairship.com
17 KB
1 qualtrics.com
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com
13 KB
1 gstatic.com
fonts.gstatic.com
13 KB
1 jsdelivr.net
cdn.jsdelivr.net
1 KB
1 googleapis.com
fonts.googleapis.com
451 B
1 azurewebsites.net
lightboxapi1.azurewebsites.net
600 B
1 adsrvr.org
match.adsrvr.org
527 B
1 akamaihd.net
iicbsi-a.akamaihd.net
262 B
1 cbsinteractive.com
vidtech.cbsinteractive.com
281 KB
1 indexww.com
js-sec.indexww.com
26 KB
0 techrepublic.com Failed
creatives.techrepublic.com Failed
332 55
Domain Requested by
20 zdnet3.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
16 images.taboola.com z.moatads.com
www.googletagservices.com
16 ml314.com 4 redirects tags.tiqcdn.com
ml314.com
www.zdnet.com
z.moatads.com
16 www.googletagservices.com www.zdnet.com
securepubads.g.doubleclick.net
rev.cbsi.com
pagead2.googlesyndication.com
15 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
www.zdnet.com
14 tags.tiqcdn.com zdnet2.cbsistatic.com
tags.tiqcdn.com
14 zdnet1.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
13 cbsdfp5832910442.s.moatpixel.com
13 pagead2.googlesyndication.com optimized-by.rubiconproject.com
pagead2.googlesyndication.com
www.zdnet.com
13 zdnet2.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
12 zdnet4.cbsistatic.com www.zdnet.com
zdnet2.cbsistatic.com
10 z.moatads.com securepubads.g.doubleclick.net
native.sharethrough.com
8 www.lightboxcdn.com www.zdnet.com
www.lightboxcdn.com
7 c.evidon.com www.zdnet.com
c.evidon.com
6 sb.scorecardresearch.com 1 redirects tags.tiqcdn.com
cdn.taboola.com
widget.perfectmarket.com
6 ps.eyeota.net 4 redirects www.zdnet.com
5 geo.moatads.com z.moatads.com
5 googleads.g.doubleclick.net 1 redirects pagead2.googlesyndication.com
5 secure.adnxs.com js-sec.indexww.com
5 cdn.viglink.com tags.tiqcdn.com
www.zdnet.com
5 adservice.google.com www.googletagservices.com
pagead2.googlesyndication.com
5 adservice.google.de www.googletagservices.com
pagead2.googlesyndication.com
5 www.zdnet.com zdnet3.cbsistatic.com
4 b.sharethrough.com
4 trc.taboola.com cdn.taboola.com
4 widget.perfectmarket.com cdn.taboola.com
widget.perfectmarket.com
4 cdn.taboola.com zdnet2.cbsistatic.com
cdn.taboola.com
4 pixel.everesttech.net 1 redirects
4 api.viglink.com cdn.viglink.com
4 dpm.demdex.net 1 redirects www.zdnet.com
tags.tiqcdn.com
4 sync.crwdcntrl.net 4 redirects
4 pixel.mathtag.com 4 redirects
4 idsync.rlcdn.com 4 redirects
4 dw.cbsi.com tags.tiqcdn.com
www.zdnet.com
3 eus.rubiconproject.com www.zdnet.com
3 beacon-eu-ams3.rubiconproject.com www.zdnet.com
3 optimized-by.rubiconproject.com ads.rubiconproject.com
3 ads.rubiconproject.com www.zdnet.com
3 connect.facebook.net tags.tiqcdn.com
connect.facebook.net
3 saa.cbsi.com tags.tiqcdn.com
3 www.everestjs.net tags.tiqcdn.com
www.everestjs.net
3 ad.doubleclick.net 1 redirects www.zdnet.com
3 c.go-mpulse.net www.zdnet.com
c.go-mpulse.net
zdnet1.cbsistatic.com
2 px.moatads.com
2 www.google-analytics.com widget.perfectmarket.com
2 www.facebook.com connect.facebook.net
2 zdnet-1.disqus.com zdnet2.cbsistatic.com
zdnet-1.disqus.com
2 tpc.googlesyndication.com securepubads.g.doubleclick.net
2 cm.everesttech.net 2 redirects
2 secure-us.imrworldwide.com 1 redirects
2 as-sec.casalemedia.com js-sec.indexww.com
2 cbsi.demdex.net tags.tiqcdn.com
2 tags.bluekai.com 2 redirects
2 in.ml314.com ml314.com
2 tru.am tags.tiqcdn.com
tru.am
2 l.betrad.com www.zdnet.com
2 native.sharethrough.com www.zdnet.com
1 str-assets.imgix.net native.sharethrough.com
1 static.sharethrough.com native.sharethrough.com
1 btlr.sharethrough.com native.sharethrough.com
1 platform-cdn.sharethrough.com native.sharethrough.com
1 rev.cbsi.com www.zdnet.com
1 0211c816.akstat.io c.go-mpulse.net
1 www.summerhamster.com
1 ad.yieldmanager.com
1 www.google.de
1 www.google.com 1 redirects
1 www.googleadservices.com 1 redirects
1 cm.g.doubleclick.net 1 redirects
1 web-sdk.urbanairship.com zdnet3.cbsistatic.com
1 zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com tags.tiqcdn.com
1 fonts.gstatic.com www.lightboxcdn.com
1 cdn.jsdelivr.net www.lightboxcdn.com
1 fonts.googleapis.com www.lightboxcdn.com
1 beacon.tru.am tru.am
1 api1.lightboxcdn.com www.lightboxcdn.com
1 lightboxapi1.azurewebsites.net www.lightboxcdn.com
1 5f651e64.akstat.io zdnet1.cbsistatic.com
1 match.adsrvr.org js-sec.indexww.com
1 d.agkn.com js.agkn.com
1 js.agkn.com tags.tiqcdn.com
1 iicbsi-a.akamaihd.net tags.tiqcdn.com
1 vidtech.cbsinteractive.com zdnet2.cbsistatic.com
1 js-sec.indexww.com www.zdnet.com
0 creatives.techrepublic.com Failed
332 85
Subject Issuer Validity Valid
www.cbs.com
GeoTrust RSA CA 2018
2019-04-23 -
2020-07-22
a year crt.sh
cc.cnetcontent.com
DigiCert SHA2 Secure Server CA
2019-04-15 -
2020-07-14
a year crt.sh
*.evidon.com
DigiCert ECC Secure Server CA
2019-02-01 -
2020-05-02
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-05-08 -
2020-03-09
10 months crt.sh
akstat.io
DigiCert SHA2 Secure Server CA
2019-04-16 -
2020-06-14
a year crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-04-30 -
2019-07-23
3 months crt.sh
*.sharethrough.com
Go Daddy Secure Certificate Authority - G2
2018-09-18 -
2019-11-17
a year crt.sh
l.betrad.com
Go Daddy Secure Certificate Authority - G2
2017-04-25 -
2019-06-24
2 years crt.sh
*.doubleclick.net
Google Internet Authority G3
2019-04-16 -
2019-07-09
3 months crt.sh
*.google.com
Google Internet Authority G3
2019-04-30 -
2019-07-23
3 months crt.sh
*.tiqcdn.com
DigiCert SHA2 Secure Server CA
2017-10-25 -
2020-05-13
3 years crt.sh
vidtech.cbsinteractive.com
DigiCert SHA2 High Assurance Server CA
2018-12-13 -
2020-12-17
2 years crt.sh
a248.e.akamai.net
DigiCert ECC Secure Server CA
2018-10-18 -
2019-10-18
a year crt.sh
ssl418259.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-03-02 -
2019-09-08
6 months crt.sh
ssl516460.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-03-16 -
2019-09-22
6 months crt.sh
*.ml314.com
Amazon
2019-03-16 -
2020-04-16
a year crt.sh
*.cbsi.com
DigiCert SHA2 High Assurance Server CA
2017-11-07 -
2021-02-04
3 years crt.sh
www.everestjs.net
DigiCert SHA2 Secure Server CA
2018-10-15 -
2020-10-15
2 years crt.sh
ssl389962.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-04-03 -
2019-10-10
6 months crt.sh
*.agkn.com
RapidSSL RSA CA 2018
2018-06-21 -
2020-09-16
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
www.eyeota.com
COMODO RSA Domain Validation Secure Server CA
2018-02-12 -
2021-02-11
3 years crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
viglink.com
Amazon
2019-02-09 -
2020-03-09
a year crt.sh
*.azurewebsites.net
Microsoft IT TLS CA 4
2017-12-17 -
2019-12-17
2 years crt.sh
saa.cbsi.com
DigiCert SHA2 High Assurance Server CA
2018-05-19 -
2019-08-22
a year crt.sh
*.googleapis.com
Google Internet Authority G3
2019-04-30 -
2019-07-23
3 months crt.sh
f3.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-05-14 -
2020-04-23
a year crt.sh
*.adnxs.com
DigiCert ECC Secure Server CA
2019-01-23 -
2021-03-08
2 years crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.qualtrics.com
DigiCert SHA2 Secure Server CA
2018-10-08 -
2021-01-06
2 years crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-04-22 -
2019-07-21
3 months crt.sh
*.imrworldwide.com
DigiCert SHA2 Secure Server CA
2019-02-25 -
2020-02-25
a year crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-01 -
2019-09-07
5 months crt.sh
*.urbanairship.com
DigiCert ECC Secure Server CA
2018-06-20 -
2020-06-24
2 years crt.sh
*.everesttech.net
DigiCert SHA2 Secure Server CA
2017-04-13 -
2020-04-17
3 years crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2019-04-16 -
2019-07-09
3 months crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2018-03-28 -
2020-04-27
2 years crt.sh
www.google.de
Google Internet Authority G3
2019-04-30 -
2019-07-23
3 months crt.sh
*.ads.yahoo.com
DigiCert SHA2 High Assurance Server CA
2019-01-03 -
2019-07-02
6 months crt.sh
*.summerhamster.com
Let's Encrypt Authority X3
2019-05-08 -
2019-08-06
3 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-02-13 -
2021-02-17
2 years crt.sh
p.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-03-29 -
2021-02-22
2 years crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-04-30 -
2019-07-23
3 months crt.sh
imgix.map.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2018-09-27 -
2019-09-22
a year crt.sh

This page contains 31 frames:

Primary Page: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Frame ID: B05BA00567E99B0A52482F1AC2BCC866
Requests: 235 HTTP requests in this frame

Frame: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Frame ID: 108F01B4521017D475CDF702DA7D5935
Requests: 2 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1558119538851&lv=1
Frame ID: 7498AC9243B7A3DA5A2BF88B957E2E25
Requests: 2 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=321106720&gdpr=&gdpr_consent=&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&bpid=cbsinteractive&c=%7B%22bpid%22%3A%22cbsinteractive%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22-1%22%2C%22brd%22%3A%22-1%22%7D
Frame ID: 5D10E4E5229974E9D781AFE5939FF903
Requests: 1 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=0&prev=0&cb=636937106269530446
Frame ID: 4F69C21DF2689D6E30ECEBA584F76148
Requests: 1 HTTP requests in this frame

Frame: https://cbsi.demdex.net/dest5.html?d_nsid=undefined
Frame ID: 7ABD2CF820ADAE04EA504AB1FADF4F3B
Requests: 1 HTTP requests in this frame

Frame: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox_builder.js?cb=636937106269530446
Frame ID: 23E3B8C9949E41E794F94D8695A697F2
Requests: 3 HTTP requests in this frame

Frame: https://www.everestjs.net/static/pixel_details.html
Frame ID: BFF7D1BFDA4ECF498088CB9DE9D99D09
Requests: 1 HTTP requests in this frame

Frame: https://cbsi.demdex.net/dest5.html?d_nsid=0
Frame ID: D4269F68F087C35E55986C93A7EF9248
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstFKkCc5REMBwEJdZtTuI6JpBeX_C2mUgFSM6z2E88EMA75IrZJj8_7blqJwhecJ5lC9_281N8CESH8W6iMH29P4A_6bKplMQ65JxZCzQmUOWBUg7JAOmvqDG50UQWZoqRsmWvR4ubQPnm-3NDx7oCJ01td-nS4Ru0JT0_FFlIgeGWlIvK4NceoJl5yey6KpQEaHQtOi8LLpdkhHU2n975SoTl_Rgh5WNy3YeH76mINo978jVbliFzVUk2qkeodAzOj&sai=AMfl-YQFhycCsoksqXWhTL5FI7QJexdTA-j8v1tJbP6tzygHw4Y2lsoqRKJvbvKlznaZytbjobDyhygiSVtXkc0az9qWhWZbJX0H633SHtZjLopU-f86_z-9TJp52DU&sig=Cg0ArKJSzNgZ9mYOeQGUEAE&urlfix=1&adurl=
Frame ID: C66E8BAFD56E6C03CB1E381465B05E01
Requests: 12 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvWGLi7anIS2OGPTSEuYyqaVhhq0_XeKmsbhdapGineSxAu2p80i9MmNthgnGPX6qFgKfng9I_vFcW-AJRkoCm7-B08l-ev3VgaByeCDL00uYb2aufXuoA32qIGYSas70ENDflQ0VySNyHD13bR2PtpqXWppbgWETXIDBGWeFPB7r9EfUD-nCNK2Lv4OyUcmetwspnenM49xFzn6SA5Vpv3sx4PpSqOG5_hrJuJaprite2IkIxSixvJUbxAPxl5&sai=AMfl-YQBUu0VeziIPHzZoXkRsBCjRIMbYpdKL2LnYdtVLmV4uMR3dsCTNgkBPVJ38SmYuNlP50FjKwOCSUU7BdzczXxv7BRCtAcKxs7zandsHzJ1ipBQFza5Sluspgc&sig=Cg0ArKJSzDdK-nYRzwoOEAE&urlfix=1&adurl=
Frame ID: E26BD0312E1F5CA50998447C69E9A654
Requests: 7 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuaiEtqgwN21Nngx49RQC23PW9xjp6WruiNynnV1PgBVajoL279PvyU2qXzGHQa-51UM5s7JJC8BJODbgfLdwTCLugYXz-EiYszxbf8XiFhEyer7p-NjQcG5pK-DsuQbaHJvIDI-GVTnv7-d-VMTphRBq5erfKXm5EtO4NPQGyPlJowmaX3UlLR2Tme2_sloIsFcDjM-cW4pHcRAoeuFJ4EABWEU_6JQ_3FOUBPaZ-V2lU5XMSVHRyH1x5SxRg&sai=AMfl-YTxnk5bhYRHyyYz34AydWx78AnkxUb1YhHh64fay7gnA0SIuMU4r5Ke9uZSpxYAAfh67nVLt37O1u6T0lKFSh2IP46Kq0K-lMwPsKHOufssjai5n9e_PMUw7bg&sig=Cg0ArKJSzFMWQMaLf-UqEAE&urlfix=1&adurl=
Frame ID: 843AE5D2A5DBB7EF202314C7DB7D3ABB
Requests: 14 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstx8Qjch0_7kb7RitJJYHi6ZtU_rE6eg9cToECTUk8nfd3qDSd-DAUY5nhM7XH11_k61_M-VKtMAk_Y35Vbzs6NX_WK1PjL1beBn-rsa_lrhaRUbSM5w6jtoG0wYyHxS5jCVLlZXmXkpIKWVYxNdpDojDhXWlXyxi9UoM3tdJ6W3C0PWhpfiQHMZQaoQubrqIR3Cedlwr5spCZmtYGikvug_UK0l4IO0XFfDsjBXakQp85U08SYazIh3Vy-1M0&sai=AMfl-YS-1ii0Q6eEoiNRGsBXSimI4_5zQj1ng6SOKonGihVxMYEVqb0Uv2cd5_ptRaOvU1uiZKEpwYMgkIjd0xq7W7craQJOvhuTg9oEg_rnfgMKuRzCsRjmLL8vOr4&sig=Cg0ArKJSzH8vkLcPtWtZEAE&urlfix=1&adurl=
Frame ID: 17DF942026FF267A91C2D8CC0500E058
Requests: 13 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv1crhPYXFBPooUWcwiH-7AWMftC-vY7gOIDNOZ02bMdpXo7zswtqamBLKraj3_2xOTFxlPxP8_HwfHHkdMqE4EXFPHnQsBpQ0G50xW2czPnk2RaIUFj1bySP1J07wBMRe5ko26ZGwMuVEn1qTzjsgs7CqYUHLXrq8W-fzR6YnGZhekFncaGoZvJdxsxk6XTXhfkmH3xMSh7X8aWrFKjdrmz_p1OW5sczvv5iScNsOsMfqtF1pahjgsvpRz1PCsFPHK&sai=AMfl-YTlpxoW24499XYjYWFUGLX1c6buwv1wyTs_15I5gQBqbLCeE9nZ0vsuQhQmYhirn6xRPA-v-zu6i4C4Z80CK6Ed97D3sNRwovy9iLOTh2GbQT6l57JvlzDbLmE&sig=Cg0ArKJSzOahSf6mE5ECEAE&urlfix=1&adurl=
Frame ID: 30B516E447306198076AF6356CD1ECA7
Requests: 4 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstZr6kdCOrYJkbecCxC8YSxl2oY8eJ2kEmG1n6EjxeLpGhmF0ckWezpdY4Jd9KWVJ0TghQjHOOWKldNMtRcBgp3LxgViTXfGnbG1NfR52zFi5ieFtyl7xjS6RyfMpr29zg8VgwqJCsEbX6LJs-I4zxWbqeFK32Fu9YJv7GGoaYBtVDEBPpPb4gEZZTL7DQHM_USdfcXnu9fM-vWGjeFnI7oi7tlg3ci3vYlzICi98IPox5S-8XjV5uCfefJhBs&sai=AMfl-YQaQROQbHBUZi2-ImIKJbMPGxn4FHBB9gXxVznIqhhxJyJFSub0nxAQDppU_RTEFBdM2ghiXeR4MPct-buGWk4y676eOuiTTC9ZMAk9Yb7vw9zTRu3czKs8NC0&sig=Cg0ArKJSzASQtv1lTbOTEAE&urlfix=1&adurl=
Frame ID: A85D6E58FAD07083D11F874341BCD60F
Requests: 13 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuwPbQKWplBSapqNQVHHjTjjg3eCK50FYnOtitJmz6k2RviPjgZ0LmZ060-VFCGlAFSssWQrTih9lLP0gPL3-4c9WV0OsenjtTzY_5NIRqji-joP4h4XVQVpbUFv38v3jmefIznTXSlfOJgOeHwjMCzhPT--c66OkNkh8sBNEbIZhK5JJxc6uVy6grdwXgDeuxWfUF0uYlJnT_G4LdaUmRG4z0OoTHKljIWt-nBwsZQ1VQFoQadiRDLB7SgQi8J9DWO&sai=AMfl-YRcHEHIa7m67bGArIiDHvC2N3q4W2ps9AxiKkT7xVVM-gMuS6TRLn6VXLxvU-462GV4fLeYH_QGsx0ToXXWW1g2kFzBYl1fWRPga6usZJOtv1QsBNr7UkrlDvc&sig=Cg0ArKJSzHduuJMQ4tKAEAE&urlfix=1&adurl=
Frame ID: AD527C0B6B3FB96DAF947F9CEF8C1E95
Requests: 13 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 268E26BDC4C1C1F2B51F64E8D7375373
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Frame ID: 0C815A5265401783EEFCF3005691D42C
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20190513/r20190131/zrt_lookup.html
Frame ID: E3F59489BB0CF7E2B3FD0B2A41F147AC
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: FDC2830C7A7FC769B1C796EFAD63CB4F
Requests: 1 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Frame ID: 3938047ED8D3C1CA751D210B44D89308
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: C667C566A727DE3194E9CB3EB3B7FE91
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuZjC_KZBjS02fTPbCk3RbvTPYHzyqaHU95tUSKL-G92HJosnLGDxqTviMkiDoxwAhK6XQACn8uU7tJyWVJGK8jbdFUXCDltZU_w2QzIC91A0QE-qAg6yH3WHop6SwsXJ6jxBAImi3Hx_TBJmJtAJlTpPWxOPRafjpxUq4F4Je0UPWLsxlD2_JwbrTSysDDDwfheIsOfeXnJdvuEM4UA0y741N7TJ2mqPdkyWwDKSd9nxXwGgfXblODISwyBORRxLR2&sai=AMfl-YSK_bll5FY0mYi0LBjJAGwhoxR34jdaOQV-qQ25F4oel5dnY9J5j1zdh7wH6mYvTKwlRDv7_ku948ZK2q1dSN9oAfH-okK7GZUeXguJo0fYrjpOaj5OkmdcdXg&sig=Cg0ArKJSzCjFKRQ7GEoCEAE&urlfix=1&adurl=
Frame ID: 9261936100B755D0F9A8C78AFBDD3248
Requests: 3 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstGImnlc_KIKwoyhF-AbbW83udKjjefhSFEOWgJ1yaACIA6WiCWsmukGL82PE5Z1vwyR3nJ-IuZgHL69UnS-qNMnjQ8Q5jrXVZZdMzx55gqikwwiVxZ625nwu-YqvhZ0eGPnR5DdPXy_XYTULcKvHApoLrd7cPn1OrqUDaY8FnVEWVboWFP5PcnQo5PniYtWQSumGnRkWGhSyvDCK72ywpAcfbrCBXijA8vY0QjrUYpvh_p2MccHKBTbG0lsxg1dTY9&sai=AMfl-YQ6Mxb2Ty82gBxnqBU6LFA_gvQkLOdT8xskN8makFfzwNvV59l-tZgrFqN1LT6nbSGXUJnLV-jSSArPrr_cGd-uvmcOKMLc2J3aXq1WR2gQL5U3xLOlxv47ArQ&sig=Cg0ArKJSzESxxyLF8E-REAE&urlfix=1&adurl=
Frame ID: 8593B11D29A88ED023B8F20D0030EBC8
Requests: 3 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Frame ID: DDA95DFAA316DD474455F2150E3670C8
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Frame ID: 49D4B8D1804F2AD9E49F603FB03AD40C
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=418362401&adf=2269224025&w=300&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119543746&bpp=57&bdt=735&fdt=459&idt=460&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=2&ga_vid=631639643.1558119544&ga_sid=1558119544&ga_hid=1970459907&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1062&biw=1585&bih=1200&isw=300&ish=250&ifk=2447955845&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=3832671437&ifi=1&uci=1.kc3b55e558ho&fsb=1&dtd=487
Frame ID: 2413BAB4BEBE4D3B512C66DA0D9DDFA9
Requests: 1 HTTP requests in this frame

Frame: https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
Frame ID: 4ECBE3BF43FEA19274458C44E131A864
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=418362401&adf=2269224024&w=300&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119543905&bpp=35&bdt=885&fdt=484&idt=484&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=1&ga_vid=1097290917.1558119542&ga_sid=1558119544&ga_hid=1305262698&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=2628&biw=1585&bih=1200&isw=300&ish=250&ifk=4270700886&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=3832671437&ifi=1&uci=1.xn71r8w9barl&fsb=1&dtd=494
Frame ID: 5A0059B15570090D88AD5ED6F2905F0F
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=2606246846&adf=2269224026&w=728&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119544184&bpp=13&bdt=1146&fdt=374&idt=374&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=1&ga_vid=1097290917.1558119542&ga_sid=1558119545&ga_hid=2050599694&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=3160&biw=1585&bih=1200&isw=728&ish=90&ifk=813396240&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=4066913089&ifi=1&uci=1.he8ykfzc0t8w&fsb=1&dtd=383
Frame ID: 0C165A03EBB2A84A3C8129AA6AD66A13
Requests: 1 HTTP requests in this frame

Frame: https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
Frame ID: EB0066F73B84255FF2EE29D36057DBEC
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^requirejs$/i

Overall confidence: 100%
Detected patterns
  • env /pbjs/i

Overall confidence: 100%
Detected patterns
  • env /^DISQUS/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i

Overall confidence: 100%
Detected patterns
  • env /^Modernizr$/i

Overall confidence: 100%
Detected patterns
  • env /^optimizely$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i


Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • env /^_?COMSCORE$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

332
Requests

98 %
HTTPS

29 %
IPv6

55
Domains

85
Subdomains

72
IPs

6
Countries

4839 kB
Transfer

13960 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 87
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151474557036867&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151474557036867%26eid=50056 HTTP 302
  • https://ml314.com/csync.ashx?fp=kBqdmx9999O0PB2z&person_id=5978151474557036867&eid=50056
Request Chain 88
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151474557036867 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ3NDU1NzAzNjg2NxAAGg0I84j85gUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=06652056d1b022e1c584d785432d87361b913e625cf7cffd1e4928aee3072adef4cb09cee1a4f8eb&person_id=5978151474557036867&eid=50082
Request Chain 89
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151474557036867%26eid=50220 HTTP 302
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151474557036867%26eid=50220&mm_bnc&mm_bct HTTP 302
  • https://ml314.com/csync.ashx?fp=a9505cde-f987-4a00-adf9-c3fae688917a&person_id=5978151474557036867&eid=50220
Request Chain 90
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151474557036867 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151474557036867 HTTP 302
  • https://ml314.com/csync.ashx?fp=ac8b9248acd8b862d6f5f6677663db3f&eid=50146&person_id=5978151474557036867
Request Chain 91
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif HTTP 302
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2NMFTDO08IebO7TiJUvHUhtpu6tBgANe1mjfolOBsKgc&gdpr=1&gdpr_consent=&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil HTTP 302
  • https://ml314.com/csync.ashx?fp=2NMFTDO08IebO7TiJUvHUhtpu6tBgANe1mjfolOBsKgc&person_id=5978151474557036867&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil HTTP 302
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Request Chain 92
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=5978151474557036867&redir= HTTP 302
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151474557036867&redir=
Request Chain 124
  • https://pixel.everesttech.net/4083/gr?ev_gb=0&url=https%3A%2F%2Fwww.everestjs.net%2Fstatic%2Fpixel_details.html%23google%3D__EFGCK__%26gsurfer%3D__EFGSURFER__%26optout%3D__EFOPTOUT__%26throttleCookie%3D__EFSYNC__%26time%3D__EFTIME__ HTTP 302
  • https://www.everestjs.net/static/pixel_details.html
Request Chain 135
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005086&ns__t=1558119541972&ns_c=UTF-8&c8=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1558119541972&ns_c=UTF-8&c8=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&c9=
Request Chain 144
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp=&ts=compact&rnd=1558119541991 HTTP 302
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp=&ts=compact&rnd=1558119541991&ja=1
Request Chain 160
  • https://cm.everesttech.net/cm HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm&google_sc&ev_rs=1&url=/1x1&google_hm=WE44RWRRQUFCY1RBZVE1cg HTTP 302
  • https://cm.everesttech.net/cm/ax?cookieid=&ev_rs=1&url=/1x1&google_gid=CAESENmy42w23Wvas1w_Lxm_2T4&google_cver=1 HTTP 302
  • https://pixel.everesttech.net/1x1
Request Chain 166
  • https://www.googleadservices.com/pagead/conversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0 HTTP 302
  • https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&ocp_id=dgTfXJyZGoaW3gPRm71A&random=1326425065&sscte=1&crd=&gtd= HTTP 302
  • https://www.google.com/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=1326425065&crd=&cdct=2&is_vtc=1&random=1544863032 HTTP 302
  • https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=1326425065&crd=&cdct=2&is_vtc=1&random=1544863032&ipr=y
Request Chain 182
  • https://ad.doubleclick.net/ddm/trackimp/N1933.273680CBS/B22286505.241190948;dc_trk_aid=438183133;dc_trk_cid=112130342;ord=144980949;dc_lat=;dc_rdid=;tag_for_child_directed_treatment= HTTP 302
  • https://ad.doubleclick.net/ddm/trackimp/N1933.273680CBS/B22286505.241190948;dc_pre=CMiPhM-fo-ICFQL3dwodV_sFaA;dc_trk_aid=438183133;dc_trk_cid=112130342;ord=144980949;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=
Request Chain 312
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151474556677828&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151474556677828%26eid=50056 HTTP 302
  • https://ml314.com/csync.ashx?fp=M52zny9999OXPB2z&person_id=5978151474556677828&eid=50056
Request Chain 313
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151474556677828 HTTP 307
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ3NDU1NjY3NzgyOBAAGg0I-oj85gUSBQjoBxAAQgBKAA HTTP 307
  • https://ml314.com/csync.ashx?fp=&person_id=5978151474556677828&eid=50082
Request Chain 314
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151474556677828%26eid=50220 HTTP 302
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151474556677828%26eid=50220&mm_bnc&mm_bct HTTP 302
  • https://ml314.com/csync.ashx?fp=d2125cde-fa1a-4800-963e-bd7d0b24e73e&person_id=5978151474556677828&eid=50220
Request Chain 315
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151474556677828 HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151474556677828 HTTP 302
  • https://ml314.com/csync.ashx?fp=ac8b9248acd8b862d6f5f6677663db3f&eid=50146&person_id=5978151474556677828
Request Chain 316
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif HTTP 302
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif HTTP 302
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2li2TXibvVdus0yZvh69GBu_-d2_2S3klFjdkjbRAmPE&gdpr=1&gdpr_consent=&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil HTTP 302
  • https://ml314.com/csync.ashx?fp=2li2TXibvVdus0yZvh69GBu_-d2_2S3klFjdkjbRAmPE&person_id=5978151474556677828&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil HTTP 302
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil

332 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
443 KB
99 KB
Document
General
Full URL
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2d1b0e7f1e89a571242a505a8f5805c0ed079568c1a6a649ff988f5f978c3639
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.zdnet.com
:scheme
https
:path
/article/chinese-cyberspies-breached-teamviewer-in-2016/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx
content-type
text/html; charset=UTF-8
cache-control
max-age=5400, private
x-tx-id
ca57ee80-507b-42eb-ab1e-d887545a9f85
x-xss-protection
1; mode=block
x-content-type-options
nosniff
referrer-policy
no-referrer-when-downgrade
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
expires
Fri, 17 May 2019 19:26:20 GMT
last-modified
Fri, 17 May 2019 17:56:20 GMT
content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
x-frame-options
SAMEORIGIN
access-control-allow-origin
https://www.zdnet.com
content-encoding
gzip
accept-ranges
bytes
content-length
100056
date
Fri, 17 May 2019 18:58:57 GMT
set-cookie
fly_device=desktop; expires=Fri, 24-May-2019 18:58:57 GMT; path=/; domain=.zdnet.com; secure fly_geo={"countryCode": "de"}; expires=Fri, 24-May-2019 18:58:57 GMT; path=/; domain=.zdnet.com; secure fly_preferred_edition=eu; path=/; domain=.zdnet.com; secure fly_default_edition=eu; path=/; domain=.zdnet.com; secure
vary
Accept-Encoding, User-Agent
strict-transport-security
max-age=63072000; includeSubDomains; preload
main-597c21009e-rev.css
zdnet3.cbsistatic.com/fly/1695-fly/css/core/
334 KB
61 KB
Stylesheet
General
Full URL
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
20678b15c7871190be19718c88f7b10431be56320dc736ab063aeb1a438edfec

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:57 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:29:04 GMT
server
nginx
etag
W/"5cddc810-53673"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
61961
expires
Fri, 24 May 2019 18:58:57 GMT
controls-1cbb12f9dc-rev.css
zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/
41 KB
7 KB
Stylesheet
General
Full URL
https://zdnet3.cbsistatic.com/fly/css/video/htmlPlayerControls/controls-1cbb12f9dc-rev.css
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0ed63761b0659ef9ac13b1a17eb9c794516c7b9883c10d797025feae821bbc94

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:57 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:29:16 GMT
server
nginx
etag
W/"5cddc81c-a561"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6569
expires
Fri, 24 May 2019 18:58:57 GMT
evidon-sitenotice-tag.js
c.evidon.com/sitenotice/
43 KB
12 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.19.184.136 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-184-136.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
56180e6960fefdfabc7657ad5f63bb830d4cf8494fbfab4b3b5326b5c6a5f09c

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
11560
last-modified
Tue, 30 Apr 2019 22:12:30 GMT
server
Apache
etag
"da85b373221de6023fd70f9bda2ec139:1556662351"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Sat, 18 May 2019 18:58:58 GMT
country.js
c.evidon.com/geo/
260 B
457 B
Script
General
Full URL
https://c.evidon.com/geo/country.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.19.184.136 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-184-136.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f9784f57729f84391b084eed9e944e048f771129d65e9b58f34095fdfba86473

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 22:23:16 GMT
server
Apache
access-control-allow-origin
*
etag
"c1e367d098d326049811561575dbda4a:1527718996"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
status
200
access-control-max-age
86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
content-length
165
snthemes.js
c.evidon.com/sitenotice/425/
79 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/snthemes.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.19.184.136 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-184-136.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f05f427c0a3425f17ce1b199296557b22f8b385c963696f80d588f692364abca

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3992
last-modified
Sun, 18 Nov 2018 21:52:50 GMT
server
Apache
etag
"f23a8c8a532eb957f9790e1985bb8e9c:1542577970"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Sat, 18 May 2019 18:58:58 GMT
settings.js
c.evidon.com/sitenotice/425/zdnet/
15 KB
2 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/zdnet/settings.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.19.184.136 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-184-136.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1b91058b5969c2319ee3f3efb2b91ccf388c64fe22f806e59b0edb43694150d4

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
1239
last-modified
Tue, 28 Aug 2018 21:08:55 GMT
server
Apache
etag
"09891370db88cdd3a58c49f5cd396b85:1535490535"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Sat, 18 May 2019 18:58:58 GMT
truncated
/
917 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d2fe67ecc4354b214728e0a7d75b67536a78f6b575080b589d54a1937fc46b41

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1724d7fd70903754d6f29172f2ac879dc6dab79df6c4c78ed06f45c0f117e15c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ceffb891c3e1891757ead2e7e41497adc13abca0d14d7f58d20e3aa8d5aee108

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1c0ccb11374e2374cb7a52c792ffe07d9203d28d4ad97623bcf27bc58d2513f9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/jpeg
mag-white01.png
zdnet4.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/core/
1 KB
1 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/core/mag-white01.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
69721aa2f1085046c84d1943a1daa0515be8e2f060c21063024ea117789e425c

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:26:28 GMT
server
nginx
etag
W/"5cddc774-4f1"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
936
expires
Fri, 24 May 2019 18:58:58 GMT
Raleway-Bold.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
51 KB
51 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Bold.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9db8bd3e641dc88d54edf476a148e75e29b4e8ccd040cb340404d557578dcfbd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
Origin
https://www.zdnet.com

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
last-modified
Tue, 26 Feb 2019 17:11:40 GMT
server
nginx
access-control-allow-origin
*
etag
"5c75734c-cbf4"
content-type
application/octet-stream
status
200
cache-control
max-age=24701280
accept-ranges
bytes
timing-allow-origin
*
content-length
52212
expires
Thu, 27 Feb 2020 16:26:58 GMT
Raleway-Regular.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
50 KB
51 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Regular.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
66ef1b7581d8ef7b82bfe2ca363a612a479d89b808e2241f68d3e8c75f4f06d4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
Origin
https://www.zdnet.com

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
last-modified
Tue, 26 Feb 2019 17:11:40 GMT
server
nginx
access-control-allow-origin
*
etag
"5c75734c-c974"
content-type
application/octet-stream
status
200
cache-control
max-age=24701230
accept-ranges
bytes
timing-allow-origin
*
content-length
51572
expires
Thu, 27 Feb 2020 16:26:08 GMT
Raleway-ExtraLight.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
50 KB
50 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-ExtraLight.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
c2c432e808e795014171d087ba8abd58d8337f59ad387c08d8a6c6b3c32106fb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
Origin
https://www.zdnet.com

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
last-modified
Tue, 26 Feb 2019 17:11:40 GMT
server
nginx
access-control-allow-origin
*
etag
"5c75734c-c634"
content-type
application/octet-stream
status
200
cache-control
max-age=24701345
accept-ranges
bytes
timing-allow-origin
*
content-length
50740
expires
Thu, 27 Feb 2020 16:28:03 GMT
catalin-cimpanu.jpg
zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/
910 B
1 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/catalin-cimpanu.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ba2fa15976662b87f31dccdd53d415b927f2118760fdafc4ac21dd2c1b234ff3

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"c3829e4116c9d009ce51c32b304b9e46"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=9358407, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
868
teamviewer-logo.jpg
zdnet4.cbsistatic.com/hub/i/2019/05/17/7b6d2296-20fb-404c-8bdb-c5987df3bbb9/9ed16af6d4e9988baa349c88d30c2a74/
22 KB
22 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/2019/05/17/7b6d2296-20fb-404c-8bdb-c5987df3bbb9/9ed16af6d4e9988baa349c88d30c2a74/teamviewer-logo.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
4829f2bfe41e274137eccebc926243b63bae38aa5d0d04e5b09e39db83c8679f

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"1e632c3db5602c1e2639897989497ca5"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=31526793, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
22232
screenshot-2018-11-26-at-19-05-32.png
zdnet4.cbsistatic.com/hub/i/r/2018/11/26/02b285d5-4a60-43a0-9a42-1fa22c9c7203/thumbnail/170x128/f5863af9033d349ae3c9244d9a9d6cf6/
42 KB
42 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/11/26/02b285d5-4a60-43a0-9a42-1fa22c9c7203/thumbnail/170x128/f5863af9033d349ae3c9244d9a9d6cf6/screenshot-2018-11-26-at-19-05-32.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d7bdcd5e1eceaa6e29eb451dbf0c748d2d4863f71af573ce993e8290bdbd9239

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"ee5b912101bea6d7649532c3234c7fce"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004569, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
42997
screenshot-2018-11-25-at-18-46-10.png
zdnet2.cbsistatic.com/hub/i/r/2018/11/25/1315309f-93af-40aa-ae8d-468b6b21b2a8/thumbnail/170x128/83557c0639b4a8027983405b0fd75b70/
36 KB
37 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/11/25/1315309f-93af-40aa-ae8d-468b6b21b2a8/thumbnail/170x128/83557c0639b4a8027983405b0fd75b70/screenshot-2018-11-25-at-18-46-10.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
1b385970b0125346c084e96e75044167f0513fd068ee3a98e546f2698bb63e1d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"1282361fd91dd7d33e973c529627e0a1"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004618, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
37233
screenshot-2018-11-26-at-19-22-53.png
zdnet2.cbsistatic.com/hub/i/r/2018/11/26/7b4b87d6-72de-4f50-ad8a-0c9dd0b51bf5/thumbnail/170x128/a7b45c102b9177ab7e34f1118b05fd60/
10 KB
10 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/11/26/7b4b87d6-72de-4f50-ad8a-0c9dd0b51bf5/thumbnail/170x128/a7b45c102b9177ab7e34f1118b05fd60/screenshot-2018-11-26-at-19-22-53.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
33b6ea04e0217c65b24a23d1b34b3ddf405f47183949731200b4309b1620c25d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"db261d4f615f0e982983be499e57ccda"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004600, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
9939
screenshot-2018-11-26-at-19-16-51.png
zdnet4.cbsistatic.com/hub/i/r/2018/11/26/c9f467ec-7b8c-446d-9a8e-1d742cafd7a5/thumbnail/170x128/4e0a5c0b13b2154ca45eaba8bca53cf5/
40 KB
41 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/11/26/c9f467ec-7b8c-446d-9a8e-1d742cafd7a5/thumbnail/170x128/4e0a5c0b13b2154ca45eaba8bca53cf5/screenshot-2018-11-26-at-19-16-51.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
02675fe5ef9e0a381f3eb2bf8024ebb3dc04f88c376b07d859cf8995e9e89f42

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"8a7591885c84083e68131e312f132f44"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004610, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
41262
screenshot-2018-11-25-at-18-55-38.png
zdnet2.cbsistatic.com/hub/i/r/2018/11/25/14aadb38-8e9e-4b83-91af-e29abd1869d4/thumbnail/170x128/1e6101f4367f015c1f8c57200d70b8da/
55 KB
55 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/11/25/14aadb38-8e9e-4b83-91af-e29abd1869d4/thumbnail/170x128/1e6101f4367f015c1f8c57200d70b8da/screenshot-2018-11-25-at-18-55-38.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
39a6fb5b2f6f6d979513b1e22f40eeab7a66104ad0c0282777997f3a7aadc431

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"4210187346dc0768537a080298c72dbb"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004716, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
56278
fingerprint-scanning-on-blue-technology.jpg
zdnet2.cbsistatic.com/hub/i/r/2018/07/30/1868c84d-49d8-438e-8286-2d3958bbf98d/thumbnail/170x128/cd5c1ba31fc9c1f48e7833ca166d4752/
6 KB
7 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/07/30/1868c84d-49d8-438e-8286-2d3958bbf98d/thumbnail/170x128/cd5c1ba31fc9c1f48e7833ca166d4752/fingerprint-scanning-on-blue-technology.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
3a0d305915107cceb1ceb4c6a1c31c7e27bb926539bb03b6982917f6d3d3432f

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 12:48:21 GMT
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
max-age=31530222
timing-allow-origin
*
content-length
6464
expires
Sat, 16 May 2020 17:22:40 GMT
istock-gdpr-concept-image.jpg
zdnet3.cbsistatic.com/hub/i/r/2017/11/15/be5d1ea8-0ad7-45e6-8588-e2c7eafecd79/thumbnail/170x128/5ddc38d2da60d042c60296b209152fc1/
4 KB
4 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2017/11/15/be5d1ea8-0ad7-45e6-8588-e2c7eafecd79/thumbnail/170x128/5ddc38d2da60d042c60296b209152fc1/istock-gdpr-concept-image.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6100104ca2271908df3ca785ccba3dd6f541cc946cd1c5da649d5958d86e4c6c

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 16 Nov 2017 14:07:24 GMT
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
max-age=31511126
timing-allow-origin
*
content-length
4170
expires
Sat, 16 May 2020 12:04:24 GMT
mds.png
zdnet3.cbsistatic.com/hub/i/r/2019/05/14/b33d4eec-04c9-4906-bacd-63fee294488b/thumbnail/170x128/31c87c3ac44464e05a50d59929f519b0/
13 KB
13 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2019/05/14/b33d4eec-04c9-4906-bacd-63fee294488b/thumbnail/170x128/31c87c3ac44464e05a50d59929f519b0/mds.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
49385a3a50298fd71d36c9e3f3cd109c7dcac6d4447548e2f69b582206ac38f1

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"58efa70ac9501993f69ac68489db09ad"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31284372, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
13266
tutorial-3.png
zdnet1.cbsistatic.com/hub/i/r/2019/05/15/4223ad2d-f3cd-45ba-bad0-0314ceb20e96/thumbnail/170x128/30a1b61d9dff0655ddff2b18921b0d2b/
14 KB
14 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2019/05/15/4223ad2d-f3cd-45ba-bad0-0314ceb20e96/thumbnail/170x128/30a1b61d9dff0655ddff2b18921b0d2b/tutorial-3.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
12211f3e4bea4b3ac08e7d8588fc0d1833ff3200e1cf9053c7af439be2859ced

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"c27181a18d3b30d14d66a1a56c068548"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31298294, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
14102
screenshot-2019-05-17-at-06-33-51.png
zdnet4.cbsistatic.com/hub/i/r/2019/05/17/c2b72d2f-4d1a-4964-98b2-417d9b8094df/thumbnail/170x128/20ff1b1a4edc2606f7d5b300a65e1da1/
43 KB
44 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2019/05/17/c2b72d2f-4d1a-4964-98b2-417d9b8094df/thumbnail/170x128/20ff1b1a4edc2606f7d5b300a65e1da1/screenshot-2019-05-17-at-06-33-51.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
cacd97e92a27caba7044c926c20c8cfbc4f5348bd16898def8354cd0be23c1a1

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"65f97a5d3b797cb062824e3baf8610e0"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31494108, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
44274
ethereum-patch-gap.png
zdnet2.cbsistatic.com/hub/i/r/2019/05/15/2b428d36-1b0f-4c33-b28b-d04edcaecc0f/thumbnail/170x128/62acb55726fae3d192ec8dc7654a4518/
15 KB
15 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2019/05/15/2b428d36-1b0f-4c33-b28b-d04edcaecc0f/thumbnail/170x128/62acb55726fae3d192ec8dc7654a4518/ethereum-patch-gap.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ca983061b23a5c940a76fad3409ba2598437b1e0d55584afaa327007ad8170b1

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"2daa09faf06829a2d97bcde3b8ee2003"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31491845, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
15222
istock000020488045small.jpg
zdnet3.cbsistatic.com/hub/i/r/2015/12/01/11c59253-9a66-47d3-aeed-b71f8527d66f/thumbnail/170x128/c7178369c6573ede9a97cbd31b9e4dc7/
10 KB
10 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2015/12/01/11c59253-9a66-47d3-aeed-b71f8527d66f/thumbnail/170x128/c7178369c6573ede9a97cbd31b9e4dc7/istock000020488045small.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
29b6613173220d0e928eac694b63bae44a94894475d52cfc12a17a5200438e52

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"7476533956dd3568c1d787c5d33a547f"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=31483074, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
10071
screen-shot-2019-04-18-at-3-16-32-pm.png
zdnet3.cbsistatic.com/hub/i/r/2019/04/18/b5f2a384-5ccb-44d1-9a18-95728d1697c0/thumbnail/170x128/207e3e461448ad68983272c318ea2364/
42 KB
42 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2019/04/18/b5f2a384-5ccb-44d1-9a18-95728d1697c0/thumbnail/170x128/207e3e461448ad68983272c318ea2364/screen-shot-2019-04-18-at-3-16-32-pm.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0a35cac6785ba78ceed875685ec1b081db4eb7baa7b24e3bbe692701da9e72ee

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"5dc28a6e4d50ed8679cd2a8c04495ed9"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31483018, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
42528
stackoverflow.jpg
zdnet2.cbsistatic.com/hub/i/r/2019/05/16/5d289a51-ce52-4b75-9429-3bf059334e1b/thumbnail/170x128/2fd90138aee406186f582220866366b9/
3 KB
3 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2019/05/16/5d289a51-ce52-4b75-9429-3bf059334e1b/thumbnail/170x128/2fd90138aee406186f582220866366b9/stackoverflow.jpg
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bb9869d2c7aa0e9762d131894ba6f003a84f208e40da0196756a9d01899f8cc1

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"f0eaf559f89ca17022783964ebe9cdfd"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=31461967, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
3250
require-2.1.2.js
zdnet2.cbsistatic.com/fly/1695-fly/js/libs/
16 KB
6 KB
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f96f203f5605c9f56e7f6f97caf6ea84f122872ec3c5ac1f9037a1b508c706ee

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:28:58 GMT
server
nginx
etag
W/"5cddc80a-3f09"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
6305
expires
Fri, 24 May 2019 18:58:58 GMT
Raleway-Light.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
50 KB
51 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Light.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6de73873dd441f953668e77030299f082e0f3e6335bf944d88d44978162e6609

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
Origin
https://www.zdnet.com

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
last-modified
Tue, 26 Feb 2019 17:11:40 GMT
server
nginx
access-control-allow-origin
*
etag
"5c75734c-c998"
content-type
application/octet-stream
status
200
cache-control
max-age=24701188
accept-ranges
bytes
timing-allow-origin
*
content-length
51608
expires
Thu, 27 Feb 2020 16:25:26 GMT
Raleway-Black.woff2
zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/
50 KB
51 KB
Font
General
Full URL
https://zdnet3.cbsistatic.com/bundles/zdnetcss/fonts/raleway/Raleway-Black.woff2
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
927048ad11de8981ab14882b0cac610a1c194aa991d07247cdbf875032dec422

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
Origin
https://www.zdnet.com

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
last-modified
Tue, 26 Feb 2019 17:11:40 GMT
server
nginx
access-control-allow-origin
*
etag
"5c75734c-c8ec"
content-type
application/octet-stream
status
200
cache-control
max-age=24701321
accept-ranges
bytes
timing-allow-origin
*
content-length
51436
expires
Thu, 27 Feb 2020 16:27:39 GMT
truncated
/
43 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/gif
logo.png
zdnet4.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/core/
4 KB
4 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/core/logo.png
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ff2ae991ac0efdb5ae8b4428ba8555a0aeb0fd94b8014ce290c484242c524097

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:26:28 GMT
server
nginx
etag
W/"5cddc774-1009"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
4128
expires
Fri, 24 May 2019 18:58:58 GMT
en.js
c.evidon.com/sitenotice/425/translations/
312 KB
9 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/425/translations/en.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.19.184.136 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-184-136.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e508064b4fd18b344973093e868867fc17f3893eb715bcc10f91442fbbd5c0b4

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
8545
last-modified
Fri, 05 Apr 2019 22:46:54 GMT
server
Apache
etag
"b0b0a8430b34cb659ee229415ff272f3:1554504414"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Sat, 18 May 2019 18:58:58 GMT
vendorlist.js
c.evidon.com/sitenotice/
126 KB
52 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/vendorlist.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.19.184.136 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-184-136.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cd1d44243c825f1c5b6fece79fb2f3605907af8e9948469e3be7fe265a74e6dc

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
52671
last-modified
Wed, 06 Mar 2019 21:39:02 GMT
server
Apache
etag
"5bddbb4465cdcb7d5352e5dd7b6078cc:1551908342"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Sat, 18 May 2019 18:58:58 GMT
main.default.js
zdnet3.cbsistatic.com/fly/1695-fly/js/
173 KB
60 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bee2a3bfaac9155a8f205f58fd36a070f75ab135808ea524350a391418bce208

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:29:00 GMT
server
nginx
etag
W/"5cddc80c-2b4cf"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
60568
expires
Fri, 24 May 2019 18:58:58 GMT
ls-zdnet.js
js-sec.indexww.com/ht/
85 KB
26 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/ls-zdnet.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.215.135 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-215-135.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
57e1e8e64fe95a0acc0822d690633b9450b26919fcedc32958ebcf7d39393181

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Content-Encoding
gzip
Last-Modified
Fri, 17 May 2019 18:55:29 GMT
Server
Apache
ETag
"763413-15269-58919ed2c1df2"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=3591
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
26184
Expires
Fri, 17 May 2019 19:58:50 GMT
YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
c.go-mpulse.net/boomerang/ Frame 108F
187 KB
55 KB
Script
General
Full URL
https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.214.229 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-214-229.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e0b8436d50fb200de76d7a25cf450ea238cd100197f8e9d462e9228153da873f

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:58 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/javascript;charset=UTF-8
Cache-Control
max-age=604800, s-maxage=604800
Transfer-Encoding
chunked
Connection
keep-alive, Transfer-Encoding
Timing-Allow-Origin
*
gpt.js
www.googletagservices.com/tag/js/
31 KB
11 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
db798d296b529a533608ad27deb384e0247cf762ef44f3e04107ae4bb2be9ba8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"169 / 658 of 1000 / last-modified: 1558022742"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10526
x-xss-protection
0
expires
Fri, 17 May 2019 18:58:58 GMT
sfp.js
native.sharethrough.com/assets/
376 KB
109 KB
Script
General
Full URL
https://native.sharethrough.com/assets/sfp.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.167.165 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-167-165.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
58ab68f31e9f54e5c21c5248964841079b1050f5f9127423f29367469c810e9f

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:34:32 GMT
content-encoding
gzip
last-modified
Tue, 14 May 2019 16:34:09 GMT
server
AmazonS3
age
1486
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=3600
x-amz-cf-pop
FRA54
x-amz-cf-id
vXvTA57KKHFA0Rqq0VmOzd7ZiwzNkUUL1vUrZHrBX2pRGIJwIOZT-A==
via
1.1 1463b274b31e0310acc7c754b8b5a550.cloudfront.net (CloudFront)
expires
Tue, 14 May 2019 17:34:07 GMT
evidon-banner.js
c.evidon.com/sitenotice/
9 KB
3 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-banner.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.19.184.136 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-184-136.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2dc9b5aae95a56d19a3be507330dbfc1c2f97c2c97db4e8a584f013f4bb03c85

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
2563
last-modified
Tue, 30 Apr 2019 22:12:31 GMT
server
Apache
etag
"51d9ffeafa39bf5d24b64fd429b35049:1556662352"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Sat, 18 May 2019 18:58:58 GMT
18863
l.betrad.com/site/v3/425/3445/3/1/2/2/
0
121 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/1/2/2/18863?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.198.36.32 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-198-36-32.compute-1.amazonaws.com
Software
/ Express
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
;ord=1558119538385
ad.doubleclick.net/ddm/ad/wnosywxz/kcjlcxzn/
43 B
495 B
Image
General
Full URL
https://ad.doubleclick.net/ddm/ad/wnosywxz/kcjlcxzn/;ord=1558119538385?
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.70 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f6.1e100.net
Software
cafe /
Resource Hash
9c41ba408efaf3a7a36099370bc814e38b0afd42229fa9e0e6040740620c85c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:58:58 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
43
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
18863
l.betrad.com/site/v3/425/3445/3/4/2/2/
0
121 B
Image
General
Full URL
https://l.betrad.com/site/v3/425/3445/3/4/2/2/18863?consent=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.198.36.32 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-198-36-32.compute-1.amazonaws.com
Software
/ Express
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/
109 B
172 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
172 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
pubads_impl_2019051301.js
securepubads.g.doubleclick.net/gpt/
152 KB
56 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
sffe /
Resource Hash
2b83db827fbd3e671aa2f4628103e8da1f4b96c7e935025b8742e5e7098a6b66
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 May 2019 13:05:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
56606
x-xss-protection
0
expires
Fri, 17 May 2019 18:58:58 GMT
scrolling-mpu-17c739e5e7-rev.js
zdnet3.cbsistatic.com/fly/js/components/
1 KB
782 B
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/scrolling-mpu-17c739e5e7-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
308a64084fd0c823eb8f8b1000feaf70b9cbc45f18fbbcecde55860b089e15c4

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 21 Mar 2019 19:40:09 GMT
server
nginx
etag
W/"5c93e899-4f8"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
575
expires
Fri, 24 May 2019 18:58:58 GMT
require.optional-dependency.js
zdnet4.cbsistatic.com/fly/js/libs/
582 B
520 B
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/require.optional-dependency.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f27c0c9f284c6959dd7db1e768c6e43a518ea650afc69d7a60383f3a963cde7b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:46 GMT
server
nginx
etag
"5b5f4006-246"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
307
expires
Fri, 24 May 2019 18:58:58 GMT
article-cb421c3e5b-rev.js
zdnet4.cbsistatic.com/fly/js/pages/
175 KB
49 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/pages/article-cb421c3e5b-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
1f3e1a6167c8e2cd16640dcfd44eb69c4d00d3f2578e0884c84123973bb824b0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:06:12 GMT
server
nginx
etag
W/"5cddc2b4-2bbfc"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
50277
expires
Fri, 24 May 2019 18:58:58 GMT
config.json
c.go-mpulse.net/api/ Frame 108F
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&d=www.zdnet.com&t=5193732&v=1.571.0&if=&sl=0&si=7vj9qc3lt5t-NaN&plugins=ConfigOverride,Continuity,PageParams,IFrameDelay,AutoXHR,SPA,Angular,Backbone,Ember,History,RT,CrossDomain,BW,PaintTiming,NavigationTiming,ResourceTiming,Memory,CACHE_RELOAD,Errors,TPAnalytics,UserTiming,LOGN&acao=
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.214.229 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-214-229.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c8a8c34f94f7e89484985458401eb2f912432af3df7760967d30fdf370c9a406

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com

Response headers

Date
Fri, 17 May 2019 18:58:58 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
697
waypoints-73f7c94c96-rev.js
zdnet1.cbsistatic.com/fly/js/managers/
293 B
421 B
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/managers/waypoints-73f7c94c96-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
1916ac88ca53ca6fa357cd4eb661206e3c933c24385cc503aade6937ac631f39

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 21 Mar 2019 19:40:16 GMT
server
nginx
etag
"5c93e8a0-125"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
210
expires
Fri, 24 May 2019 18:58:58 GMT
jquery.waypoints.js
zdnet4.cbsistatic.com/fly/js/libs/jquery/
9 KB
3 KB
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/jquery/jquery.waypoints.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
0db1739b6bec8463f52771aaccbd974dde17f5db7c9fe4bb0a8f2c00564d603d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 18 Mar 2019 14:13:00 GMT
server
nginx
etag
W/"5c8fa76c-2267"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
2735
expires
Fri, 24 May 2019 18:58:58 GMT
waypoints.sticky.js
zdnet4.cbsistatic.com/fly/js/libs/jquery/
1 KB
811 B
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/libs/jquery/waypoints.sticky.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
deee21acc86b40fe0cb13584d9b68a15a21f471fcd0523822aa1f5b58b603604

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 18 Mar 2019 14:13:01 GMT
server
nginx
etag
W/"5c8fa76d-4e1"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
604
expires
Fri, 24 May 2019 18:58:58 GMT
utag.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
94 KB
19 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418F) /
Resource Hash
7af07b9bba716f7827b5ce69c6b88c2583138a1930bf892a8c3cd8e5857ee0ce

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 06 May 2019 15:52:23 GMT
server
ECS (fcn/418F)
etag
"573245765"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=300
accept-ranges
bytes
content-length
19691
expires
Fri, 17 May 2019 19:03:58 GMT
CBSI-PLAYER.js
vidtech.cbsinteractive.com/uvpjs/0.42.297/
1 MB
281 KB
Script
General
Full URL
https://vidtech.cbsinteractive.com/uvpjs/0.42.297/CBSI-PLAYER.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.38.133 Amsterdam, Netherlands, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1df152c5f79010dd701eceeabbf5fae49f8b375b625f2a5d7f8a8fbe11b92f2b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
age
1417857
x-cache
HIT, HIT
status
200
content-length
286838
x-amz-id-2
RwwFGuUUYSmg+vS1RPbj1H+B+E4B5kk+hAIhfVWu1wwqvEQprJmMgLypyIoahKVQxKzIbjF04sE=
x-served-by
cache-dca17742-DCA, cache-ams21050-AMS
last-modified
Fri, 01 Feb 2019 18:20:56 GMT
server
AmazonS3
x-timer
S1558119539.788890,VS0,VE0
etag
"eb5dd4ed3dcb7641ebbcb604d7ddb038"
vary
Accept-Encoding
x-amz-request-id
B6CFBFBA531CA0E6
via
1.1 varnish, 1.1 varnish
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
application/javascript
x-cache-hits
3, 3
mpulse-1.0.2.js
zdnet1.cbsistatic.com/fly/js/libs/
12 KB
5 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
763fa0bd7eff816d0a5f8c3e4075f9173a5cebf51a1e2c0d1174f841de10b9dd

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Tue, 04 Sep 2018 19:29:20 GMT
server
nginx
etag
W/"5b8edd10-2fdf"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
4877
expires
Fri, 24 May 2019 18:58:58 GMT
config.json
c.go-mpulse.net/api/v2/
2 KB
1 KB
XHR
General
Full URL
https://c.go-mpulse.net/api/v2/config.json?key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&t=1558119538783&s=e95a8c89516109eb279492524cfbd6d0b95e68af933f2f6d5d4a81edd57e81f2
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.102.18.225 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-102-18-225.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
07d824672fb548370a6d869129d9dd283194def3d5f4b258dd65cbe7b319c79e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
private, max-age=300, stale-while-revalidate=60, stale-if-error=120
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
738
isInternalUser.js
iicbsi-a.akamaihd.net/common/js/esi/
22 B
262 B
Script
General
Full URL
https://iicbsi-a.akamaihd.net/common/js/esi/isInternalUser.js?cb=cbsiInternal
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2a02:26f0:f4::17ca:e549 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
Apache /
Resource Hash
0f91e664ba993207337dbd5b1ab9f156c5f579d99d9b2e1315706815deadd0ae

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:58 GMT
Cache-Control
max-age=196505
Server
Apache
Connection
keep-alive
ETag
"fb25287978f1b619e801f164a2dfd9ea:1473886414"
Content-Length
22
Content-Type
application/x-javascript
vglnk.js
cdn.viglink.com/api/
77 KB
27 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:a00d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e393d6f1feb159d634dbe38eb81cb057690e4527b4013840a45ebd1fd6af82b7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
11FB8925E4F5272A
status
200
content-length
27314
x-amz-id-2
gflpBy8oX71LHMep6/d3A8H4Tigd3x1FHbotSG/Dodj3h6Kbz4kzdoHo5uLVNdyOyjHC7hndTrc=
last-modified
Thu, 28 Mar 2019 16:24:04 GMT
server
cloudflare
etag
"4909064365a1c78485fece2784ca6033"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
4d87d36dcf23c286-FRA
expires
Fri, 17 May 2019 19:28:58 GMT
utag.1779.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
3 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1779.js?utv=ut4.43.201812051842
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4197) /
Resource Hash
cd5e6512fdbb698425174148dba05f72357a3b1944413f8812c55c4025d3d562

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:57 GMT
server
ECS (fcn/4197)
etag
"392561602"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1785
expires
Sat, 01 Jun 2019 18:58:58 GMT
utag.1782.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1782.js?utv=ut4.43.201810291720
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
791b7ff5657f9c41e24adaa1f6f5a4dc51046d292b25b01a5a8d152ff4a951ac

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 29 Oct 2018 17:20:42 GMT
server
ECS (fcn/40FA)
etag
"3447796852"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1071
expires
Sat, 01 Jun 2019 18:58:58 GMT
utag.1787.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
142 KB
48 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FA) /
Resource Hash
bda1cb7a3a648829f00a34741895ec28cf4af2578fb2a52ad865f9b2ce7da87b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 06 May 2019 15:52:22 GMT
server
ECS (fcn/40FA)
etag
"781467878"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
48565
expires
Sat, 01 Jun 2019 18:58:58 GMT
utag.1790.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
956 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1790.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4199) /
Resource Hash
10113bad06fefd5698a45480ffaedd421c6e06f9dbd0d1c772b7128bbea0842d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 01 Aug 2016 14:31:10 GMT
server
ECS (fcn/4199)
etag
"2267415266"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
872
expires
Sat, 01 Jun 2019 18:58:58 GMT
utag.1791.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1791.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4185) /
Resource Hash
7eae865fd7c820936603897a072b7ddd77b2c74e8022160fd19792291a63fac8

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 01 Aug 2016 14:31:10 GMT
server
ECS (fcn/4185)
etag
"3334871598"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1196
expires
Sat, 01 Jun 2019 18:58:58 GMT
utag.1792.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
4 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1792.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40E2) /
Resource Hash
dabf73474662398f4f686a1b3103542f53384dd6241e6ac13f8ba535c6372aff

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Thu, 28 Jul 2016 14:28:47 GMT
server
ECS (fcn/40E2)
etag
"2022868805"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1664
expires
Sat, 01 Jun 2019 18:58:58 GMT
utag.1797.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
967 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1797.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D6) /
Resource Hash
3ff065de0d90b0510727a72c173d05652c30967c5e6561dbf1d82fa077cabb22

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Wed, 25 Jan 2017 20:07:58 GMT
server
ECS (fcn/40D6)
etag
"1907756232"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
883
expires
Sat, 01 Jun 2019 18:58:58 GMT
utag.1800.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
995 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1800.js?utv=ut4.43.201805241512
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A7) /
Resource Hash
e9b3eb7f022396e969766ad5e908b21df0b646c943e149902c64de590e9549d9

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
gzip
last-modified
Mon, 07 Aug 2017 22:40:35 GMT
server
ECS (fcn/41A7)
etag
"3890296134"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
912
expires
Sat, 01 Jun 2019 18:58:58 GMT
lightbox.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 7498
326 B
546 B
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1558119538851&lv=1
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
6283852f515949cc0bbe5d0f8666a2c13d209f3b7235ae7880e7b0804e900649

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
br
cf-cache-status
HIT
cf-bgj
minify
server
cloudflare
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cf-ray
4d87d36e2a5ed6e5-FRA
tag.aspx
ml314.com/
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?1742019
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1782.js?utv=ut4.43.201810291720
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
2bf96ddd3980547587d2dbb32c14e3892b59c5fc8b13b7e8dd14c0f71cf99628

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:58 GMT
Content-Encoding
gzip
Last-Modified
Fri, 17 May 2019 05:37:26 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=38307
Connection
keep-alive
Content-Length
11914
Expires
Sat, 18 May 2019 05:37:26 GMT
ds.js
dw.cbsi.com/js/cbsi/
18 KB
7 KB
Script
General
Full URL
https://dw.cbsi.com/js/cbsi/ds.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1790.js?utv=ut4.43.201805241512
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.230.22 , United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx2-dw-cbsi-xw-ext-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
d696da403b0169c2191d0ec0b0fcdaa85487b21b19fd58f4b1fb5b9edf40b153

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Content-Encoding
gzip
Last-Modified
Wed, 13 Sep 2017 19:06:40 GMT
Server
Apache/2.4.25
ETag
"1917-55916dc13f000"
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=43200, s-maxage=1800
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=80, max=659
Content-Length
6423
Expires
Fri, 17 May 2019 19:28:59 GMT
st.v3.js
www.everestjs.net/static/
17 KB
6 KB
Script
General
Full URL
https://www.everestjs.net/static/st.v3.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.90 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-90.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
35733dd71de077b039d2bac6614c78eb3ab7d3879cb307cc10cc1907d2f61eb6

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:58 GMT
Content-Encoding
gzip
Last-Modified
Tue, 27 Nov 2018 08:53:52 GMT
Server
Apache
ETag
"183a208-4205-57ba196bd494e"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=30494
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5509
Expires
Sat, 18 May 2019 03:27:12 GMT
cbsinteractive.js
tru.am/scripts/custom/
3 KB
1 KB
Script
General
Full URL
https://tru.am/scripts/custom/cbsinteractive.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1797.js?utv=ut4.43.201805241512
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6819:a222 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
885fb8b9c3d2738bd627def3899f26d4d42641bbb868cc99d1fbc16f0ed9f4c6

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:59 GMT
content-encoding
br
cf-cache-status
MISS
status
200
x-guploader-uploadid
AEnB2UoesBChvwT-0ZglkxM_EpoBzZSzZzz0u6axQHI66x1CfhTT9geLp42OboiVWG-s60ErujUH5nsLNkzt-IAgKHiE2nap9g
x-goog-storage-class
REGIONAL
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
last-modified
Tue, 30 Apr 2019 19:32:26 GMT
server
cloudflare
etag
W/"c486c91d1321adf59073588524182108"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=9gbW7g==, md5=xIbJHRMhrfWQc1iFJBghCA==
content-type
text/javascript
x-goog-generation
1556652746634603
cache-control
public, max-age=86400
x-goog-stored-content-length
2725
cf-ray
4d87d36e5ab696aa-FRA
expires
Sat, 18 May 2019 18:58:59 GMT
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1800.js?utv=ut4.43.201805241512
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2043:c600:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bd30ffd9618eaa423abb4c900f4af01cac18be85d75265ba08d87d5230bf85b8

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 00:31:08 GMT
via
1.1 b541956a3e11a8d6bd72d74e925ca434.cloudfront.net (CloudFront)
last-modified
Tue, 04 Dec 2018 22:35:38 GMT
server
AmazonS3
age
151409
etag
"a5442c681a576408c25edbf365995343"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA54
accept-ranges
bytes
content-length
3167
x-amz-cf-id
sFxHdZFpGQw3K2WWm9GaB0hfyQV1tgZ95LdaBoFbQ9S3ef-88U-Gew==
anonc.js
dw.cbsi.com/
73 B
620 B
Script
General
Full URL
https://dw.cbsi.com/anonc.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.230.22 , United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx2-dw-cbsi-xw-ext-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
6bd21aed03dd6795320f5dbd9296d1ea9171a8b1989d5f643fa06d31cf68b446

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Server
Apache/2.4.25
Etag
c/UyElzfBHNOyMqTvhE.1.dw_anonc
P3P
CP="CAO DSP COR CURa ADMa DEVa PSAa PSDa IVAi IVDi CONi OUR OTRi IND PHY ONL UNI FIN COM NAV INT DEM STA"
Cache-control
private, max-age=43200, s-max-age=0
Connection
Keep-Alive
Content-Type
application/javascript
Keep-Alive
timeout=80, max=180
Content-Length
73
Expires
Mon, 05 Jan 1970 12:12:12 GMT
pixel.gif
cdn.viglink.com/images/
43 B
102 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=1&rn=5.576479454973698
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:a00d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
FC48266EBFBBED1E
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
4d87d36e48c1c286-FRA
content-length
43
x-amz-id-2
ZYt0XCJT7TDkEZxleonR2vevsXdGlubVX+eAuuuJz1VDiWmEkPWx+T5VJrqeKqvnN7PBuAS9jqI=
pixel.gif
cdn.viglink.com/images/
43 B
263 B
Image
General
Full URL
https://cdn.viglink.com/images/pixel.gif?ch=2&rn=5.576479454973698
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:a00d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:58 GMT
cf-cache-status
HIT
last-modified
Tue, 10 Feb 2015 03:29:39 GMT
server
cloudflare
x-amz-request-id
FC48266EBFBBED1E
etag
"221d8352905f2c38b3cb2bd191d630b0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=15, must-revalidate
accept-ranges
bytes
cf-ray
4d87d36e48c6c286-FRA
content-length
43
x-amz-id-2
ZYt0XCJT7TDkEZxleonR2vevsXdGlubVX+eAuuuJz1VDiWmEkPWx+T5VJrqeKqvnN7PBuAS9jqI=
user.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 7498
688 KB
120 KB
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox.js?cb=1558119538851&lv=1
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8dd0b9d402d180169e24a61d6217a4ccd4ed87a7ef55792b13cec2ed0143ae9d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 May 2019 18:58:58 GMT
content-encoding
br
cf-cache-status
HIT
content-md5
Mw3/ixDiX/Jfia/lFkxrMQ==
cf-polished
origSize=1068416
status
200
x-ms-lease-status
unlocked
last-modified
Fri, 17 May 2019 17:23:47 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
x-ms-request-id
e300bbc8-a01e-010d-4dd5-0cfc98000000
expires
Sat, 16 May 2020 18:58:58 GMT
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
4d87d36e5afcd6e5-FRA
cf-bgj
minify
Cookie set /
d.agkn.com/iframe/8613/ Frame 5D10
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=321106720&gdpr=&gdpr_consent=&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&bpid=cbsinteractive&c=%7B%22bpid%22%3A%22cbsinteractive%22%2C%22loc%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22-1%22%2C%22brd%22%3A%22-1%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.184.145.163 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-184-145-163.eu-central-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

Host
d.agkn.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

Cache-Control
no-cache, must-revalidate
Content-Type
text/html;charset=UTF-8
Date
Fri, 17 May 2019 18:58:58 GMT
Expires
Sat, 01 Jan 2000 00:00:00 GMT
P3P
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Pragma
no-cache
Server
Apache-Coyote/1.1
Set-Cookie
ab=0001%3A0qGgnSPNN5%2FPlD7P7Er463vbK11fNgps;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAkccDzJHHA8wAAAAAAAg1RAQCADVIBAIA;Max-Age=31536000;domain=agkn.com;path=/
Content-Length
481
Connection
keep-alive
utsync.ashx
ml314.com/
906 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=50070&ct=js&pi=&fp=&clid=&if=0&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&pv=1558119539077_qly43tzl8&bl=en-us&cb=4162647&return=https%3A%2F%2Fdpm.demdex.net%2Fibs%3Adpid%3D22052%26dpuuid%3D%5BPersonID%5D%26redir%3D&ht=&d=&dc=&si=1558119539077_qly43tzl8&cid=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1742019
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
c320af443007f29fa382a7237e5bdbc56f118c47aedbdaf05e9cb4398dcc65aa

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:58:58 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
521
Expires
0
ud.ashx
in.ml314.com/
20 B
698 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=1742019
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1742019
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.53.91 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-53-91.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, no-cache="set-cookie"
Connection
keep-alive
Content-Length
138
Expires
Sat, 18 May 2019 18:58:59 GMT
rid
match.adsrvr.org/track/
109 B
527 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=184216
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.229.236.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-229-236-204.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
93e6a702ed5a7f3f2c85827b5e84ee53ff5ae407b7edd39529362d678da7324b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Fri, 17 May 2019 18:58:59 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.zdnet.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Sun, 16 Jun 2019 18:58:59 GMT
fb_lightbox.2.1.5.css
www.lightboxcdn.com/static/
4 KB
1 KB
Stylesheet
General
Full URL
https://www.lightboxcdn.com/static/fb_lightbox.2.1.5.css?cb=636937106269530446
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0b9028c7ecccf4f31fafcfca176cd6ed38197d7b3d6ea4c107b98af8eecc525b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 May 2019 18:58:59 GMT
content-encoding
br
cf-cache-status
HIT
content-md5
q4B4xYJoZwx9ikt94o1nCA==
cf-polished
origSize=6016
x-ms-meta-cbmodifiedtime
Wed, 10 Apr 2019 18:50:43 GMT
status
200
x-ms-lease-status
unlocked
last-modified
Wed, 10 Apr 2019 19:06:17 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
x-ms-request-id
f6457bb1-c01e-0134-14d5-0cbc3c000000
expires
Sat, 16 May 2020 18:58:59 GMT
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
4d87d3700847d6e5-FRA
cf-bgj
minify
ls.html
www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 4F69
0
0
Document
General
Full URL
https://www.lightboxcdn.com/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=0&prev=0&cb=636937106269530446
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
www.lightboxcdn.com
:scheme
https
:path
/lclst/a1583f50-579b-41d0-8c4e-1cd1790d945c/ls.html?purl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&vid=a1583f50-579b-41d0-8c4e-1cd1790d945c&se=0&prev=0&cb=636937106269530446
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
accept-encoding
gzip, deflate, br
cookie
__cfduid=d4632f02bbaf44078ce59d48b48ec462c1558119538
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

status
200
date
Fri, 17 May 2019 18:58:59 GMT
content-type
text/html
content-md5
xa1/rdPe0J6SwxlD7atkzw==
last-modified
Fri, 17 May 2019 17:23:46 GMT
x-ms-request-id
26dd8af3-501e-0071-14d5-0c27f8000000
x-ms-version
2009-09-19
x-ms-lease-status
unlocked
x-ms-blob-type
BlockBlob
cf-cache-status
HIT
expires
Sat, 16 May 2020 18:58:59 GMT
cache-control
public, max-age=31536000
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
server
cloudflare
cf-ray
4d87d3700863d6e5-FRA
content-encoding
br
t.gif
www.lightboxcdn.com/z9g/
35 B
248 B
Image
General
Full URL
https://www.lightboxcdn.com/z9g/t.gif?c=1558119539196&h=www.zdnet.com&e=p&u=40913
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 May 2019 18:58:59 GMT
cf-cache-status
HIT
content-md5
KNaBTzCeoon4R8ac+RGUxg==
cf-polished
status=not_needed
x-ms-meta-cbmodifiedtime
Tue, 26 Feb 2019 00:59:40 GMT
status
200
content-length
35
x-ms-lease-status
unlocked
last-modified
Tue, 26 Feb 2019 01:15:02 GMT
server
cloudflare
etag
0x8D69B87D5A1B25F
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
x-ms-request-id
7e3e704a-501e-0118-4275-cd3e01000000
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
4d87d3700853d6e5-FRA
cf-bgj
imgq:85
csync.ashx
ml314.com/
Redirect Chain
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151474557036867&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151474557036867%26eid=50056
  • https://ml314.com/csync.ashx?fp=kBqdmx9999O0PB2z&person_id=5978151474557036867&eid=50056
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=kBqdmx9999O0PB2z&person_id=5978151474557036867&eid=50056
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:00 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sat, 18 May 2019 14:59:00 GMT

Redirect headers

Location
https://ml314.com/csync.ashx?fp=kBqdmx9999O0PB2z&person_id=5978151474557036867&eid=50056
Date
Fri, 17 May 2019 18:59:00 GMT
Connection
keep-alive
Content-Length
0
BK-Server
93da
P3P
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
csync.ashx
ml314.com/
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151474557036867
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ3NDU1NzAzNjg2NxAAGg0I84j85gUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=06652056d1b022e1c584d785432d87361b913e625cf7cffd1e4928aee3072adef4cb09cee1a4f8eb&person_id=5978151474557036867&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=06652056d1b022e1c584d785432d87361b913e625cf7cffd1e4928aee3072adef4cb09cee1a4f8eb&person_id=5978151474557036867&eid=50082
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sat, 18 May 2019 14:58:59 GMT

Redirect headers

date
Fri, 17 May 2019 18:58:59 GMT
via
1.1 google
location
https://ml314.com/csync.ashx?fp=06652056d1b022e1c584d785432d87361b913e625cf7cffd1e4928aee3072adef4cb09cee1a4f8eb&person_id=5978151474557036867&eid=50082
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
status
307
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
csync.ashx
ml314.com/
Redirect Chain
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151474557036867%26eid=50220
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151474557036867%26eid=50220&mm_bnc&mm_bct
  • https://ml314.com/csync.ashx?fp=a9505cde-f987-4a00-adf9-c3fae688917a&person_id=5978151474557036867&eid=50220
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=a9505cde-f987-4a00-adf9-c3fae688917a&person_id=5978151474557036867&eid=50220
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sat, 18 May 2019 14:58:59 GMT

Redirect headers

Date
Fri, 17 May 2019 18:58:59 GMT
Server
MT3 1047 bd25af8 master zrh-pixel-x17
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Location
https://ml314.com/csync.ashx?fp=a9505cde-f987-4a00-adf9-c3fae688917a&person_id=5978151474557036867&eid=50220
Cache-Control
no-cache
Connection
keep-alive
Content-Type
image/gif
Content-Length
0
Expires
Fri, 17 May 2019 18:58:58 GMT
csync.ashx
ml314.com/
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151474557036867
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151474557036867
  • https://ml314.com/csync.ashx?fp=ac8b9248acd8b862d6f5f6677663db3f&eid=50146&person_id=5978151474557036867
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=ac8b9248acd8b862d6f5f6677663db3f&eid=50146&person_id=5978151474557036867
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sat, 18 May 2019 14:59:00 GMT

Redirect headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:00 GMT
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Location
https://ml314.com/csync.ashx?fp=ac8b9248acd8b862d6f5f6677663db3f&eid=50146&person_id=5978151474557036867
Cache-Control
no-cache
X-Server
10.26.16.11
Connection
keep-alive
Content-Length
0
Expires
0
match
ps.eyeota.net/
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2NMFTDO08IebO7TiJUvHUhtpu6tBgANe1mjfolOBsKgc&gdpr=1&gdpr_consent=&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil
  • https://ml314.com/csync.ashx?fp=2NMFTDO08IebO7TiJUvHUhtpu6tBgANe1mjfolOBsKgc&person_id=5978151474557036867&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
70 B
171 B
Image
General
Full URL
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
18.185.83.216 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-185-83-216.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:58:59 GMT
Content-Length
70
Content-Type
image/gif

Redirect headers

Date
Fri, 17 May 2019 18:58:59 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
text/html; charset=utf-8
Location
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Cache-Control
private
Connection
keep-alive
Content-Length
168
Expires
Sat, 18 May 2019 14:58:59 GMT
demconf.jpg
dpm.demdex.net/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=22052&dpuuid=5978151474557036867&redir=
  • https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151474557036867&redir=
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151474557036867&redir=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.113.91 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-30-113-91.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v029-0cc182562.edge-irl1.demdex.com 5.53.0.20190510073505 3ms
Pragma
no-cache
X-TID
D0ryjszcQg0=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Pragma
no-cache
X-TID
A475c7AxSV4=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://dpm.demdex.net/demconf.jpg?et:ibs%7cdata:dpid=22052&dpuuid=5978151474557036867&redir=
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
/
5f651e64.akstat.io/
0
354 B
XHR
General
Full URL
https://5f651e64.akstat.io/?h.pg=article&when=1558119539222&t_other=custom4%7C324&d=zdnet.com&h.key=YZ2TK-PC7PJ-K64DL-L53CR-P2G4E&h.d=zdnet.com&h.cr=0c2f70cb10a00e7409b920f6014f5a4f25b82db8&h.t=1558119539021&http.initiator=api&rt.start=api&rt.si=1e807bf8-ac91-4b0e-8958-52e90f17d14d&rt.ss=1558119540140&rt.sl=0&api=1&api.v=2&api.l=js&api.lv=0.0.1
Requested by
Host: zdnet1.cbsistatic.com
URL: https://zdnet1.cbsistatic.com/fly/js/libs/mpulse-1.0.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.214.229 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-214-229.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:00 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Fri, 17 May 2019 18:59:00 GMT
ta-pagesocial-sdk.js
tru.am/scripts/
35 KB
12 KB
Script
General
Full URL
https://tru.am/scripts/ta-pagesocial-sdk.js
Requested by
Host: tru.am
URL: https://tru.am/scripts/custom/cbsinteractive.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6819:a222 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2b8d8ef7fec86e16424f0c6be7f0471a0c29256e074e1336d92876ddb4bc09ff

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:59 GMT
content-encoding
br
cf-cache-status
MISS
status
200
x-guploader-uploadid
AEnB2UqP73GAmf6X6uOMbrwnEdLk0_qwaWyHomc2TxE5dZtfJSpQshsYHqNKIV4ggi8Ew_HGBCEc8NCOsXZqZ2v-c1qQ0wVwAg
x-goog-storage-class
REGIONAL
x-goog-metageneration
1
x-goog-stored-content-encoding
identity
last-modified
Fri, 19 Apr 2019 06:14:55 GMT
server
cloudflare
etag
W/"942d5ae1e512ccdf18813550428dd002"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=O7AZFg==, md5=lC1a4eUSzN8YgTVQQo3QAg==
content-type
application/javascript
x-goog-generation
1555654495662585
cache-control
public, max-age=86400
x-goog-stored-content-length
35540
cf-ray
4d87d370ad6c96aa-FRA
expires
Sat, 18 May 2019 18:58:59 GMT
ping
api.viglink.com/api/
265 B
945 B
XHR
General
Full URL
https://api.viglink.com/api/ping
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.80.15.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-99-80-15-126.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
f9855f0f455f642d184112b73b8989f2c53152d0947c1fdebcabde93f35073ee

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:58:59 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
265
Expires
Thu, 01 Jan 1970 00:00:00 GMT
z
lightboxapi1.azurewebsites.net/z9l/40913/www.zdnet.com/jsonp/
334 B
600 B
Script
General
Full URL
https://lightboxapi1.azurewebsites.net/z9l/40913/www.zdnet.com/jsonp/z?cb=1558119539429&callback=jQuery17104125329849266035_1558119539182&_=1558119539430
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.99.128.52 Des Moines, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation, US),
Reverse DNS
waws-prod-dm1-001.cloudapp.net
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
cbebb7e452013fec5f788347b23207403e07809d4316ecfd44b4ad0c516b6243

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:00 GMT
Content-Encoding
gzip
Transfer-Encoding
chunked
Server
Microsoft-IIS/10.0
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript
z.gif
api1.lightboxcdn.com/z9u/LIewXglgNlCGD0BWAdABgAQApiwMYQDsAXEAZwAsBudASWIFMp0dd0B5AZXQA10BGVAH0-AZkGIAlOgCCAB1lR6AdXoAjANIQiSEQHZkIgGxZ1ACQAqwADIAadFAgBreugDi9XI5BSAwuQBOIAC29PCG-qgGIgCchsgAHLroHLAA...
182 B
574 B
XHR
General
Full URL
https://api1.lightboxcdn.com/z9u/LIewXglgNlCGD0BWAdABgAQApiwMYQDsAXEAZwAsBudASWIFMp0dd0B5AZXQA10BGVAH0-AZkGIAlOgCCAB1lR6AdXoAjANIQiSEQHZkIgGxZ1ACQAqwADIAadFAgBreugDi9XI5BSAwuQBOIAC29PCG-qgGIgCchsgAHLroHLAAZrD-EDr6RkA_XZX/z.gif
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4fa5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / ASP.NET
Resource Hash
16e46fdb34d33ecec9b719da72ea3703f8e641d2d2529971a4bce20a33dd96f5

Request headers

Accept
*/*
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:59 GMT
content-encoding
br
cf-cache-status
HIT
cf-bgj
minify
server
cloudflare
status
200
x-powered-by
ASP.NET
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin,Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=86400
access-control-allow-credentials
true
cf-ray
4d87d371cee096aa-FRA
expires
Sat, 18 May 2019 18:58:59 GMT
c.gif
dw.cbsi.com/clear/
42 B
346 B
Image
General
Full URL
https://dw.cbsi.com/clear/c.gif?rsid=cnetzdnetglobalsite&sid=2&siteid=2&pagetype=article&assetguid=29171f76-766b-4149-941c-e2afcd592c6b&assettitle=chinese%20cyberspies%20breached%20teamviewer%20in%202016&assettype=content_article&pubdate=2019-05-17%2016%3A25%3A16&viewguid=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&devicetype=desktop&sitetype=responsive%20web&author=catalin%20cimpanu&authorid=85fd8691-f525-4ea2-a601-af296f629f7f&topicguid=113c25b6-ec91-11e3-95d2-02911863765e&topic=security&topicbrcrm=security&ts=1558119539399&ld=www.zdnet.com&ldc=fbaadf10-b7e1-4e2b-8566-d875fd609381&brwinsz=1600x1200&brscrsz=1600x1200&brlang=en-US&tcset=utf8&im=dsjs&clgf=c%2FUyElzfBHNOyMqTvhE&srcurl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&title=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.230.22 , United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx2-dw-cbsi-xw-ext-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:58:59 GMT
Server
Apache/2.4.25
Vary
*
Content-Type
image/gif
Cache-control
no-cache, must-revalidate, no-transform
Connection
Keep-Alive
Keep-Alive
timeout=80, max=429
Content-Length
42
Expires
Mon, 05 Jan 1970 12:12:12 GMT
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&ts=1558119539477
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.113.91 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-30-113-91.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
53fa89c5612f8a0652618277c142fcc7fc23ba4d441263b29339d9b783879d4e

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v029-039fe2822.edge-irl1.demdex.com 5.53.0.20190510073505 5ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
Sw/a9KtnR+w=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
745
Expires
Thu, 01 Jan 1970 00:00:00 GMT
utag.v.js
tags.tiqcdn.com/utag/tiqapp/
2 B
139 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/tiqapp/utag.v.js?a=cbsi/zdnetglobalsite/201905061552&cb=1558119539481
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A8) /
Resource Hash
a2c2339691fc48fbd14fb307292dff3e21222712d9240810742d7df0c6d74dfb

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:58:59 GMT
last-modified
Thu, 14 Apr 2016 16:59:33 GMT
server
ECS (fcn/41A8)
etag
"2243872957"
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=600
accept-ranges
bytes
content-length
2
expires
Fri, 17 May 2019 19:08:59 GMT
beacon
beacon.tru.am/
0
335 B
Fetch
General
Full URL
https://beacon.tru.am/beacon
Requested by
Host: tru.am
URL: https://tru.am/scripts/ta-pagesocial-sdk.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6819:a322 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded;charset=UTF-8

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:58:59 GMT
via
1.1 google
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, private, max-age=0
cf-ray
4d87d3725ffd9784-FRA
content-length
0
expires
Thu, 01 Jan 1970 00:00:00 UTC
domains
api.viglink.com/api/
76 B
521 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.80.15.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-99-80-15-126.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
01ddf42d083280b0617ca9499660609f05e2768ad2e3e344397e5588ae1e2093

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:58:59 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
76
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Cookie set dest5.html
cbsi.demdex.net/ Frame 7ABD
0
0
Document
General
Full URL
https://cbsi.demdex.net/dest5.html?d_nsid=undefined
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.32.166.115 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-63-32-166-115.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
cbsi.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Accept-Encoding
gzip, deflate, br
Cookie
demdex=41318234179201470340034653677646396723
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Fri, 17 May 2019 08:55:28 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=41318234179201470340034653677646396723;Path=/;Domain=.demdex.net;Expires=Wed, 13-Nov-2019 18:59:01 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
bRwGiEubSZE=
Content-Length
2764
Connection
keep-alive
id
saa.cbsi.com/
90 B
683 B
XHR
General
Full URL
https://saa.cbsi.com/id?d_visid_ver=2.3.0&d_fieldgroup=A&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&mid=63242468008650688090972604115915535426&ts=1558119540454
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.0.145.219 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-145-219.compute-1.amazonaws.com
Software
Omniture DC /
Resource Hash
bbe89d896160d3b6e7452ee3aeabc3d0a5c618722806ac2ce9dfa5a682a261f9

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Fri, 17 May 2019 18:59:01 GMT
Server
Omniture DC
xserver
www321
Vary
Origin
X-C
ms-6.7.4
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://www.zdnet.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/x-javascript
Content-Length
90
settings.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox/917db656-f725-41c5-a080-58eb92128c48/
8 KB
6 KB
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox/917db656-f725-41c5-a080-58eb92128c48/settings.js?cb=636937106269530446
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
0e47e35915c790fea48e8f43147020db585d33a4cb7ccc0ea3c7f7d1a95126a7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
br
cf-cache-status
HIT
content-md5
aBFSo1n5HaVD4G8zZgF05A==
cf-polished
origSize=8342
status
200
x-ms-lease-status
unlocked
last-modified
Fri, 17 May 2019 17:23:43 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
x-ms-request-id
8aea5157-f01e-0137-5cd5-0cbf3b000000
expires
Sat, 16 May 2020 18:59:01 GMT
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
4d87d37b9bb2d6e5-FRA
cf-bgj
minify
lightbox_builder.js
www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/ Frame 23E3
187 KB
26 KB
Script
General
Full URL
https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox_builder.js?cb=636937106269530446
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
382fe9af56c299ce12c168bb3941f07130a8bf025456f107d6951009f07a31c4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
br
cf-cache-status
HIT
content-md5
xwmsTOlUOAZfS01DXVcBHg==
cf-polished
origSize=304077
status
200
x-ms-lease-status
unlocked
last-modified
Fri, 17 May 2019 17:23:46 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
x-ms-request-id
845a0f95-d01e-006b-4cd5-0c0897000000
expires
Sat, 16 May 2020 18:59:01 GMT
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
cf-ray
4d87d37babcad6e5-FRA
cf-bgj
minify
css
fonts.googleapis.com/ Frame 23E3
783 B
451 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Raleway
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/lightbox_builder.js?cb=636937106269530446
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
a89416b782a74347608f370d41bed91733636e1c3fe8b43f6fff4ab8ab4104d5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Fri, 17 May 2019 18:59:01 GMT
server
ESF
access-control-allow-origin
*
date
Fri, 17 May 2019 18:59:01 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:01 GMT
fancybox_sprite.png
cdn.jsdelivr.net/fancybox/2.1.5/
1 KB
1 KB
Image
General
Full URL
https://cdn.jsdelivr.net/fancybox/2.1.5/fancybox_sprite.png
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::621 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
b9d6fddb0988440902fcfc72f371ecfa80ee2eb36073f9eebc17449ee41c886f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains; preload
x-content-type-options
nosniff
access-control-allow-origin
*
etag
W/"552-F98Z+XYo53vgnDUr8nQl+uokglE"
vary
Accept-Encoding
x-cache
HIT, HIT
content-type
image/png
status
200
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
date
Fri, 17 May 2019 18:59:01 GMT
accept-ranges
bytes
timing-allow-origin
*
content-length
1362
x-served-by
cache-ams21028-AMS, cache-fra19121-FRA
1Ptug8zYS_SKggPNyC0IT4ttDfA.woff2
fonts.gstatic.com/s/raleway/v13/ Frame 23E3
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/raleway/v13/1Ptug8zYS_SKggPNyC0IT4ttDfA.woff2
Requested by
Host: www.lightboxcdn.com
URL: https://www.lightboxcdn.com/vendor/a1583f50-579b-41d0-8c4e-1cd1790d945c/user.js?cb=636937106275406532
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
7e347b66fb1145f780600551e06778b33ecaca5c45897ac90eb96eb4b6afd082
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Raleway
Origin
https://www.zdnet.com

Response headers

date
Mon, 25 Mar 2019 20:22:25 GMT
x-content-type-options
nosniff
last-modified
Mon, 25 Mar 2019 20:12:10 GMT
server
sffe
age
4574196
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
13428
x-xss-protection
1; mode=block
expires
Tue, 24 Mar 2020 20:22:25 GMT
id
dpm.demdex.net/
2 KB
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=2.3.0&d_fieldgroup=AAM&d_rtbd=json&d_ver=2&d_orgid=10D31225525FF5790A490D4D%40AdobeOrg&d_nsid=0&d_mid=63242468008650688090972604115915535426&d_blob=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&d_cid_ic=AVID%012E6F823A852CCC58-400009C8400461E0&ts=1558119541194
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.30.113.91 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-30-113-91.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
8ac3d6ef9d550ecb28c625f3dd782bbd563b69f567221daa9f6873fb1d2e5ebb

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v029-02d6e3b51.edge-irl1.demdex.com 5.53.0.20190510073505 10ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
F/oavzhOSmY=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
744
Expires
Thu, 01 Jan 1970 00:00:00 GMT
s04705680287446
saa.cbsi.com/b/ss/cnetzdnetglobalsite/10/JS-2.3.0/
2 KB
2 KB
Script
General
Full URL
https://saa.cbsi.com/b/ss/cnetzdnetglobalsite/10/JS-2.3.0/s04705680287446?AQB=1&ndh=1&pf=1&callback=s_c_il[0].doPostbacks&et=1&t=17%2F4%2F2019%2018%3A59%3A1%205%200&d.&nsid=0&jsonv=1&.d&mid=63242468008650688090972604115915535426&aid=2E6F823A852CCC58-400009C8400461E0&aamlh=6&ce=UTF-8&ns=cbsinteractive&pageName=zdnet%3A%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&g=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&cc=USD&ch=editorial&server=www.zdnet.com&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&c1=zdnet&v1=zdnet&h1=editorial%7Carticle&l1=teamviewer%7Cmicrosoft&c2=D%3Dv2&v2=eu&l2=113c25b6-ec91-11e3-95d2-02911863765e&c3=D%3Dv3&v3=responsive%20web%7Cdesktop&l3=85fd8691-f525-4ea2-a601-af296f629f7f&c4=D%3Dv4&c5=D%3Dv5&v5=cnetzdnetglobalsite&c6=D%3Dv6&v6=editorial%7Carticle&c7=D%3Dv7&v7=D%3Dg&c8=D%3Dv8&v8=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&c9=D%3DUser-Agent&c10=D%3Dv10&v10=article&c11=D%3Dv11&v15=not%20authenticated%7Canon&c20=D%3Dv20&v20=chinese%20cyberspies%20breached%20teamviewer%20in%202016&c22=D%3Dv22&v22=content_article&c23=D%3Dv23&v23=113c25b6-ec91-11e3-95d2-02911863765e&c24=D%3Dv24&v24=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&c25=D%3Dv25&c26=D%3Dv26&c28=D%3Dv28&c30=D%3Dv30&v30=29171f76-766b-4149-941c-e2afcd592c6b&c31=D%3Dv31&c33=D%3Dv33&c34=D%3Dv34&c35=D%3Dv35&v35=c%2FUyElzfBHNOyMqTvhE&v44=zdnet&c50=D%3Dv50&c51=D%3Dv51&c52=D%3Dv52&c53=D%3Dv53&c54=D%3Dv54&c65=D%3Dv65&v65=discover&c69=D%3Dv69&v85=false&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&mcorgid=10D31225525FF5790A490D4D%40AdobeOrg&AQE=1
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.0.145.219 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-145-219.compute-1.amazonaws.com
Software
Omniture DC /
Resource Hash
e54c3f393ab0ac62d169e1dd3c30950760cbee1cf09e39a0fbdbb36fd90cd8a8

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

X-AAM-TID
2+tIcYIFTzg=
Date
Fri, 17 May 2019 18:59:01 GMT
X-C
ms-6.7.4
P3P
CP="This is not a P3P policy"
Connection
keep-alive
Content-Length
1886
DCS
dcs-prod-irl1-v029-03a4940a2.edge-irl1.demdex.com 5.53.0.20190510073505 8ms
Pragma
no-cache
Last-Modified
Sat, 18 May 2019 18:59:01 GMT
Server
Omniture DC
xserver
www338
ETag
"3346036236013568000-4957453607743278313"
Vary
*
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Expires
Thu, 16 May 2019 18:59:01 GMT
t.gif
www.lightboxcdn.com/z9g/
35 B
99 B
Image
General
Full URL
https://www.lightboxcdn.com/z9g/t.gif?c=1558119541694&h=www.zdnet.com&e=i&u=40913&b=193988&v=empty&s=empty
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:4ea5 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Fri, 17 May 2019 18:59:01 GMT
cf-cache-status
HIT
content-md5
KNaBTzCeoon4R8ac+RGUxg==
cf-polished
status=not_needed
x-ms-meta-cbmodifiedtime
Tue, 26 Feb 2019 00:59:40 GMT
status
200
content-length
35
x-ms-lease-status
unlocked
last-modified
Tue, 26 Feb 2019 01:15:02 GMT
server
cloudflare
etag
0x8D69B87D5A1B25F
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
x-ms-request-id
7e3e704a-501e-0118-4275-cd3e01000000
x-ms-version
2009-09-19
accept-ranges
bytes
cf-ray
4d87d37fa8c6d6e5-FRA
cf-bgj
imgq:85
cygnus
as-sec.casalemedia.com/
66 B
943 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=182823&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A21045137%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22202%22%2C%22siteID%22%3A%22182829%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22220%22%2C%22siteID%22%3A%22183316%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22209%22%2C%22siteID%22%3A%22182828%22%7D%2C%22id%22%3A%223%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22210%22%2C%22siteID%22%3A%22182826%22%7D%2C%22id%22%3A%224%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22208%22%2C%22siteID%22%3A%22182824%22%7D%2C%22id%22%3A%225%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22222%22%2C%22siteID%22%3A%22182825%22%7D%2C%22id%22%3A%226%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22219%22%2C%22siteID%22%3A%22183315%22%7D%2C%22id%22%3A%227%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%22201%22%2C%22siteID%22%3A%22182823%22%7D%2C%22id%22%3A%228%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%2274046a22-60ff-4506-b38a-e66e08421cdb%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222019-05-17T18%3A58%3A59%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.215.135 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-215-135.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
586ffdbd6186660bdc80e51b329575188f9d22820ca2e7653b75407f1a16cd63

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:02 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Fri, 17 May 2019 18:59:02 GMT
jpt
secure.adnxs.com/
99 B
1 KB
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834629&size=728x90&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=TXkLwa4D&psa=0&promo_sizes=970x250&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.208 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
311.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
f2a961be0003fbc163912c7c8dfcee62efb9529b5a59003e5c8e1a06d58cf104
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
X-Proxy-Origin
185.220.70.225; 185.220.70.225; 311.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.43:80
AN-X-Request-Uuid
bec0e80b-d1e3-4216-b6fb-6b38d2cb0fe5
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
99
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
99 B
1 KB
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834625&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=OryLkrRA&psa=0&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.208 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
311.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
8087900fdd60d24724a4f7ea31db136a453a1b50b4cae70d13c634d5a206f60c
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
X-Proxy-Origin
185.220.70.225; 185.220.70.225; 311.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.222.236:80
AN-X-Request-Uuid
a0e337f6-db9e-494a-8b01-57cc259532e4
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
99
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
99 B
1 KB
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834627&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=PKu6vddc&psa=0&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.208 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
311.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
7bdaae9efb510751fa00bb1abcb7ccbfc0be54d3189e8af7b199ff7cad1882cb
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
X-Proxy-Origin
185.220.70.225; 185.220.70.225; 311.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.223.72:80
AN-X-Request-Uuid
4f77f010-36cd-49fa-a1b1-8c14589df29f
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
99
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
99 B
1 KB
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834631&size=300x250&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=ICwBoCzu&psa=0&promo_sizes=300x600&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.208 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
311.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
414cf5da8ffc5e59fc87862fd71886f6ba310fdd35ceda3d671073e1f247f5d1
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
X-Proxy-Origin
185.220.70.225; 185.220.70.225; 311.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.68:80
AN-X-Request-Uuid
8d272b55-ad9d-41fc-ba4e-14d8ccf2ad96
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
99
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
jpt
secure.adnxs.com/
99 B
1 KB
XHR
General
Full URL
https://secure.adnxs.com/jpt?id=11834632&size=728x90&callback=headertag.AppNexusHtb.adResponseCallback&callback_uid=Ne4jl1A7&psa=0&promo_sizes=970x250&referrer=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.223.208 , Netherlands, ASN29990 (ASN-APPNEXUS - AppNexus, Inc, US),
Reverse DNS
311.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.13.4 /
Resource Hash
0cfedffe3184c9637c62a6b165ec080997e1d1cb51988ceabad988550278b74c
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
X-Proxy-Origin
185.220.70.225; 185.220.70.225; 311.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.4:80
AN-X-Request-Uuid
e3a572ba-eb9b-463b-ab95-ccaded6b4424
Server
nginx/1.13.4
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
99
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
vglnk.js
cdn.viglink.com/api/
77 KB
27 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:a00d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e393d6f1feb159d634dbe38eb81cb057690e4527b4013840a45ebd1fd6af82b7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
11FB8925E4F5272A
status
200
content-length
27314
x-amz-id-2
gflpBy8oX71LHMep6/d3A8H4Tigd3x1FHbotSG/Dodj3h6Kbz4kzdoHo5uLVNdyOyjHC7hndTrc=
last-modified
Thu, 28 Mar 2019 16:24:04 GMT
server
cloudflare
etag
"4909064365a1c78485fece2784ca6033"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
4d87d3805faac286-FRA
expires
Fri, 17 May 2019 19:29:01 GMT
utag.1775.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
26 KB
9 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1775.js?utv=ut4.43.201905061552
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/419F) /
Resource Hash
0f4176807e149be9c6cc0e583699fffe630cccb37e57242ce5a7b1f7d63d859d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
last-modified
Thu, 10 Nov 2016 20:41:55 GMT
server
ECS (fcn/419F)
etag
"1112944691"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
8960
expires
Sat, 01 Jun 2019 18:59:01 GMT
utag.277.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
946 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.277.js?utv=ut4.43.201905061552
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F9) /
Resource Hash
0e13cd6845611f0c419398a75b85ba014a7fffb1b9e9575c2e1b4cfefebd0017

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:58 GMT
server
ECS (fcn/40F9)
etag
"461771432"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
863
expires
Sat, 01 Jun 2019 18:59:01 GMT
utag.1772.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
2 KB
1020 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1772.js?utv=ut4.43.201905061552
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B3) /
Resource Hash
e482ba089d973ca257acfd70b2d7541447d5d333449b106d5c3dffebe322566a

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
last-modified
Mon, 11 Jul 2016 20:43:58 GMT
server
ECS (fcn/40B3)
etag
"4198895974"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
959
expires
Sat, 01 Jun 2019 18:59:01 GMT
utag.1796.js
tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/
8 KB
3 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1796.js?utv=ut4.43.201905061552
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
68.232.35.180 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40F9) /
Resource Hash
9337d4f2ef8a00759da573e178e302712fec944ac54cfd808f48c526b9816d3b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
last-modified
Mon, 28 Nov 2016 15:09:53 GMT
server
ECS (fcn/40F9)
etag
"931235332"
vary
Accept-Encoding
x-cache
HIT
content-type
text/javascript
status
200
cache-control
max-age=1296000
accept-ranges
bytes
content-length
2762
expires
Sat, 01 Jun 2019 18:59:01 GMT
pixel_details.html
www.everestjs.net/static/ Frame BFF7
Redirect Chain
  • https://pixel.everesttech.net/4083/gr?ev_gb=0&url=https%3A%2F%2Fwww.everestjs.net%2Fstatic%2Fpixel_details.html%23google%3D__EFGCK__%26gsurfer%3D__EFGSURFER__%26optout%3D__EFOPTOUT__%26throttleCook...
  • https://www.everestjs.net/static/pixel_details.html
0
0
Document
General
Full URL
https://www.everestjs.net/static/pixel_details.html
Requested by
Host: www.everestjs.net
URL: https://www.everestjs.net/static/st.v3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.90 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-90.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
www.everestjs.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

Server
Apache
Last-Modified
Tue, 04 Oct 2011 16:14:21 GMT
ETag
"8623-a6-4ae7b62583140"
Accept-Ranges
bytes
Content-Type
text/html
Content-Encoding
gzip
Content-Length
146
Cache-Control
max-age=30485
Expires
Sat, 18 May 2019 03:27:06 GMT
Date
Fri, 17 May 2019 18:59:01 GMT
Connection
keep-alive
Vary
Accept-Encoding

Redirect headers

Date
Fri, 17 May 2019 18:59:01 GMT
Server
Apache
Set-Cookie
everest_session_v2=XN8EdQAABcTAeQ5r; path=/; domain=.everesttech.net everest_g_v2=g_surferid~XN8EdQAABcTAeQ5r; path=/; domain=.everesttech.net; expires=Sun, 11-Apr-2021 05:39:01 GMT
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Location
https://www.everestjs.net/static/pixel_details.html#google=XN8EdQAABcTAeQ5r&gsurfer=XN8EdQAABcTAeQ5r&optout=0&throttleCookie=&time=20190517185901
Content-Length
345
Keep-Alive
timeout=15, max=999474
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
dest5.html
cbsi.demdex.net/ Frame D426
0
0
Document
General
Full URL
https://cbsi.demdex.net/dest5.html?d_nsid=0
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
63.32.166.115 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-63-32-166-115.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
cbsi.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Fri, 17 May 2019 08:49:52 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Vary
Accept-Encoding, User-Agent
X-TID
RlHQ837ySc0=
Content-Length
2764
Connection
keep-alive
/
www.zdnet.com/components/breaking-news/xhr/
1 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/components/breaking-news/xhr/?slug=breaking-news-banner
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6bd8e2bca156f437478cf772dd4be4b2b94b8dce6d67033852512ee5287efa2e
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
471
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
last-modified
Fri, 17 May 2019 18:50:11 GMT
server
nginx
x-frame-options
SAMEORIGIN
date
Fri, 17 May 2019 18:59:02 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
4a5e1f76-1915-4852-908c-f7a3b933d356
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=5400, private
accept-ranges
bytes
expires
Fri, 17 May 2019 20:20:11 GMT
disqus-count-5922ea1c53-rev.js
zdnet2.cbsistatic.com/fly/js/components/
406 B
480 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/disqus-count-5922ea1c53-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b8c15c61feffdfe68b168cf2ac8cf58867f38547da3b15d7971a75c44f16bc26

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
last-modified
Mon, 30 Jul 2018 16:42:34 GMT
server
nginx
etag
"5b5f3ffa-196"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
270
expires
Fri, 24 May 2019 18:59:01 GMT
image-gallery-modal-f83353bc14-rev.js
zdnet1.cbsistatic.com/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/image-gallery-modal-f83353bc14-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
4d94e9fceb29f25517c82808b7ecb6b771022bb94fe072c4dad2013d0ac293e0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:06:05 GMT
server
nginx
etag
W/"5cddc2ad-13a6"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1902
expires
Fri, 24 May 2019 18:59:01 GMT
screenshot-2018-11-25-at-18-31-31.png
zdnet3.cbsistatic.com/hub/i/r/2018/11/25/fb02af0e-f3fe-4658-84ff-7ac3145b23f3/thumbnail/170x128/0ac7581c156d33fa202e0046f1fc0985/
41 KB
41 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/11/25/fb02af0e-f3fe-4658-84ff-7ac3145b23f3/thumbnail/170x128/0ac7581c156d33fa202e0046f1fc0985/screenshot-2018-11-25-at-18-31-31.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
c5e61d79eb0a41b0681009bdc9c7babaddeb5c513f082f942078fcec9b7e1958

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"50809a3cabc234a84659bb41cfce0f9e"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004752, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
41599
screenshot-2018-11-26-at-18-57-39.png
zdnet4.cbsistatic.com/hub/i/r/2018/11/26/7b0d2187-fcee-4baf-a988-0da446b82909/thumbnail/170x128/143b3c28fcee52e393fbb8125573a4e3/
46 KB
46 KB
Image
General
Full URL
https://zdnet4.cbsistatic.com/hub/i/r/2018/11/26/7b0d2187-fcee-4baf-a988-0da446b82909/thumbnail/170x128/143b3c28fcee52e393fbb8125573a4e3/screenshot-2018-11-26-at-18-57-39.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
06f0a9dab713f74a8425ce5ac3e9970c90911c7cfb9fbb65d0d793bcd6efb12d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"c31cd9eb0233c998e5d682c4d826d8c6"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004730, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
46671
screenshot-2018-11-26-at-19-15-23.png
zdnet3.cbsistatic.com/hub/i/r/2018/11/26/d001ccda-19ac-4b5d-9048-9479d732c455/thumbnail/170x128/c5d07ca0db13171205cd2a6bd70d9b2a/
34 KB
34 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/11/26/d001ccda-19ac-4b5d-9048-9479d732c455/thumbnail/170x128/c5d07ca0db13171205cd2a6bd70d9b2a/screenshot-2018-11-26-at-19-15-23.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5c700fe27a919dc843ce90ea9175a0e2eea9d24397b66a2b72a92ebdbaff0252

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"2bb054c14409adcb28cb8d922e10a383"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004774, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
34446
screenshot-2018-11-26-at-16-08-57.png
zdnet2.cbsistatic.com/hub/i/r/2018/11/26/da1f34c2-2bce-4bd5-99b4-f93760bb25fb/thumbnail/170x128/3514848ad66caa0e86b6377f6ffa3061/
38 KB
39 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2018/11/26/da1f34c2-2bce-4bd5-99b4-f93760bb25fb/thumbnail/170x128/3514848ad66caa0e86b6377f6ffa3061/screenshot-2018-11-26-at-16-08-57.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
06d17db7c7c608e4f8f02c58f7b2dd955cac95d7ded45967ce9f29fd6bb1d2d3

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"de3a8280fcdb3da95e3b4626cead3986"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004676, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
39141
screenshot-2018-11-26-at-19-17-47.png
zdnet3.cbsistatic.com/hub/i/r/2018/11/26/63654239-e0c3-4518-8706-a819cf4a9b1f/thumbnail/170x128/58a32920a245cfeb51f29a9791c294fd/
19 KB
19 KB
Image
General
Full URL
https://zdnet3.cbsistatic.com/hub/i/r/2018/11/26/63654239-e0c3-4518-8706-a819cf4a9b1f/thumbnail/170x128/58a32920a245cfeb51f29a9791c294fd/screenshot-2018-11-26-at-19-17-47.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b79fafb9e9f80ecaaf7c1722d1e6e290625add1be52cf8b5fa3e51fb51deb098

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:01 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"5ef7f68d74e8de904b773669eff12e1d"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=17004818, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
19060
cs.js
sb.scorecardresearch.com/c2/3005086/
0
400 B
Script
General
Full URL
https://sb.scorecardresearch.com/c2/3005086/cs.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1775.js?utv=ut4.43.201905061552
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.5.97.37 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-5-97-37.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:01 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Apr 2011 23:11:26 GMT
ETag
"d41d8cd98f00b204e9800998ecf8427e:1349196464"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=259200
Connection
keep-alive
Content-Length
20
Expires
Mon, 20 May 2019 18:59:01 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=3005086&ns__t=1558119541972&ns_c=UTF-8&c8=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1558119541972&ns_c=UTF-8&c8=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1558119541972&ns_c=UTF-8&c8=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.5.97.37 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-5-97-37.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:02 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=3005086&ns__t=1558119541972&ns_c=UTF-8&c8=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&c9=
Pragma
no-cache
Date
Fri, 17 May 2019 18:59:01 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
/
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com/WRSiteInterceptEngine/
53 KB
13 KB
Script
General
Full URL
https://zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com/WRSiteInterceptEngine/?Q_ZID=ZN_3xeBFJDuSs0SRW5&Q_LOC=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.277.js?utv=ut4.43.201905061552
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.82.196 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-82-196.deploy.static.akamaitechnologies.com
Software
/ Express
Resource Hash
4b16fa9e91311c453154d9ed5f348b2ae70094d1e7ee7711254c97f8b5e1fbf4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
access-control-allow-origin
*
x-powered-by
Express
etag
W/"d4ab-TUCfr8A6SMrI2rOjLOt8itQICYU"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
status
200
cache-control
public, max-age=60, s-maxage=604800
strict-transport-security
max-age=31536000; includeSubDomains; preload
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Accept
content-length
13386
fbevents.js
connect.facebook.net/en_US/
53 KB
16 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
fa59b1ed1b011e084474ad818b5f6986d84fc678e2f37fee9330eb52d86860b3
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15397
x-xss-protection
0
pragma
public
x-fb-debug
wXrX/HDYT42m6850UJc0xvem4KPbRRsvKW+oT0cZLajC1ktWW861MLsJl4gfFWPFGgt7tj1oQTk5b0SsNZFtlw==
date
Fri, 17 May 2019 18:59:02 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
disqus-loader-6a61335819-rev.js
zdnet3.cbsistatic.com/fly/js/components/
1 KB
758 B
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/disqus-loader-6a61335819-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
e316de6c5a8e413f8445d271e54fd321149bd785a7c09db6e785f72e3aeff2d7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
last-modified
Thu, 02 May 2019 17:55:36 GMT
server
nginx
etag
W/"5ccb2f18-4a2"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
552
expires
Fri, 24 May 2019 18:59:02 GMT
mds.png
zdnet1.cbsistatic.com/hub/i/r/2019/05/14/b33d4eec-04c9-4906-bacd-63fee294488b/thumbnail/70x53/9c49efcb7abf2d7ebe9050c6cc1464e3/
4 KB
4 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2019/05/14/b33d4eec-04c9-4906-bacd-63fee294488b/thumbnail/70x53/9c49efcb7abf2d7ebe9050c6cc1464e3/mds.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
80ea68453bf6a61c110e7691dcd72d5c550e63cc06aa69f7b66bceebe4c2893e

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"0b105cf1504c4e241fcc6d519ea962fb"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31284530, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
3566
tutorial-3.png
zdnet2.cbsistatic.com/hub/i/r/2019/05/15/4223ad2d-f3cd-45ba-bad0-0314ceb20e96/thumbnail/70x53/98eadbf9dc407a69717e3b0c44987ab0/
4 KB
4 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2019/05/15/4223ad2d-f3cd-45ba-bad0-0314ceb20e96/thumbnail/70x53/98eadbf9dc407a69717e3b0c44987ab0/tutorial-3.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
00bf18668152f1d4bb5fc7df1c15ad1daf76ca51b0d198ed922bf5f0528f5ade

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"6e2d5d50a943a0e0d738377f51011685"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31298306, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
3848
ethereum-patch-gap.png
zdnet1.cbsistatic.com/hub/i/r/2019/05/15/2b428d36-1b0f-4c33-b28b-d04edcaecc0f/thumbnail/70x53/c96966b6d4da5be6361dfe39fe864b8a/
5 KB
5 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2019/05/15/2b428d36-1b0f-4c33-b28b-d04edcaecc0f/thumbnail/70x53/c96966b6d4da5be6361dfe39fe864b8a/ethereum-patch-gap.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9740d5aa520e11822e181737948320b5c83eccba4e0ca4562f0a8cada3845675

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"b28d8e3ccb1ff9d46fa2d9e70222c9e7"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31492099, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
4656
istock000020488045small.jpg
zdnet1.cbsistatic.com/hub/i/r/2015/12/01/11c59253-9a66-47d3-aeed-b71f8527d66f/thumbnail/70x53/f8946ea189fc7d413e63a47298990807/
5 KB
5 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2015/12/01/11c59253-9a66-47d3-aeed-b71f8527d66f/thumbnail/70x53/f8946ea189fc7d413e63a47298990807/istock000020488045small.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
7edb2df9c4897cb77d884801c301c79e39e92c25e522871c5cb72d4a7cee65bc

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"4dea382d82666332fb564f2e711cbc71"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=31483812, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
4858
/
www.zdnet.com/newsletter/xhr/widget-login/
2 KB
2 KB
XHR
General
Full URL
https://www.zdnet.com/newsletter/xhr/widget-login/?topic=security
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
6029cbcf1479d2630614172dff726e08968a5cead8a71702206f74763faaca86
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
732
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Fri, 17 May 2019 18:59:02 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
36df7d5b-9a74-4712-b326-dc0be495b68c
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
expires
Fri, 17 May 2019 18:59:02 GMT
m
secure-us.imrworldwide.com/cgi-bin/
Redirect Chain
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp=&ts=compact&rnd=1558119541991
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp=&ts=compact&rnd=1558119541991&ja=1
44 B
332 B
Image
General
Full URL
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp=&ts=compact&rnd=1558119541991&ja=1
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.31.188.57 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-31-188-57.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:02 GMT
server
nginx
access-control-allow-origin
*
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
status
200
cache-control
no-cache
content-type
image/gif
content-length
44
expires
Thu, 01 Dec 1994 16:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:02 GMT
server
nginx
access-control-allow-origin
*
location
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-304254h&cg=0&cc=1&si=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp=&ts=compact&rnd=1558119541991&ja=1
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
status
302
cache-control
no-cache
content-length
0
expires
Thu, 01 Dec 1994 16:00:00 GMT
/
www.zdnet.com/m3d0s1/xhr/right-rail/
10 KB
3 KB
XHR
General
Full URL
https://www.zdnet.com/m3d0s1/xhr/right-rail/
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
bca2b1c005ceef3a59b7385e0d48bdb88ea13b67dd84065bd6e4d8e9a524e51a
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
1690
x-xss-protection
1; mode=block
pragma
no-cache
referrer-policy
no-referrer-when-downgrade
server
nginx
x-frame-options
SAMEORIGIN
date
Fri, 17 May 2019 18:59:02 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
bf4bd81d-b173-42c9-bd77-ae451cf00728
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
expires
Fri, 17 May 2019 18:59:02 GMT
front-door-carousel-56427878d9-rev.js
zdnet1.cbsistatic.com/fly/js/components/
5 KB
2 KB
Script
General
Full URL
https://zdnet1.cbsistatic.com/fly/js/components/front-door-carousel-56427878d9-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5ecc6a93ec2939faa8dbf80084346c7d940f5a2181ee69343810da52902eb92d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
last-modified
Thu, 16 Aug 2018 13:35:07 GMT
server
nginx
etag
W/"5b757d8b-124a"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
cneonction
close
timing-allow-origin
*
content-length
1564
expires
Fri, 24 May 2019 18:59:02 GMT
urban-airship-29ae327ed0-rev.js
zdnet3.cbsistatic.com/fly/js/components/
1 KB
1 KB
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/urban-airship-29ae327ed0-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
fa33d1db535d783b0baf4e74bdc7ce9e54633f87a03669b2803e567088d64ccb

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
last-modified
Wed, 29 Aug 2018 13:13:23 GMT
server
nginx
etag
W/"5b869bf3-514"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
827
expires
Fri, 24 May 2019 18:59:02 GMT
advertisement-d41d8cd98f-rev.js
zdnet2.cbsistatic.com/fly/js/utils/
0
178 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/utils/advertisement-d41d8cd98f-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
last-modified
Fri, 10 Aug 2018 18:33:06 GMT
server
nginx
etag
"5b6dda62-0"
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
0
expires
Fri, 24 May 2019 18:59:02 GMT
loader.js
cdn.taboola.com/libtrc/cbsinteractive-zdnet/
85 KB
19 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e0d30e0d9367e9e534b7d46b627d4d36cc259c04032d151c2e83f07351708722

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
PCfuq7.ZLqqTHDmS8Djh4bXxhmj99MjX
content-encoding
gzip
age
64
x-cache
HIT
status
200
date
Fri, 17 May 2019 18:59:03 GMT
content-length
18944
x-amz-id-2
h3/ttucdM6jMvprOZttWGBVhzyeo/vQ0hqP9uflJmjns9U4U36xFy+Ul/n7AuiOgdq1PP5xNE7U=
x-served-by
cache-hhn1548-HHN
last-modified
Thu, 16 May 2019 14:48:01 GMT
server
AmazonS3
x-timer
S1558119543.106068,VS0,VE1
etag
"0bcd44126b58ac9a553cdf3deadbe921"
vary
Accept-Encoding
x-amz-request-id
37967F83CE3FFDB5
via
1.1 varnish
cache-control
private,max-age=14401
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
70
x-cache-hits
1
fly-disqus-count-1f604770a3-rev.js
zdnet2.cbsistatic.com/fly/js/components/
882 B
670 B
Script
General
Full URL
https://zdnet2.cbsistatic.com/fly/js/components/fly-disqus-count-1f604770a3-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
b2ab8784d5ca4bc5e4e1990ba55c6d9f041b8fe8cf41ad9afa37bc1c3dd12756

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
last-modified
Tue, 12 Mar 2019 17:29:14 GMT
server
nginx
etag
"5c87ec6a-372"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
460
expires
Fri, 24 May 2019 18:59:02 GMT
mds.png
zdnet1.cbsistatic.com/hub/i/r/2019/05/14/b33d4eec-04c9-4906-bacd-63fee294488b/thumbnail/70x53/9c49efcb7abf2d7ebe9050c6cc1464e3/
4 KB
4 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2019/05/14/b33d4eec-04c9-4906-bacd-63fee294488b/thumbnail/70x53/9c49efcb7abf2d7ebe9050c6cc1464e3/mds.png
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
80ea68453bf6a61c110e7691dcd72d5c550e63cc06aa69f7b66bceebe4c2893e

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"0b105cf1504c4e241fcc6d519ea962fb"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31284530, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
3566
tutorial-3.png
zdnet2.cbsistatic.com/hub/i/r/2019/05/15/4223ad2d-f3cd-45ba-bad0-0314ceb20e96/thumbnail/70x53/98eadbf9dc407a69717e3b0c44987ab0/
4 KB
4 KB
Image
General
Full URL
https://zdnet2.cbsistatic.com/hub/i/r/2019/05/15/4223ad2d-f3cd-45ba-bad0-0314ceb20e96/thumbnail/70x53/98eadbf9dc407a69717e3b0c44987ab0/tutorial-3.png
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
00bf18668152f1d4bb5fc7df1c15ad1daf76ca51b0d198ed922bf5f0528f5ade

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"6e2d5d50a943a0e0d738377f51011685"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31298306, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
3848
ethereum-patch-gap.png
zdnet1.cbsistatic.com/hub/i/r/2019/05/15/2b428d36-1b0f-4c33-b28b-d04edcaecc0f/thumbnail/70x53/c96966b6d4da5be6361dfe39fe864b8a/
5 KB
5 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2019/05/15/2b428d36-1b0f-4c33-b28b-d04edcaecc0f/thumbnail/70x53/c96966b6d4da5be6361dfe39fe864b8a/ethereum-patch-gap.png
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
9740d5aa520e11822e181737948320b5c83eccba4e0ca4562f0a8cada3845675

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"b28d8e3ccb1ff9d46fa2d9e70222c9e7"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=31492099, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
4656
istock000020488045small.jpg
zdnet1.cbsistatic.com/hub/i/r/2015/12/01/11c59253-9a66-47d3-aeed-b71f8527d66f/thumbnail/70x53/f8946ea189fc7d413e63a47298990807/
5 KB
5 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2015/12/01/11c59253-9a66-47d3-aeed-b71f8527d66f/thumbnail/70x53/f8946ea189fc7d413e63a47298990807/istock000020488045small.jpg
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
7edb2df9c4897cb77d884801c301c79e39e92c25e522871c5cb72d4a7cee65bc

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"4dea382d82666332fb564f2e711cbc71"
vary
Accept-Encoding
content-type
image/jpeg
status
200
cache-control
public, max-age=31483812, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
4858
ua-sdk.min.js
web-sdk.urbanairship.com/notify/v1/
78 KB
17 KB
Script
General
Full URL
https://web-sdk.urbanairship.com/notify/v1/ua-sdk.min.js
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/js/components/urban-airship-29ae327ed0-rev.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
35.227.208.151 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
151.208.227.35.bc.googleusercontent.com
Software
UploadServer /
Resource Hash
e59c8c655db8c097ed0067789aeb44ed58f25f8c68a5772bbb3f1fdc18e5e336

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:55:07 GMT
content-encoding
gzip
x-goog-meta-goog-reserved-file-mtime
1556302399
age
235
status
200
x-guploader-uploadid
AEnB2UrCEy98Q7ADy8SGIEHAeUyqxhkLxMgcPtKuVWxOn6jTw5sxeheSkDtZtzbFVcfxJlv00aLFJNQI8zbMIl1BkYvJqR7mGg
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
2
x-goog-stored-content-encoding
gzip
alt-svc
clear
content-length
16960
last-modified
Fri, 26 Apr 2019 18:13:21 GMT
server
UploadServer
etag
"251defdc0ecc8a3bad8ae4cf9aab1923"
vary
Accept-Encoding
x-goog-hash
crc32c=A7yEjg==, md5=JR3v3A7MijutiuTPmqsZIw==
x-goog-generation
1556302401249893
cache-control
public, max-age=300
x-goog-stored-content-length
16960
accept-ranges
bytes
content-type
application/javascript
expires
Fri, 17 May 2019 19:00:07 GMT
309391486091569
connect.facebook.net/signals/config/
207 KB
55 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/309391486091569?v=2.8.47&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
e1c2e99d6418820402265a808d92c5c1465f2b9003feb6bda90625195e200cb1
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
56215
x-xss-protection
0
pragma
public
x-fb-debug
zAZZshjR3M7vL/6JF/Xuu1F/Kx06pIBbEJnJ6QRszATXZ2XMjo1p4Q8aZyiossW5b02kG7hqHUin3oexP2KI7g==
date
Fri, 17 May 2019 18:59:02 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
show-hide-1.0-7dc26ff326-rev.js
zdnet3.cbsistatic.com/fly/js/components/
2 KB
914 B
Script
General
Full URL
https://zdnet3.cbsistatic.com/fly/js/components/show-hide-1.0-7dc26ff326-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
f92514f4e39c16da9037f964148a09a79419744b77d611860ffc81c86aeace0a

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
last-modified
Thu, 10 Jan 2019 17:52:02 GMT
server
nginx
etag
W/"5c378642-7a5"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
710
expires
Fri, 24 May 2019 18:59:02 GMT
4083-12969.js
www.everestjs.net/dl/4083/
484 B
664 B
Script
General
Full URL
https://www.everestjs.net/dl/4083/4083-12969.js
Requested by
Host: www.everestjs.net
URL: https://www.everestjs.net/static/st.v3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.90 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-90.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1d4d518e1da495fb6d6d8b3d86bba79d7597b61b466e71c45cdb09ed79659c53

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:02 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Nov 2013 14:23:10 GMT
Server
Apache
ETag
"4a5a49-1e4-4ec011a776f80"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=30449
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
288
Expires
Sat, 18 May 2019 03:26:31 GMT
v
pixel.everesttech.net/4083/
128 B
716 B
Image
General
Full URL
https://pixel.everesttech.net/4083/v?ev___loc=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ev___ref=%2F%2F
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:02 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"1433c2-80-53f3f17013d40"
Vary
Cookie
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=15, max=999440
Content-Length
128
1x1
pixel.everesttech.net/
Redirect Chain
  • https://cm.everesttech.net/cm
  • https://cm.g.doubleclick.net/pixel?google_nid=everest&google_cm&google_sc&ev_rs=1&url=/1x1&google_hm=WE44RWRRQUFCY1RBZVE1cg
  • https://cm.everesttech.net/cm/ax?cookieid=&ev_rs=1&url=/1x1&google_gid=CAESENmy42w23Wvas1w_Lxm_2T4&google_cver=1
  • https://pixel.everesttech.net/1x1
128 B
407 B
Image
General
Full URL
https://pixel.everesttech.net/1x1
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:02 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"9c38d7-80-53f3f17013d40"
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=995364
Content-Length
128

Redirect headers

Date
Fri, 17 May 2019 18:59:01 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://pixel.everesttech.net/1x1
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
ads
securepubads.g.doubleclick.net/gampad/
109 KB
15 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3052261359409312&correlator=1113832012382049&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21062414%2C21063202&vrg=2019051301&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A32776%2C8%3A32776&sc=1&sfv=1-0-33&ecs=20190517&iu_parts=8264%2Cuk-zdnet%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=7x7%7C5x5%2C1x1%2C728x90%7C970x66%7C970x250%2C300x250%7C300x600%7C300x1050%2C320x50%7C11x11%2C300x250%2C300x250%2C641x321%2C728x90%7C970x66%7C970x250%2C371x771&fluid=0%2C0%2C0%2C0%2Cheight%2C0%2C0%2C0%2C0%2C0&ists=256&prev_scp=pos%3Dnav%7C%7Cpos%3Dtop%7Cpos%3Dtop%7Cpos%3Dtop%26strnativekey%3D8ec3a4f3%7Cpos%3Dmiddle%7Cpos%3Dbottom%7Cpos%3Dtop%7Cpos%3Dbottom%7Cpos%3Dtop&eri=1&cust_params=buyingcycle%3Ddiscover%26topic%3Dsecurity%26mfr%3Dteamviewer%252Cmicrosoft%252Ccobra-electronics%26tag%3Dmalware%252Ccyber-security%252Ctarget%26pid%3Dcobra%26device%3Ddesktop%26ptype%3Darticle%26cid%3Dchinese-cyberspies-breached-teamviewer-in-2016%26env%3Dprod%26firstpg%3D1%26vguid%3Ddd8c9508-9fc0-4b5d-9d0f-5c21a2117e33%26session%3Dh%26subses%3D2&cookie_enabled=1&bc=31&abxe=1&lmt=1558115780&dt=1558119542283&dlt=1558119537742&idt=926&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C0%2C0%2C0%2C208%2C0%2C0%2C0%2C0%2C0&adys=0%2C87%2C0%2C0%2C1639%2C0%2C0%2C0%2C0%2C0&adks=3991666775%2C2694823115%2C2434322296%2C3695649332%2C648174914%2C97580250%2C2953385831%2C1682397144%2C2762031813%2C1115509114&ucis=1%7C2%7C3%7C4%7C5%7C6%7C7%7C8%7C9%7Ca&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&dssz=87&icsg=0&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x3466%7C1585x0%7C1585x0%7C370x0%7C770x11%7C370x0%7C370x250%7C770x2398%7C1210x0%7C370x0&msz=7x7%7C1585x0%7C688x105%7C300x280%7C770x11%7C300x280%7C300x280%7C641x361%7C728x130%7C371x771&blev=1&bisch=1&ga_vid=1097290917.1558119542&ga_sid=1558119542&ga_hid=2052651849&fws=128%2C4%2C128%2C128%2C4%2C128%2C128%2C128%2C128%2C128
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
6e4c4b72050b552efc0470a49eaa674753e54f8fc6b240628fd065269117bce8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2,-2,-2,-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
15032
x-xss-protection
0
google-lineitem-id
4745699004,-2,-2,-2,4955832456,253246569,241984809,4745327422,253246569,4825966980
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138239468890,-2,-2,-2,138262432800,75375443409,75375443409,138239368367,75374362809,138247024569
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019051301.js
securepubads.g.doubleclick.net/gpt/
71 KB
27 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
sffe /
Resource Hash
bd9265e706c41cf364cc226eeea4b77dcc188fda93940f4050af552eb553db0f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 May 2019 13:05:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
27438
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:02 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-33/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-33/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

headerstats
as-sec.casalemedia.com/
0
337 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=182823&u=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/ls-zdnet.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.215.135 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-215-135.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:02 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Fri, 17 May 2019 18:59:02 GMT
count.js
zdnet-1.disqus.com/
1 KB
1 KB
Script
General
Full URL
https://zdnet-1.disqus.com/count.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.36.134 Amsterdam, Netherlands, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:05 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
527344
P3P
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Content-Length
871
X-XSS-Protection
1; mode=block
Last-Modified
Wed, 08 May 2019 01:02:47 GMT
Server
nginx
ETag
"5cd22ab7-367"
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=300
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
/
www.google.de/pagead/1p-user-list/1036174608/
Redirect Chain
  • https://www.googleadservices.com/pagead/conversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0
  • https://googleads.g.doubleclick.net/pagead/viewthroughconversion/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&amp;guid=ON&amp;script=0&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&ocp_id=dgTfXJyZGoaW3g...
  • https://www.google.com/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=1326425065&crd=&cdct=2&is_vtc=1&random=1544863032
  • https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=1326425065&crd=&cdct=2&is_vtc=1&random=1544863032&ipr=y
42 B
120 B
Image
General
Full URL
https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=1326425065&crd=&cdct=2&is_vtc=1&random=1544863032&ipr=y
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:02 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:02 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/pagead/1p-user-list/1036174608/?label=pXjaCJ6m6gcQkIqL7gM&ctc_id=CAIVAgAAAB0CAAAA&ct_cookie_present=false&random=1326425065&crd=&cdct=2&is_vtc=1&random=1544863032&ipr=y
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel
ad.yieldmanager.com/
0
341 B
Image
General
Full URL
https://ad.yieldmanager.com/pixel?id=2447099&t=2
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1288:110:422::3000 , United Kingdom, ASN34010 (YAHOO-IRD, GB),
Reverse DNS
Software
ATS /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:02 GMT
X-Content-Type-Options
nosniff
Server
ATS
Age
0
Expect-CT
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
Strict-Transport-Security
max-age=31536000
Connection
keep-alive
Content-Length
0
X-XSS-Protection
1; mode=block
s
pixel.everesttech.net/4083/
128 B
716 B
Image
General
Full URL
https://pixel.everesttech.net/4083/s?s=12969
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
66.117.28.68 , United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
bf94db5c7d218f9a2a2edfff6c01bf65f5946a32000cd41835fee5b564efa62f

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:02 GMT
Last-Modified
Wed, 19 Oct 2016 22:11:25 GMT
Server
Apache
ETag
"9c38d7-80-53f3f17013d40"
Vary
Cookie
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Cache-Control
no-cache
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
image/png
Keep-Alive
timeout=15, max=995379
Content-Length
128
inferredEvents.js
connect.facebook.net/signals/plugins/
1 KB
893 B
Script
General
Full URL
https://connect.facebook.net/signals/plugins/inferredEvents.js?v=2.8.47
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
cd1c301a8e7960a1786e2a959226b0b78b56dbea284bd114265f1662d6ca280e
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
public
x-fb-debug
n73NszZqhzjlUFzqz08knqJ+bZGAjm171nd1pN6XC36jbTqTyDm2GxeP/mgzwu858gO3WW5paOk7KXNq6P+Nmw==
content-encoding
gzip
x-content-type-options
nosniff
date
Fri, 17 May 2019 18:59:02 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
status
200
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
strict-transport-security
max-age=31536000; preload; includeSubDomains
vary
Accept-Encoding
content-length
772
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
bcn
www.summerhamster.com/
43 B
181 B
Image
General
Full URL
https://www.summerhamster.com/bcn?fe=1558119542487&y=2.0.1105&elg=849614893&flg=68&x=zzz.cgqhw.frp%2Fduwlfoh%2Ffklqhvh-fbehuvslhv-euhdfkhg-whdpylhzhu-lq-2016%2F&vqwo=1&deo=0&g0=vg%3A%3Aer%2Cxd%3A%3Aqexd%3A%3Aqsu%7Cvg%3A%3Ask%3A%3Aqsk%3A%3Aqsu%7Cgisl%3A%3Alp%2Clqi%2Cqh%3A%3Aqoe%3A%3Aqsu%3A%3Axuo%3D%2F%2Fdg.grxeohfolfn.qhw%2Fggp%2Fdg%2Fzqrvbzac%2Fnfmofacq%2F%3Brug%3D1558119538385%3F%7Cjdg%3A%3Aho%2Ckl%2Cklg%2Clqi%3A%3Aqhk%3A%3Aqsu%3A%3Avho%3D.sodlqDg%7Cjdg%3A%3Aho%2Ckl%2Cklg%2Clqi%3A%3Aqhk%3A%3Aqsu%3A%3Avho%3D.sodlqDg%7Cddg%2Cjdg%3A%3Aho%2Ckl%2Cklg%2Clqi%3A%3Aqhk%3A%3Aqsu%3A%3Avho%3D.des_re_halvw%7Cdg%3A%3Adu%2Cklg%2Cvv%3A%3Aqvvs%3A%3Aqsu%7Cdg%3A%3Adu%2Cklg%2Cvv%3A%3Aqvvs%3A%3Aqsu%7Cdg%3A%3Adu%2Cklg%2Cvv%3A%3Aqvvs%3A%3Aqsu%7Cdg%3A%3Adu%2Cklg%2Cvv%3A%3Aqvvs%3A%3Aqsu%7Cdg%3A%3Adu%2Cklg%2Cvv%3A%3Aqvvs%3A%3Aqsu%7Csu%3A%3Aid%3A%3Aquiv%3A%3Aqsu&hu=0&g2=0%3A%3A0%3A%3A0%3A%3A0%3A%3A0
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.185.4.39 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-185-4-39.eu-central-1.compute.amazonaws.com
Software
Jetty(9.2.10.v20150310) /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Fri, 17 May 2019 18:59:03 GMT
server
Jetty(9.2.10.v20150310)
access-control-allow-origin
*
content-length
43
access-control-allow-methods
*
content-type
image/gif
/
www.facebook.com/tr/
44 B
323 B
Image
General
Full URL
https://www.facebook.com/tr/?id=309391486091569&ev=PageView&dl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&rl=&if=false&ts=1558119542507&sw=1600&sh=1200&v=2.8.47&r=stable&a=tmtealium&ec=0&o=30&fbp=fb.1.1558119542506.2118207638&it=1558119542221&coo=false&rqm=GET
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Fri, 17 May 2019 18:59:02 GMT
/
0211c816.akstat.io/
0
354 B
Other
General
Full URL
https://0211c816.akstat.io/
Requested by
Host: c.go-mpulse.net
URL: https://c.go-mpulse.net/boomerang/YZ2TK-PC7PJ-K64DL-L53CR-P2G4E
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.214.229 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-214-229.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:02 GMT
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
X-XSS-Protection
0
Expires
Fri, 17 May 2019 18:59:02 GMT
vglnk.js
cdn.viglink.com/api/
77 KB
27 KB
Script
General
Full URL
https://cdn.viglink.com/api/vglnk.js
Requested by
Host: tags.tiqcdn.com
URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6810:a00d , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e393d6f1feb159d634dbe38eb81cb057690e4527b4013840a45ebd1fd6af82b7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:02 GMT
content-encoding
gzip
cf-cache-status
HIT
x-amz-request-id
11FB8925E4F5272A
status
200
content-length
27314
x-amz-id-2
gflpBy8oX71LHMep6/d3A8H4Tigd3x1FHbotSG/Dodj3h6Kbz4kzdoHo5uLVNdyOyjHC7hndTrc=
last-modified
Thu, 28 Mar 2019 16:24:04 GMT
server
cloudflare
etag
"4909064365a1c78485fece2784ca6033"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
cache-control
public, max-age=1800
accept-ranges
bytes
cf-ray
4d87d3854d29c286-FRA
expires
Fri, 17 May 2019 19:29:02 GMT
0.8517350021583824
saa.cbsi.com/b/ss/cbsib2bleadgen/1/G.4--NS/
43 B
520 B
Image
General
Full URL
https://saa.cbsi.com/b/ss/cbsib2bleadgen/1/G.4--NS/0.8517350021583824?AQB=1&ce=UTF%2D8&events=event66&v0=ftag_cd:LGN22ef1e6&v2=en&v3=desktop&v4=right-rail&v5=zdnet&v10=article&v20=chinese+cyberspies+breached+teamviewer+in+2016&v22=content_article&v23=&v24=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&v30=29171f76-766b-4149-941c-e2afcd592c6b&v60=33166607,33164840,33166483&v64=2150&v69=&c0=D%3Dv0&c2=D%3Dv2&c3=D%3Dv3&c4=D%3Dv4&c5=D%3Dv5&c10=D%3Dv10&c20=D%3Dv20&c22=D%3Dv22&c23=D%3Dv23&c24=D%3Dv24&c30=D%3Dv30&c60=D%3Dv60&c64=D%3Dv64&c69=D%3Dv69&pe=lnk_o&pev2=medusa_impression&vid=201905172-leadgen-zdnet&mid=90240133173074011141898988208131324462&aid=2D535D450507F28B-40000106A0001145&AQE=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.0.145.219 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-0-145-219.compute-1.amazonaws.com
Software
Omniture DC /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:02 GMT
Last-Modified
Sat, 18 May 2019 18:59:02 GMT
Server
Omniture DC
xserver
www189
ETag
"3346036238161051648-7819350352918688518"
Vary
*
X-C
ms-6.7.4
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Thu, 16 May 2019 18:59:02 GMT
e.gif
dw.cbsi.com/levt/ria/
43 B
369 B
Image
General
Full URL
https://dw.cbsi.com/levt/ria/e.gif?rsid=cnetzdnetglobalsite&sid=2&siteid=2&pagetype=article&assetguid=29171f76-766b-4149-941c-e2afcd592c6b&assettitle=chinese%20cyberspies%20breached%20teamviewer%20in%202016&assettype=content_article&pubdate=2019-05-17%2016%3A25%3A16&viewguid=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&devicetype=desktop&sitetype=responsive%20web&author=catalin%20cimpanu&authorid=85fd8691-f525-4ea2-a601-af296f629f7f&topicguid=113c25b6-ec91-11e3-95d2-02911863765e&topic=security&topicbrcrm=security&s8=cnetzdnetglobalsite&v23=cnetzdnetglobalsite&v19=article&v17=113c25b6-ec91-11e3-95d2-02911863765e&v20=29171f76-766b-4149-941c-e2afcd592c6b&v16=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&riaevent=impression&comptyp=spot&mapp=medusa_app&objtyp=medusa&eventt=log&v18=security&comp=ucwc&ts=1558119542613&tcset=utf8&im=dsjs&title=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&srcurl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.30.230.22 , United States, ASN6623 (CBSI-1 - CBS Interactive Inc., US),
Reverse DNS
phx2-dw-cbsi-xw-ext-lb.cnet.com
Software
Apache/2.4.25 /
Resource Hash
e586a84d8523747f42e510d78e141015b6424cf67d612854e892a7bcedc8ec9e

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:02 GMT
Server
Apache/2.4.25
Vary
*
Content-Type
image/gif
Cache-Control
no-cache, must-revalidate, no-transform
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=80, max=802
Content-Length
43
Expires
Fri, 23 Jan 1970 12:12:12 GMT
domains
api.viglink.com/api/
42 B
721 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
99.80.15.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-99-80-15-126.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
8b49ed20f3363faa09d8e41835a27eefcd2b092e656c5e05c280cea3b124493e

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:01 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame C66E
0
75 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstFKkCc5REMBwEJdZtTuI6JpBeX_C2mUgFSM6z2E88EMA75IrZJj8_7blqJwhecJ5lC9_281N8CESH8W6iMH29P4A_6bKplMQ65JxZCzQmUOWBUg7JAOmvqDG50UQWZoqRsmWvR4ubQPnm-3NDx7oCJ01td-nS4Ru0JT0_FFlIgeGWlIvK4NceoJl5yey6KpQEaHQtOi8LLpdkhHU2n975SoTl_Rgh5WNy3YeH76mINo978jVbliFzVUk2qkeodAzOj&sai=AMfl-YQFhycCsoksqXWhTL5FI7QJexdTA-j8v1tJbP6tzygHw4Y2lsoqRKJvbvKlznaZytbjobDyhygiSVtXkc0az9qWhWZbJX0H633SHtZjLopU-f86_z-9TJp52DU&sig=Cg0ArKJSzNgZ9mYOeQGUEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:02 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame C66E
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame C66E
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
osd.js
www.googletagservices.com/activeview/js/current/
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
477a6024d6d851678c69ba63dd809ad308929d173ef21ed62d7bc8b0176928de
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28709
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame E26B
0
57 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvWGLi7anIS2OGPTSEuYyqaVhhq0_XeKmsbhdapGineSxAu2p80i9MmNthgnGPX6qFgKfng9I_vFcW-AJRkoCm7-B08l-ev3VgaByeCDL00uYb2aufXuoA32qIGYSas70ENDflQ0VySNyHD13bR2PtpqXWppbgWETXIDBGWeFPB7r9EfUD-nCNK2Lv4OyUcmetwspnenM49xFzn6SA5Vpv3sx4PpSqOG5_hrJuJaprite2IkIxSixvJUbxAPxl5&sai=AMfl-YQBUu0VeziIPHzZoXkRsBCjRIMbYpdKL2LnYdtVLmV4uMR3dsCTNgkBPVJ38SmYuNlP50FjKwOCSUU7BdzczXxv7BRCtAcKxs7zandsHzJ1ipBQFza5Sluspgc&sig=Cg0ArKJSzDdK-nYRzwoOEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
B22286505.241190948;dc_pre=CMiPhM-fo-ICFQL3dwodV_sFaA;dc_trk_aid=438183133;dc_trk_cid=112130342;ord=144980949;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=
ad.doubleclick.net/ddm/trackimp/N1933.273680CBS/ Frame E26B
Redirect Chain
  • https://ad.doubleclick.net/ddm/trackimp/N1933.273680CBS/B22286505.241190948;dc_trk_aid=438183133;dc_trk_cid=112130342;ord=144980949;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=
  • https://ad.doubleclick.net/ddm/trackimp/N1933.273680CBS/B22286505.241190948;dc_pre=CMiPhM-fo-ICFQL3dwodV_sFaA;dc_trk_aid=438183133;dc_trk_cid=112130342;ord=144980949;dc_lat=;dc_rdid=;tag_for_child_...
42 B
112 B
Fetch
General
Full URL
https://ad.doubleclick.net/ddm/trackimp/N1933.273680CBS/B22286505.241190948;dc_pre=CMiPhM-fo-ICFQL3dwodV_sFaA;dc_trk_aid=438183133;dc_trk_cid=112130342;ord=144980949;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.207.70 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f6.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:03 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:03 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
content-type
text/html; charset=UTF-8
location
https://ad.doubleclick.net/ddm/trackimp/N1933.273680CBS/B22286505.241190948;dc_pre=CMiPhM-fo-ICFQL3dwodV_sFaA;dc_trk_aid=438183133;dc_trk_cid=112130342;ord=144980949;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=
cache-control
no-cache, must-revalidate
follow-only-when-prerender-shown
1
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
sfp-set-targeting.js
native.sharethrough.com/assets/ Frame E26B
19 KB
7 KB
Script
General
Full URL
https://native.sharethrough.com/assets/sfp-set-targeting.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.167.165 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-167-165.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4058002b6f3f9139ea297424ac6249b6e1ba56e35d489d781450d45e8a805317

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:53:16 GMT
content-encoding
gzip
last-modified
Tue, 14 May 2019 16:34:09 GMT
server
AmazonS3
age
349
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=3600
x-amz-cf-pop
FRA54
x-amz-cf-id
nuyAouT_svxOk4OKZmUnir8odrjSMpIWZ6b3tg97AevRNmq-VbkxJQ==
via
1.1 1463b274b31e0310acc7c754b8b5a550.cloudfront.net (CloudFront)
expires
Tue, 14 May 2019 17:34:07 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame E26B
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame E26B
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
view
securepubads.g.doubleclick.net/pcs/ Frame 843A
0
57 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuaiEtqgwN21Nngx49RQC23PW9xjp6WruiNynnV1PgBVajoL279PvyU2qXzGHQa-51UM5s7JJC8BJODbgfLdwTCLugYXz-EiYszxbf8XiFhEyer7p-NjQcG5pK-DsuQbaHJvIDI-GVTnv7-d-VMTphRBq5erfKXm5EtO4NPQGyPlJowmaX3UlLR2Tme2_sloIsFcDjM-cW4pHcRAoeuFJ4EABWEU_6JQ_3FOUBPaZ-V2lU5XMSVHRyH1x5SxRg&sai=AMfl-YTxnk5bhYRHyyYz34AydWx78AnkxUb1YhHh64fay7gnA0SIuMU4r5Ke9uZSpxYAAfh67nVLt37O1u6T0lKFSh2IP46Kq0K-lMwPsKHOufssjai5n9e_PMUw7bg&sig=Cg0ArKJSzFMWQMaLf-UqEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
9818.js
ads.rubiconproject.com/ad/ Frame 843A
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=10489
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Fri, 17 May 2019 21:53:52 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 843A
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 843A
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
view
securepubads.g.doubleclick.net/pcs/ Frame 17DF
0
57 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstx8Qjch0_7kb7RitJJYHi6ZtU_rE6eg9cToECTUk8nfd3qDSd-DAUY5nhM7XH11_k61_M-VKtMAk_Y35Vbzs6NX_WK1PjL1beBn-rsa_lrhaRUbSM5w6jtoG0wYyHxS5jCVLlZXmXkpIKWVYxNdpDojDhXWlXyxi9UoM3tdJ6W3C0PWhpfiQHMZQaoQubrqIR3Cedlwr5spCZmtYGikvug_UK0l4IO0XFfDsjBXakQp85U08SYazIh3Vy-1M0&sai=AMfl-YS-1ii0Q6eEoiNRGsBXSimI4_5zQj1ng6SOKonGihVxMYEVqb0Uv2cd5_ptRaOvU1uiZKEpwYMgkIjd0xq7W7craQJOvhuTg9oEg_rnfgMKuRzCsRjmLL8vOr4&sig=Cg0ArKJSzH8vkLcPtWtZEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
9818.js
ads.rubiconproject.com/ad/ Frame 17DF
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=10489
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Fri, 17 May 2019 21:53:52 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 17DF
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 17DF
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
view
securepubads.g.doubleclick.net/pcs/ Frame 30B5
0
57 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsv1crhPYXFBPooUWcwiH-7AWMftC-vY7gOIDNOZ02bMdpXo7zswtqamBLKraj3_2xOTFxlPxP8_HwfHHkdMqE4EXFPHnQsBpQ0G50xW2czPnk2RaIUFj1bySP1J07wBMRe5ko26ZGwMuVEn1qTzjsgs7CqYUHLXrq8W-fzR6YnGZhekFncaGoZvJdxsxk6XTXhfkmH3xMSh7X8aWrFKjdrmz_p1OW5sczvv5iScNsOsMfqtF1pahjgsvpRz1PCsFPHK&sai=AMfl-YTlpxoW24499XYjYWFUGLX1c6buwv1wyTs_15I5gQBqbLCeE9nZ0vsuQhQmYhirn6xRPA-v-zu6i4C4Z80CK6Ed97D3sNRwovy9iLOTh2GbQT6l57JvlzDbLmE&sig=Cg0ArKJSzOahSf6mE5ECEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 30B5
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 30B5
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
view
securepubads.g.doubleclick.net/pcs/ Frame A85D
0
57 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstZr6kdCOrYJkbecCxC8YSxl2oY8eJ2kEmG1n6EjxeLpGhmF0ckWezpdY4Jd9KWVJ0TghQjHOOWKldNMtRcBgp3LxgViTXfGnbG1NfR52zFi5ieFtyl7xjS6RyfMpr29zg8VgwqJCsEbX6LJs-I4zxWbqeFK32Fu9YJv7GGoaYBtVDEBPpPb4gEZZTL7DQHM_USdfcXnu9fM-vWGjeFnI7oi7tlg3ci3vYlzICi98IPox5S-8XjV5uCfefJhBs&sai=AMfl-YQaQROQbHBUZi2-ImIKJbMPGxn4FHBB9gXxVznIqhhxJyJFSub0nxAQDppU_RTEFBdM2ghiXeR4MPct-buGWk4y676eOuiTTC9ZMAk9Yb7vw9zTRu3czKs8NC0&sig=Cg0ArKJSzASQtv1lTbOTEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
9818.js
ads.rubiconproject.com/ad/ Frame A85D
26 KB
8 KB
Script
General
Full URL
https://ads.rubiconproject.com/ad/9818.js
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache / PHP/5.3.3
Resource Hash
d02197080b9680999381b5f5337fedd92674e5a1550ddfcc0c70612d3170a5e3

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Server
Apache
X-Powered-By
PHP/5.3.3
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=10489
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
7558
Expires
Fri, 17 May 2019 21:53:52 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame A85D
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame A85D
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
view
securepubads.g.doubleclick.net/pcs/ Frame AD52
0
57 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuwPbQKWplBSapqNQVHHjTjjg3eCK50FYnOtitJmz6k2RviPjgZ0LmZ060-VFCGlAFSssWQrTih9lLP0gPL3-4c9WV0OsenjtTzY_5NIRqji-joP4h4XVQVpbUFv38v3jmefIznTXSlfOJgOeHwjMCzhPT--c66OkNkh8sBNEbIZhK5JJxc6uVy6grdwXgDeuxWfUF0uYlJnT_G4LdaUmRG4z0OoTHKljIWt-nBwsZQ1VQFoQadiRDLB7SgQi8J9DWO&sai=AMfl-YRcHEHIa7m67bGArIiDHvC2N3q4W2ps9AxiKkT7xVVM-gMuS6TRLn6VXLxvU-462GV4fLeYH_QGsx0ToXXWW1g2kFzBYl1fWRPga6usZJOtv1QsBNr7UkrlDvc&sig=Cg0ArKJSzHduuJMQ4tKAEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:03 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
adKit.min.js
rev.cbsi.com/common/js/ Frame AD52
6 KB
2 KB
Script
General
Full URL
https://rev.cbsi.com/common/js/adKit.min.js?448591799
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.215.35 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-215-35.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2bf78db102c9d6e84c8e86cd2bd6134383688ae866a991028728b62f482358ab

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Last-Modified
Mon, 13 May 2019 18:29:20 GMT
Server
Apache
ETag
"e524dc608d5c7c30eef57b6ed95dc6a8:1557772160"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2149
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame AD52
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame AD52
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56741
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
/
www.facebook.com/tr/ Frame 268E
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
4659
pragma
no-cache
cache-control
no-cache
origin
https://www.zdnet.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
accept-encoding
gzip, deflate, br
cookie
fr=0G7IAnF76hkL1oOnr..Bc3wR2...1.0.Bc3wR2.
Origin
https://www.zdnet.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://www.zdnet.com
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains
content-length
0
server
proxygen-bolt
date
Fri, 17 May 2019 18:59:03 GMT
truncated
/ Frame E26B
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f4c97325283e11e8549570c5e71bfdd30f635f79218b00a1e98121e82712be26

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
283812-15.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 843A
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.5021719560612945&tk_st=1&rf=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.21 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
fa0624045d87f1a4e54430bfe31a7b06664eca63e4104afa86ba518ec33af494

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=10
Content-Length
920
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-15.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame 17DF
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.9465825074308298&tk_st=1&rf=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.21 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
6b2d2d575aad86ec0f993f7b0e27ce9ebf6e7e380c730ee94c71feac283d71e6

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=8
Content-Length
922
Expires
Wed, 17 Sep 1975 21:32:10 GMT
283812-2.js
optimized-by.rubiconproject.com/a/9818/59604/ Frame A85D
2 KB
1 KB
Script
General
Full URL
https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.6272375656838665&tk_st=1&rf=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Requested by
Host: ads.rubiconproject.com
URL: https://ads.rubiconproject.com/ad/9818.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.21 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
271d2f1e292698486c65b43f22a941e44da8ca3ee3dc32b6917e5ceb4ea6ae15

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Connection
Keep-Alive
Content-Type
text/javascript
Keep-Alive
timeout=0, max=10
Content-Length
918
Expires
Wed, 17 Sep 1975 21:32:10 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.5.97.37 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-5-97-37.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Sat, 18 May 2019 18:59:03 GMT
load.js
widget.perfectmarket.com/cbsinteractive-zdnet/
13 KB
5 KB
Script
General
Full URL
https://widget.perfectmarket.com/cbsinteractive-zdnet/load.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1d1eab2e9d5b36e1297db68599d3e9c3df71869a0863fb261972b93e919d7af1

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
rwr9L97XovW8QPypI62jHvd7E2HiNZm2
content-encoding
gzip
age
15
x-cache
HIT, MISS
status
200
date
Fri, 17 May 2019 18:59:03 GMT
content-length
4742
x-amz-id-2
AkshY3I0Gxy0z2bBpUheckl6oaRq90BQqzi+gDE/HMa4d9U6rRkHzATCfAO+Dx/tdwobnf51GRw=
x-served-by
cache-lax8623-LAX, cache-hhn1538-HHN
last-modified
Thu, 20 Oct 2016 17:48:07 GMT
server
AmazonS3
x-timer
S1558119543.327562,VS0,VE151
etag
"fc0de48a0976cde02ddee0bd49a81832"
vary
Accept-Encoding,,
x-amz-request-id
3F9379D0A3071BCD
via
1.1 varnish, 1.1 varnish
cache-control
max-age=300
accept-ranges
bytes
content-type
binary/octet-stream
x-cache-hits
1, 0
impl.357-555-RELEASE.js
cdn.taboola.com/libtrc/
371 KB
106 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.357-555-RELEASE.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ccb495d0acff071f9579c467fc7c1cccb9281e36293a4dcf307020c4e068004b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
BTGx9el_vltLTHRDixyKYD0MpS1RJBIj
content-encoding
gzip
age
98
x-cache
HIT
status
200
date
Fri, 17 May 2019 18:59:03 GMT
x-amz-replication-status
COMPLETED
content-length
107905
x-amz-id-2
yrD+4DXHykGD9fThQueW0RST/L/B0fTYxFBJ72jrtnzOEjjV7IYV3qZ1SzPFa5Mo6LO5FUKm618=
x-served-by
cache-hhn1548-HHN
last-modified
Thu, 16 May 2019 15:51:50 GMT
server
AmazonS3
x-timer
S1558119543.282079,VS0,VE0
etag
"33ae4be959d530eef3b960f269842a9a"
vary
Accept-Encoding
x-amz-request-id
2543EA1C6585E711
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
85
x-cache-hits
1356
tag.aspx
ml314.com/ Frame C66E
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?1742019
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
2bf96ddd3980547587d2dbb32c14e3892b59c5fc8b13b7e8dd14c0f71cf99628

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:02 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 May 2019 20:27:29 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=5306
Connection
keep-alive
Content-Length
11914
Expires
Fri, 17 May 2019 20:27:29 GMT
n.js
geo.moatads.com/ Frame C66E
135 B
399 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7B%2CNr1U*%26ujMUU8fvb%26%22B&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF7HfC7Kn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&qr=0&i=CBSDFPCW2&hp=1&cm=24&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1558119543252&de=903396315735&m=0&ar=1d14137-clean&q=2&cb=0&cu=1558119543252&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745699004%3A138239468890&zMoatPS=nav&zMoatPT=article&zMoatW=5&zMoatH=5&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatSN=h&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatDev=Desktop&zMoatAType=content_article&zMoatTest=zdnet&zMoatMMV_MAX=na&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&id=1&bo=23605329&bp=23619609&bd=nav&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&zMoatOrigSlicer1=23605329&zMoatOrigSlicer2=23619609&gw=cbsdfp5832910442&fd=1&ac=1&it=500&iq=na&tt=na&tu=&tp=&fs=164008&na=1385805380&cs=0&callback=MoatSuperV26.gna144546
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.177.188.212 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-177-188-212.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
3743db9b8e74bb263306e74d13b864ef4357dba65c689c202ec6f4daa5b3720d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Server
nginx/1.7.9
Etag
"762104c92adaae8152726283b1e273aaf022c8c9"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
135
n.js
geo.moatads.com/
133 B
397 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7B%2CNr1U*%26ujMUU8fvb%26%22B&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF7HfC7Kn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&qr=0&i=CBSDFPCW2&hp=1&cm=24&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1558119543252&de=903396315735&m=0&ar=1d14137-clean&q=3&cb=0&cu=1558119543252&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745699004%3A138239468890&zMoatPS=nav&zMoatPT=article&zMoatW=5&zMoatH=5&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatSN=h&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatDev=Desktop&zMoatAType=content_article&zMoatTest=zdnet&zMoatMMV_MAX=na&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&id=1&bo=23605329&bp=23619609&bd=nav&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=5x5&zMoatSZPS=5x5%20%7C%20nav&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&zMoatOrigSlicer1=23605329&zMoatOrigSlicer2=23619609&gw=cbsdfp5832910442&fd=1&ac=1&it=500&iq=na&tt=na&tu=&tp=&fs=164008&na=1187092101&cs=0&callback=MoatDataJsonpRequest
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.177.188.212 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-177-188-212.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
472185b39c87ec46ea084f28d2b1db60dfa47acebdc08d6d21647305cc73b6a9

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Server
nginx/1.7.9
Etag
"c4a51deee92a4d0d049a10c9a4c6e438ae2ac235"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
133
n.js
geo.moatads.com/ Frame E26B
133 B
397 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7B%2CNr1U*%26ujMUU8fvb%26%22B&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF7HfC7Kn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&qr=0&i=CBSDFPCW2&hp=1&cm=21&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1558119543339&de=994025957680&m=0&ar=1d14137-clean&q=7&cb=0&cu=1558119543339&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=4629503254%3A2488641989%3A4955832456%3A138262432800&zMoatPS=top&zMoatPT=article&zMoatW=11&zMoatH=11&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatSN=h&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatDev=Desktop&zMoatAType=content_article&zMoatTest=zdnet&zMoatMMV_MAX=na&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&id=1&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=11x11&zMoatSZPS=11x11%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&zMoatOrigSlicer1=23605329&zMoatOrigSlicer2=23619609&gw=cbsdfp5832910442&fd=1&ac=1&it=500&iq=na&tt=na&tu=&tp=&fs=164008&na=12799872&cs=0&callback=MoatSuperV26.gna101667
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.9.25.189 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-9-25-189.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
69e3c828babd960b3c1c7f5d333b86dfb8a698d1c781e0802e9a7961bcdfe6f4

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Server
nginx/1.7.9
Etag
"8f2ddd105df784338bdae0e1bc3e119207f654f3"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
133
gpt.js
www.googletagservices.com/tag/js/ Frame AD52
31 KB
10 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: rev.cbsi.com
URL: https://rev.cbsi.com/common/js/adKit.min.js?448591799
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
db798d296b529a533608ad27deb384e0247cf762ef44f3e04107ae4bb2be9ba8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"169 / 889 of 1000 / last-modified: 1558022742"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10526
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
b
sb.scorecardresearch.com/
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1558119543421&ns_c=UTF-8&cv=3.1e&c8=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&c7=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&c9=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.5.97.37 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-5-97-37.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
integrator.js
adservice.google.de/adsid/ Frame AD52
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame AD52
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
pubads_impl_2019051301.js
securepubads.g.doubleclick.net/gpt/ Frame AD52
152 KB
55 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
sffe /
Resource Hash
2b83db827fbd3e671aa2f4628103e8da1f4b96c7e935025b8742e5e7098a6b66
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 May 2019 13:05:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
56606
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
n.js
geo.moatads.com/ Frame 30B5
135 B
399 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7B%2CNr1U*%26ujMUU8fvb%26%22B&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF7HfC7Kn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&qr=0&i=CBSDFPCW2&hp=1&cm=9&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1558119543469&de=920164332552&m=0&ar=1d14137-clean&q=12&cb=0&cu=1558119543469&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4745327422%3A138239368367&zMoatPS=top&zMoatPT=article&zMoatW=641&zMoatH=321&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatSN=h&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatDev=Desktop&zMoatAType=content_article&zMoatTest=zdnet&zMoatMMV_MAX=na&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&id=1&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=641x321&zMoatSZPS=641x321%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&zMoatOrigSlicer1=23605329&zMoatOrigSlicer2=23619609&gw=cbsdfp5832910442&fd=1&ac=1&it=500&iq=na&tt=na&tu=&tp=&fs=164008&na=2072128041&cs=0&callback=MoatSuperV26.gna818167
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.177.188.212 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-177-188-212.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
9eae76240f1d1bd172241e6b9fc92685ec4e842d8b4eeef440c3ce306532963d

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Server
nginx/1.7.9
Etag
"958c18e9fdc49870d3f9c97192c7d11cf310482d"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
135
n.js
geo.moatads.com/ Frame AD52
134 B
398 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7B%2CNr1U*%26ujMUU8fvb%26%22B&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF7HfC7Kn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&qr=0&i=CBSDFPCW2&hp=1&cm=15&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1558119543545&de=564829339503&m=0&ar=1d14137-clean&q=17&cb=0&cu=1558119543545&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=25477209%3A2356361194%3A4825966980%3A138247024569&zMoatPS=top&zMoatPT=article&zMoatW=371&zMoatH=771&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatSN=h&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatDev=Desktop&zMoatAType=content_article&zMoatTest=zdnet&zMoatMMV_MAX=na&qs=1&zGSRC=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&id=1&bo=23605329&bp=23619609&bd=top&dfp=0%2C1&la=23619609&zMoatNotCnet=true&zMoatFT=Not%20Specified&zMoatSZ=371x771&zMoatSZPS=371x771%20%7C%20top&zMoatPTAT=article%20%7C%20content_article&zMoatPTATSECT=article%20%7C%20content_article&zMoatAB=content_article-zdnet&zMoatOrigSlicer1=23605329&zMoatOrigSlicer2=23619609&gw=cbsdfp5832910442&fd=1&ac=1&it=500&iq=na&tt=na&tu=&tp=&fs=164008&na=1589707868&cs=0&callback=MoatSuperV26.gna609075
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.177.188.212 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-177-188-212.eu-west-2.compute.amazonaws.com
Software
nginx/1.7.9 /
Resource Hash
601d4be6734f9b9055ca0994fe94ead1cb46e0e2c1d16fb9b85389d0ac51ab18

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:03 GMT
Server
nginx/1.7.9
Etag
"03b6581770c7d4e3d8a11a741940ab3c7dc215b2"
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=900
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
134
pmk-201618008.1.js
widget.perfectmarket.com/cbsinteractive-zdnet/
323 KB
89 KB
Script
General
Full URL
https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4f72e8df44e82a8066b16ca8ab2d59f8f9ef21fa52c07d8554972f48b5105f13

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
bVoOWfmxkMrYwv2s6Uu9D96fE._5IBqu
content-encoding
gzip
age
17823958
x-cache
HIT, HIT
status
200
date
Fri, 17 May 2019 18:59:03 GMT
content-length
91236
x-amz-id-2
T2A7wWXMDNgx2Z35EWhae8i8jDSVEo/Aqmbmta3HbEBKVMhwoZJKjGQuEf/CaAEiaINfKwR6uJs=
x-served-by
cache-lax8642-LAX, cache-hhn1538-HHN
last-modified
Thu, 20 Oct 2016 17:47:53 GMT
server
AmazonS3
x-timer
S1558119544.670464,VS0,VE0
etag
"da73fb2066df9f51d08b6688cfb35441"
vary
Accept-Encoding,,
x-amz-request-id
58FF20717A687DE4
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31536000
accept-ranges
bytes
content-type
text/javascript
x-cache-hits
2400, 1580
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 843A
61 KB
23 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.5021719560612945&tk_st=1&rf=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4b831ed213345ed9b07d3990d7c03e6b9e5d20b2576e493f29fe43c842adf5da
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
23852
x-xss-protection
0
server
cafe
etag
11928154304243052214
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:03 GMT
76e85749-d94f-4e0a-98d0-dae0ce3c862a
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 843A
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/76e85749-d94f-4e0a-98d0-dae0ce3c862a?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=15&e=6A1E40E384DA563BDF1350E5B28423A6BD4DB3BE83DF99644E5BD06FAB49425B3A8A4AF4755AC7061742CD42DAA30352FE5D718BBE08EF1C4480E0E0EDC59C6E21D78F81B778E89F3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B30827AD641F09AB5218F5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.67 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
Cache-Control
private, max-age=0, no-cache
Expires
01 Jan 1970 10:00:00 GMT
Server
Rubicon Project
Content-Length
43
Content-Type
image/webp
public.json
platform-cdn.sharethrough.com/api/external/v1/placements/8ec3a4f3/
3 KB
2 KB
XHR
General
Full URL
https://platform-cdn.sharethrough.com/api/external/v1/placements/8ec3a4f3/public.json
Requested by
Host: native.sharethrough.com
URL: https://native.sharethrough.com/assets/sfp.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.167.30 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-167-30.fra54.r.cloudfront.net
Software
nginx/1.14.2 /
Resource Hash
cc99f3115f9b0ed34a503c246d3b1e62faba8fd08eff6474a6de351f0e4a4f94
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 13:30:25 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
User-Cache-Control
no-cache, must-revalidate
X-Amz-Cf-Pop
FRA54
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
1395
X-XSS-Protection
1; mode=block
X-Request-Id
0733c8b6-6937-49c0-aada-699fe5209019
X-Runtime
0.033374
Access-Control-Allow-Origin
*
User-Header
Expires: Sat, 26 Jul 1997 05:00:00 GMT
Server
nginx/1.14.2
ETag
W/"cc99f3115f9b0ed34a503c246d3b1e62"
X-Frame-Options
SAMEORIGIN
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8
Via
1.1 e4a44efc4b3241dc23019df63a1f645c.cloudfront.net (CloudFront)
Cache-Control
max-age=900, public
X-Amz-Cf-Id
nB6O6DZ25F8jDz9vWpielq0zzM4lFJ__PoZtrM2xeiHbJQz6WNUvpQ==
ads
securepubads.g.doubleclick.net/gampad/ Frame AD52
29 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=396517832978813&correlator=630427982766042&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&eid=21062832%2C21062886%2C21063202%2C21063505%2C953563517&vrg=2019051301&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A32776%2C8%3A32776&sc=1&sfv=1-0-33&ecs=20190517&iu_parts=8264%2Cuk-zdnet%2Csecurity&enc_prev_ius=%2F0%2F1%2F2%2C%2F0%2F1%2F2&prev_iu_szs=372x142%2C372x142&prev_scp=env%3Dprod%26session%3Dh%26subses%3D2%26ptype%3Darticle%26vguid%3Ddd8c9508-9fc0-4b5d-9d0f-5c21a2117e33%7Cenv%3Dprod%26session%3Dh%26subses%3D2%26ptype%3Darticle%26vguid%3Ddd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&cookie=ID%3D5f0b6c3cf2f79837%3AT%3D1558119542%3AS%3DALNI_MZC4UBSEveblcrccOm7SeZtplUyVg&cdm=www.zdnet.com&bc=31&lmt=1558119543&dt=1558119543729&dlt=1558119543058&idt=664&frm=23&biw=1585&bih=1200&isw=371&ish=771&oid=3&adxs=0%2C0&adys=0%2C0&adks=3261246841%2C3261246840&ucis=c04lk2okz67%7Cwgs96y8e3gqx&ifi=1&ifk=3274159835&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=1&iag=3&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&top=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&dssz=16&icsg=43552&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x0%7C0x0&msz=0x0%7C0x0&blev=1&bisch=1&ga_vid=1978830033.1558119544&ga_sid=1558119544&ga_hid=1135866636&fws=384%2C384
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
f9a7f6508560faad108781bd426d89126a96c9ae6d9ac4517e509556e1692550
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
7205
x-xss-protection
0
google-lineitem-id
4746066197,4746066197
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138239468731,138239375540
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019051301.js
securepubads.g.doubleclick.net/gpt/ Frame AD52
71 KB
27 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
sffe /
Resource Hash
bd9265e706c41cf364cc226eeea4b77dcc188fda93940f4050af552eb553db0f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 May 2019 13:05:10 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
27438
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:03 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-33/html/ Frame AD52
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-33/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:814::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

show_ads.js
pagead2.googlesyndication.com/pagead/ Frame 17DF
61 KB
23 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-15.js?&cb=0.9465825074308298&tk_st=1&rf=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_15&rp_secure=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4b831ed213345ed9b07d3990d7c03e6b9e5d20b2576e493f29fe43c842adf5da
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
23852
x-xss-protection
0
server
cafe
etag
11928154304243052214
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:03 GMT
a2beeb34-8a2d-4533-85bb-ef3857d25722
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame 17DF
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/a2beeb34-8a2d-4533-85bb-ef3857d25722?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=15&e=6A1E40E384DA563BD7B3390B91008435ADC7259B24D1261E9CCD790FC4684968FAE938147A0762E7703D326F7D4C0CB5FE5D718BBE08EF1CAF64C6FD10A4D88C21D78F81B778E89F3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B30827AD641F09AB5218F5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.67 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
Cache-Control
private, max-age=0, no-cache
Expires
01 Jan 1970 10:00:00 GMT
Server
Rubicon Project
Content-Length
43
Content-Type
image/webp
integrator.js
adservice.google.de/adsid/ Frame 843A
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 843A
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 843A
68 B
173 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 11:23:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
27356
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
88
x-xss-protection
0
expires
Fri, 17 May 2019 23:23:07 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/ Frame 843A
204 KB
76 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
3d5094c1d23b5cf90a1e612d406a1c09b89533c889c287e316aa8ec1da3151f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
77648
x-xss-protection
0
server
cafe
etag
10849630386184038813
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:03 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/ Frame 0C81
204 KB
76 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
3d5094c1d23b5cf90a1e612d406a1c09b89533c889c287e316aa8ec1da3151f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
77648
x-xss-protection
0
server
cafe
etag
10849630386184038813
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:03 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20190513/r20190131/ Frame E3F5
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20190513/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20190513/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUk6HVuLJvvYs3FCZN-6kuPLh-nJTzVvpcHl4fFprECgESMf5jwakXDipqu0
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Mon, 13 May 2019 13:17:50 GMT
expires
Mon, 27 May 2019 13:17:50 GMT
content-type
text/html; charset=UTF-8
etag
7423447574459395779
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
6990
x-xss-protection
0
cache-control
public, max-age=1209600
age
366073
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
usync.html
eus.rubiconproject.com/ Frame FDC2
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 07 May 2019 18:54:29 GMT
Content-Encoding
gzip
Content-Length
7450
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=82039
Expires
Sat, 18 May 2019 17:46:22 GMT
Date
Fri, 17 May 2019 18:59:03 GMT
Connection
keep-alive
Vary
Accept-Encoding
integrator.js
adservice.google.de/adsid/ Frame 17DF
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 17DF
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame 17DF
68 B
145 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 11:23:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
27356
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
88
x-xss-protection
0
expires
Fri, 17 May 2019 23:23:07 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/ Frame 17DF
204 KB
76 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
3d5094c1d23b5cf90a1e612d406a1c09b89533c889c287e316aa8ec1da3151f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
77648
x-xss-protection
0
server
cafe
etag
10849630386184038813
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:03 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/ Frame 3938
204 KB
76 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
3d5094c1d23b5cf90a1e612d406a1c09b89533c889c287e316aa8ec1da3151f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
77648
x-xss-protection
0
server
cafe
etag
10849630386184038813
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:03 GMT
usync.html
eus.rubiconproject.com/ Frame C667
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 07 May 2019 18:54:29 GMT
Content-Encoding
gzip
Content-Length
7450
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=82038
Expires
Sat, 18 May 2019 17:46:22 GMT
Date
Fri, 17 May 2019 18:59:04 GMT
Connection
keep-alive
Vary
Accept-Encoding
show_ads.js
pagead2.googlesyndication.com/pagead/ Frame A85D
61 KB
23 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: optimized-by.rubiconproject.com
URL: https://optimized-by.rubiconproject.com/a/9818/59604/283812-2.js?&cb=0.6272375656838665&tk_st=1&rf=https%3A//www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/&rp_s=c&p_pos=btf&p_screen_res=1600x1200&ad_slot=59604_2&rp_secure=1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4b831ed213345ed9b07d3990d7c03e6b9e5d20b2576e493f29fe43c842adf5da
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
23852
x-xss-protection
0
server
cafe
etag
11928154304243052214
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:03 GMT
2f520ceb-e1ce-4f06-bd78-19d5cf9c5dac
beacon-eu-ams3.rubiconproject.com/beacon/d/ Frame A85D
43 B
268 B
Image
General
Full URL
https://beacon-eu-ams3.rubiconproject.com/beacon/d/2f520ceb-e1ce-4f06-bd78-19d5cf9c5dac?oo=51&accountId=9818&siteId=59604&zoneId=283812&sizeId=2&e=6A1E40E384DA563BA7966DE82C179D4D4AE4522AFF9146B7B0B31DE1055CD9C4CA2BB70061D810D4744F9039B9519A509833B6E12CCD46A9D752AF604B246C1A21D78F81B778E89F3570ECD3831C9446AC237D6FA0EBFC9ADFFA16DC2C67B30827AD641F09AB5218F5BE0B04AD33F58D33F8630F2FDB6069
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.67 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
Rubicon Project /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:03 GMT
Cache-Control
private, max-age=0, no-cache
Expires
01 Jan 1970 10:00:00 GMT
Server
Rubicon Project
Content-Length
43
Content-Type
image/webp
truncated
/ Frame 843A
214 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6817ae148b948b4083d192b8be892ac0d8b5ba7225c6ee5cbe847ebc73746c79

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
view
securepubads.g.doubleclick.net/pcs/ Frame 9261
0
165 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsuZjC_KZBjS02fTPbCk3RbvTPYHzyqaHU95tUSKL-G92HJosnLGDxqTviMkiDoxwAhK6XQACn8uU7tJyWVJGK8jbdFUXCDltZU_w2QzIC91A0QE-qAg6yH3WHop6SwsXJ6jxBAImi3Hx_TBJmJtAJlTpPWxOPRafjpxUq4F4Je0UPWLsxlD2_JwbrTSysDDDwfheIsOfeXnJdvuEM4UA0y741N7TJ2mqPdkyWwDKSd9nxXwGgfXblODISwyBORRxLR2&sai=AMfl-YSK_bll5FY0mYi0LBjJAGwhoxR34jdaOQV-qQ25F4oel5dnY9J5j1zdh7wH6mYvTKwlRDv7_ku948ZK2q1dSN9oAfH-okK7GZUeXguJo0fYrjpOaj5OkmdcdXg&sig=Cg0ArKJSzCjFKRQ7GEoCEAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:04 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:04 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 9261
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:04 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 9261
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:04 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56740
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
osd.js
www.googletagservices.com/activeview/js/current/ Frame AD52
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019051301.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
477a6024d6d851678c69ba63dd809ad308929d173ef21ed62d7bc8b0176928de
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28709
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:04 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame 8593
0
142 B
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstGImnlc_KIKwoyhF-AbbW83udKjjefhSFEOWgJ1yaACIA6WiCWsmukGL82PE5Z1vwyR3nJ-IuZgHL69UnS-qNMnjQ8Q5jrXVZZdMzx55gqikwwiVxZ625nwu-YqvhZ0eGPnR5DdPXy_XYTULcKvHApoLrd7cPn1OrqUDaY8FnVEWVboWFP5PcnQo5PniYtWQSumGnRkWGhSyvDCK72ywpAcfbrCBXijA8vY0QjrUYpvh_p2MccHKBTbG0lsxg1dTY9&sai=AMfl-YQ6Mxb2Ty82gBxnqBU6LFA_gvQkLOdT8xskN8makFfzwNvV59l-tZgrFqN1LT6nbSGXUJnLV-jSSArPrr_cGd-uvmcOKMLc2J3aXq1WR2gQL5U3xLOlxv47ArQ&sig=Cg0ArKJSzESxxyLF8E-REAE&urlfix=1&adurl=
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.66 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s17-in-f66.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 17 May 2019 18:59:04 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:04 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 8593
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f6f3bfa2ccf26465c1618190e2393c73d2215b1bf1c4aaa8b58366604c7985a4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28657
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:04 GMT
moatad.js
z.moatads.com/cbsdfp5832910442/ Frame 8593
303 KB
94 KB
Script
General
Full URL
https://z.moatads.com/cbsdfp5832910442/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019051301.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
f5bffb5525efc32fde6b2e91ec82150d4de7f1421af9ddf6674db27efc1b0337

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:04 GMT
Content-Encoding
gzip
Last-Modified
Thu, 09 May 2019 14:19:16 GMT
Server
AmazonS3
x-amz-request-id
0070BA0502F2431B
ETag
"5fbadbf67fe83509f799fa3da1583a08"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=56740
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
95816
x-amz-id-2
oPLJefa1/4BKY4QMFglttfqIR3KfIgsHSrZLqUOgekG8no5YtvQkuZXEYkn0hctqgNscSiohRns=
truncated
/ Frame 17DF
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
cf3d043a0549e696894100c2c03570ad94aa41e4212c4cfbb5cbfe8db1940267

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=18&fi=0&apd=35&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1558119544069&r=685691123570&t=meas&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=middle&zMoatPT=article&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=18&fi=0&apd=35&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1558119544069&r=685691123570&t=nht&os=1&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=middle&zMoatPT=article&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
7dff09578729615fcd15c840a32c9f82a33fe2331a851e4ac40be03cb111b3f0
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 02 May 2019 01:33:03 GMT
server
Golfe2
age
4328
date
Fri, 17 May 2019 17:46:56 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
17779
expires
Fri, 17 May 2019 19:46:56 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.5.97.37 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-5-97-37.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:04 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Sat, 18 May 2019 18:59:04 GMT
integrator.js
adservice.google.de/adsid/ Frame A85D
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame A85D
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.zdnet.com
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
ca-pub-1991679624331369.js
pagead2.googlesyndication.com/pub-config/r20160913/ Frame A85D
68 B
150 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-1991679624331369.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8ba131a677ea1357ae7fdc95d6a5c67c3b02d171bb286f6c9ec6bce3cef5c211
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 11:23:07 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
age
27357
content-type
text/javascript
status
200
cache-control
public, max-age=43200
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
88
x-xss-protection
0
expires
Fri, 17 May 2019 23:23:07 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/ Frame A85D
204 KB
76 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
3d5094c1d23b5cf90a1e612d406a1c09b89533c889c287e316aa8ec1da3151f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
77648
x-xss-protection
0
server
cafe
etag
10849630386184038813
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:04 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/ Frame DDA9
204 KB
76 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/show_ads.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
3d5094c1d23b5cf90a1e612d406a1c09b89533c889c287e316aa8ec1da3151f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
77648
x-xss-protection
0
server
cafe
etag
10849630386184038813
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Fri, 17 May 2019 18:59:04 GMT
usync.html
eus.rubiconproject.com/ Frame 49D4
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html?&geo=eu&co=de
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.111.230.142 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-230-142.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Tue, 07 May 2019 18:54:29 GMT
Content-Encoding
gzip
Content-Length
7450
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=82038
Expires
Sat, 18 May 2019 17:46:22 GMT
Date
Fri, 17 May 2019 18:59:04 GMT
Connection
keep-alive
Vary
Accept-Encoding
ads
googleads.g.doubleclick.net/pagead/ Frame 2413
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=418362401&adf=2269224025&w=300&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119543746&bpp=57&bdt=735&fdt=459&idt=460&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=2&ga_vid=631639643.1558119544&ga_sid=1558119544&ga_hid=1970459907&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1062&biw=1585&bih=1200&isw=300&ish=250&ifk=2447955845&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=3832671437&ifi=1&uci=1.kc3b55e558ho&fsb=1&dtd=487
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=418362401&adf=2269224025&w=300&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119543746&bpp=57&bdt=735&fdt=459&idt=460&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=2&ga_vid=631639643.1558119544&ga_sid=1558119544&ga_hid=1970459907&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=1062&biw=1585&bih=1200&isw=300&ish=250&ifk=2447955845&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=3832671437&ifi=1&uci=1.kc3b55e558ho&fsb=1&dtd=487
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
accept-encoding
gzip, deflate, br
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Fri, 17 May 2019 18:59:04 GMT
server
cafe
content-length
19630
x-xss-protection
0
set-cookie
IDE=AHWqTUntLjq0SV19-dX1z-Copkzabe87XkjmSwdAuFFhVL7q9Mt52x6P2D7W3u6N; expires=Wed, 10-Jun-2020 18:59:04 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
expires
Fri, 17 May 2019 18:59:04 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/ Frame 843A
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
477a6024d6d851678c69ba63dd809ad308929d173ef21ed62d7bc8b0176928de
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28709
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:04 GMT
tboptevent.html
widget.perfectmarket.com/opt/ Frame 4ECB
0
0
Document
General
Full URL
https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash

Request headers

:method
GET
:authority
widget.perfectmarket.com
:scheme
https
:path
/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22a%22%3A1%7D%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

status
404
server
Varnish
retry-after
0
accept-ranges
bytes
date
Fri, 17 May 2019 18:59:04 GMT
via
1.1 varnish
x-served-by
cache-hhn1538-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1558119544.290009,VS0,VE0
content-length
0
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=28&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1558119544291&r=869492257065&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=bottom&zMoatPT=article&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=28&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1558119544291&r=869492257065&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=bottom&zMoatPT=article&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
collect
www.google-analytics.com/r/
35 B
101 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j75&aip=1&a=2052651849&t=pageview&_s=1&dl=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&ul=en-us&de=UTF-8&dt=Chinese%20cyberspies%20breached%20TeamViewer%20in%202016%20%7C%20ZDNet&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=YAhAAEAB~&jid=1378334690&gjid=590894281&cid=1097290917.1558119542&tid=UA-33613588-22&_gid=358398331.1558119544&_r=1&cd2=other&z=149707437
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:04 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=282&fi=0&apd=299&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1558119544069&r=685691123570&t=hdn&os=1&fi2=0&div1=0&ait=132&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=middle&zMoatPT=article&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 5A00
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=418362401&adf=2269224024&w=300&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119543905&bpp=35&bdt=885&fdt=484&idt=484&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=1&ga_vid=1097290917.1558119542&ga_sid=1558119544&ga_hid=1305262698&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=2628&biw=1585&bih=1200&isw=300&ish=250&ifk=4270700886&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=3832671437&ifi=1&uci=1.xn71r8w9barl&fsb=1&dtd=494
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=250&slotname=8385808081&adk=418362401&adf=2269224024&w=300&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119543905&bpp=35&bdt=885&fdt=484&idt=484&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=1&ga_vid=1097290917.1558119542&ga_sid=1558119544&ga_hid=1305262698&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1043&ady=2628&biw=1585&bih=1200&isw=300&ish=250&ifk=4270700886&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C300%2C250&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=3832671437&ifi=1&uci=1.xn71r8w9barl&fsb=1&dtd=494
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
accept-encoding
gzip, deflate, br
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Fri, 17 May 2019 18:59:04 GMT
server
cafe
content-length
46
x-xss-protection
0
set-cookie
IDE=AHWqTUmcTVDdVossSc0NsWhk0hpqOIbtvQTqJZwzkIbTxMpKASs-5kQSVoglZ8fR; expires=Wed, 10-Jun-2020 18:59:04 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
expires
Fri, 17 May 2019 18:59:04 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/ Frame 17DF
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
477a6024d6d851678c69ba63dd809ad308929d173ef21ed62d7bc8b0176928de
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28709
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:04 GMT
truncated
/ Frame A85D
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0c8a48c2b9dd6a6e490ef1571a38947a48cbd4dd2ef367182fbdcc1a4129efcf

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=39&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1558119544485&r=711452083294&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=bottom&zMoatPT=article&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=39&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1558119544485&r=711452083294&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=bottom&zMoatPT=article&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 0C16
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=2606246846&adf=2269224026&w=728&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119544184&bpp=13&bdt=1146&fdt=374&idt=374&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=1&ga_vid=1097290917.1558119542&ga_sid=1558119545&ga_hid=2050599694&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=3160&biw=1585&bih=1200&isw=728&ish=90&ifk=813396240&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=4066913089&ifi=1&uci=1.he8ykfzc0t8w&fsb=1&dtd=383
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-1991679624331369&output=html&h=90&slotname=3084619100&adk=2606246846&adf=2269224026&w=728&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&ea=0&flash=0&wgl=1&adsid=NT&dt=1558119544184&bpp=13&bdt=1146&fdt=374&idt=374&shv=r20190513&cbv=r20190131&saldr=sa&correlator=1988832729951&frm=23&ife=5&pv=1&ga_vid=1097290917.1558119542&ga_sid=1558119545&ga_hid=2050599694&ga_fc=0&iag=3&icsg=43368&nhd=1&dssz=18&mdo=0&mso=1&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=429&ady=3160&biw=1585&bih=1200&isw=728&ish=90&ifk=813396240&scr_x=0&scr_y=0&eid=20040081%2C21060853&oid=3&rx=0&eae=2&fc=656&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C728%2C90&vis=1&rsz=%7C%7CopeEbr%7C&abl=CS&pfx=0&fu=20&bc=31&osw_key=4066913089&ifi=1&uci=1.he8ykfzc0t8w&fsb=1&dtd=383
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUntLjq0SV19-dX1z-Copkzabe87XkjmSwdAuFFhVL7q9Mt52x6P2D7W3u6N
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Fri, 17 May 2019 18:59:05 GMT
server
cafe
content-length
46
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
osd.js
www.googletagservices.com/activeview/js/current/ Frame A85D
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190513/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
477a6024d6d851678c69ba63dd809ad308929d173ef21ed62d7bc8b0176928de
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1557327549562739"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28709
x-xss-protection
0
expires
Fri, 17 May 2019 18:59:04 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=266&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=241984809&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1558119544291&r=869492257065&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=bottom&zMoatPT=article&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
tboptevent.html
widget.perfectmarket.com/opt/ Frame EB00
0
0
Document
General
Full URL
https://widget.perfectmarket.com/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/cbsinteractive-zdnet/pmk-201618008.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.1.181 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash

Request headers

:method
GET
:authority
widget.perfectmarket.com
:scheme
https
:path
/opt/tboptevent.html?v=2&a=u&d=%7B%22stp%22%3A%7B%22v%22%3A1%7D%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/

Response headers

status
404
server
Varnish
retry-after
0
accept-ranges
bytes
date
Fri, 17 May 2019 18:59:04 GMT
via
1.1 varnish
x-served-by
cache-hhn1538-HHN
x-cache
MISS
x-cache-hits
0
x-timer
S1558119545.616502,VS0,VE0
content-length
0
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=329&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75374362809&S1id=23605329&S2id=23619609&ord=1558119544485&r=711452083294&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=bottom&zMoatPT=article&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:04 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:04 GMT
json
trc.taboola.com/cbsinteractive-zdnet/trc/3/
12 KB
5 KB
Script
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/trc/3/json?tim=18%3A59%3A05.069&data=%7B%22id%22%3A151%2C%22ii%22%3A%22%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%22%2C%22it%22%3A%22text%22%2C%22sd%22%3Anull%2C%22ui%22%3Anull%2C%22uifp%22%3Anull%2C%22vi%22%3A1558119545065%2C%22cv%22%3A%22357-555-RELEASE%22%2C%22uiv%22%3A%22default%22%2C%22u%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F%22%2C%22bv%22%3A%220%22%2C%22ul%22%3A%5B%22en-US%22%5D%2C%22cmps%22%3A3%2C%22btv%22%3A%220%22%2C%22cos%22%3A%224g%22%2C%22bad%22%3A-1%2C%22bw%22%3A1600%2C%22sw%22%3A1600%2C%22sh%22%3A1200%2C%22r%22%3A%5B%7B%22li%22%3A%22rbox-t2m%22%2C%22s%22%3A8%2C%22uim%22%3A%22alternating-thumbnails-a%3Aabp%3D0%22%2C%22uip%22%3A%22ZDNETarticleDesktop%2FTablet-Below%20Article%20Thumbnails%22%2C%22orig_uip%22%3A%22ZDNETarticleDesktop%2FTablet-Below%20Article%20Thumbnails%22%2C%22cd%22%3A3045.09375%2C%22mw%22%3A770%7D%5D%2C%22cb%22%3A%22TRC.callbacks.recommendations_1%22%2C%22lt%22%3A%22deflated%22%7D
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.357-555-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
03083375ea5b71e1f5a1b9a281cf67d6b948c82c14bebb9ad41b9fb416fb5795

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
content-encoding
gzip
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
200
via
1.1 varnish
x-served-by
cache-hhn1548-HHN
server
nginx
x-timer
S1558119545.117651,VS0,VE211
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
expires
Thu, 01 Jan 1970 00:00:00 GMT
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=1&tuv=953&tet=1154&fi=0&apd=1171&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=25299489&L2id=251370729&L3id=253246569&L4id=75375443409&S1id=23605329&S2id=23619609&ord=1558119544069&r=685691123570&t=iv&os=1&fi2=0&div1=0&ait=1004&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=middle&zMoatPT=article&bedc=1&q=4&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:05 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:05 GMT
userx.357-555-RELEASE.es6.js
cdn.taboola.com/libtrc/
22 KB
8 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/userx.357-555-RELEASE.es6.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/cbsinteractive-zdnet/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c84f5515b2989a54f76b61c93149d8551deaff1e43ceec1d56247f91e5797768

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
E4Lo8KPS7cyvxNUM9wLDBU_ISUBcK1IZ
content-encoding
gzip
age
61
x-cache
HIT
status
200
date
Fri, 17 May 2019 18:59:05 GMT
x-amz-replication-status
COMPLETED
content-length
7624
x-amz-id-2
PW6rW4u/WTpoYqwE5MuGjQdHXfIq+B42OdasBY1t2NU+DOHyevYW/UuP8DukwTZWiY+7UfUJKkM=
x-served-by
cache-hhn1548-HHN
last-modified
Thu, 16 May 2019 15:52:26 GMT
server
AmazonS3
x-timer
S1558119545.377695,VS0,VE0
etag
"4ab02eee0abf165f80203f13538e22a5"
vary
Accept-Encoding
x-amz-request-id
264D216AB8230625
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
60
x-cache-hits
193
social
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
195 B
Image
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/social?route=AM&ri=8f5f315cae681c8d09646eef40d6664f&sd=v2_a5db9626bd7bd8c6c67291b3819dcb70_9ebb217a-5e7e-464e-8f3e-53d8c667c61f-tuct3d889f9_1558119545_1558119545_CNawjgYQzro_GOnxpbmsLSABKAEwODib4wlAhIoQSKO4GlCj7BBYAWAA&ui=9ebb217a-5e7e-464e-8f3e-53d8c667c61f-tuct3d889f9&pi=/article/chinese-cyberspies-breached-teamviewer-in-2016&wi=4401586760435727980&pt=text&vi=1558119545065&st=social-available&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A2%2C%22m%22%3A%22stp%22%7D%2C%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-link%22%2C%22nm%22%3A%22twitter%22%2C%22c%22%3A2%2C%22m%22%3A%22stp%22%7D%2C%7B%22i%22%3A%22ctx%22%2C%22ism%22%3Afalse%2C%22srx%22%3A1600%2C%22sry%22%3A1200%2C%22pd%22%3Anull%2C%22tpl%22%3A%22%22%2C%22url%22%3A%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%22%2C%22rref%22%3A%22%22%2C%22sref%22%3A%22_sessionPending_%22%2C%22hdl%22%3A%22%22%2C%22sec%22%3A%22%22%2C%22aut%22%3A%22%22%2C%22img%22%3A%22%22%2C%22v%22%3A13%7D%5D%7D&tim=18%3A59%3A05.403&id=9248&llvl=1&cv=357-555-RELEASE&
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
server
nginx
x-timer
S1558119545.407472,VS0,VE9
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
cache-control
no-cache
access-control-allow-credentials
true
x-cache-hits
0
accept-ranges
bytes
content-type
image/gif
access-control-allow-origin
*
x-served-by
cache-hhn1548-HHN
social
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
83 B
Image
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/social?route=AM&ri=8f5f315cae681c8d09646eef40d6664f&sd=v2_a5db9626bd7bd8c6c67291b3819dcb70_9ebb217a-5e7e-464e-8f3e-53d8c667c61f-tuct3d889f9_1558119545_1558119545_CNawjgYQzro_GOnxpbmsLSABKAEwODib4wlAhIoQSKO4GlCj7BBYAWAA&ui=9ebb217a-5e7e-464e-8f3e-53d8c667c61f-tuct3d889f9&pi=/article/chinese-cyberspies-breached-teamviewer-in-2016&wi=4401586760435727980&pt=text&vi=1558119545065&st=social-visible&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-share%22%2C%22nm%22%3A%22facebook%22%2C%22c%22%3A1%2C%22ln%22%3A%22above-fold%22%2C%22lx%22%3A362%2C%22ly%22%3A413%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%2C%7B%22i%22%3A%22w%22%2C%22tp%22%3A%22custom-link%22%2C%22nm%22%3A%22twitter%22%2C%22c%22%3A1%2C%22ln%22%3A%22above-fold%22%2C%22lx%22%3A670%2C%22ly%22%3A413%2C%22m%22%3A%22stp%22%2C%22v%22%3A3%7D%5D%7D&tim=18%3A59%3A05.403&id=2701&llvl=1&cv=357-555-RELEASE&
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
server
nginx
x-timer
S1558119545.407468,VS0,VE9
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
cache-control
no-cache
access-control-allow-credentials
true
x-cache-hits
0
accept-ranges
bytes
content-type
image/gif
access-control-allow-origin
*
x-served-by
cache-hhn1548-HHN
activeview
pagead2.googlesyndication.com/pcs/ Frame 843A
42 B
119 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssj0eklDfECQvC7-_Ae-pKfwNRCD4NGSk2RjQHtvT8Kx2Izjfqfk3IhrYiLOeKGAQF_gD4q9OEYzfGDP17L7nEEhlTiVCAs-xsJVk3zHls&sig=Cg0ArKJSzKVMuf84ZfdaEAE&adk=97580250&tt=2242&bs=1585%2C1200&mtos=0,0,1122,1122,1122&tos=0,0,1122,0,0&p=1062,1043,1312,1343&mkm=1&mcvt=1122&rs=3&ht=0&tfs=1145&tls=2267&mc=0.55&lte=0.55&bas=0&bac=0&avms=geo&rst=1558119543016&rpt=1049&isd=0&msd=0&lm=2&oseid=3&xdi=0&ps=1585%2C4133&ss=1600%2C1200&pt=28&deb=1-7-7-27-14-29-126-12&tvt=2250&r=v&id=osdim&vs=4&uc=9&upc=8&tgt=DIV&cl=1&cec=1&clc=1&cac=1&cd=0x0&itpl=19&v=20190508
Requested by
Host: www.zdnet.com
URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:05 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
available
trc.taboola.com/cbsinteractive-zdnet/log/3/
0
72 B
XHR
General
Full URL
https://trc.taboola.com/cbsinteractive-zdnet/log/3/available?route=AM
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.357-555-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
server
nginx
x-timer
S1558119545.424855,VS0,VE9
x-served-by
cache-hhn1548-HHN
status
204
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
access-control-allow-origin
https://www.zdnet.com
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
content-type
image/gif
x-cache-hits
0
43c068485d409ac97905957b10c6b1de.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
12 KB
12 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/43c068485d409ac97905957b10c6b1de.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
6db2c5b3d7a29769ae15475d17dcd79e9518e44446f8de1e200bc9f76b4a5586

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
90877
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/43c068485d409ac97905957b10c6b1de.jpg
content-length
12291
x-request-id
38dda7cdfb81e8b1
x-served-by
cache-hhn1548-HHN
last-modified
Thu, 16 May 2019 10:05:13 GMT
server
cloudinary
x-timer
S1558119545.460378,VS0,VE1
etag
"707477f5b7d2ac6893606c33e648e634"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
af89193769d6408ccbc36a5227dbb53a.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
13 KB
13 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/af89193769d6408ccbc36a5227dbb53a.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
726c833c18881b940a856fa791d708deb98c8891210650f7c3c5d1cf687f3cea

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
584871
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/af89193769d6408ccbc36a5227dbb53a.jpg
content-length
13447
x-request-id
0e93a42a6f838cb0
x-served-by
cache-hhn1548-HHN
last-modified
Fri, 10 May 2019 15:17:46 GMT
server
cloudinary
x-timer
S1558119545.460711,VS0,VE1
etag
"06329254c8237c04afc5cc5bd9210d07"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
ab6dcee1906c17a7547fc56498914217.png
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
12 KB
12 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/ab6dcee1906c17a7547fc56498914217.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
452618f0529d925cf73a65154e843f9fb9cd9f555d58c0255f5e06c49feba5a7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
523837
x-cache
HIT
status
200
expiration
expiry-date="Thu, 25 Apr 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/ab6dcee1906c17a7547fc56498914217.png
content-length
12170
x-served-by
cache-hhn1548-HHN
last-modified
Mon, 25 Mar 2019 08:44:54 GMT
server
cloudinary
x-timer
S1558119545.460729,VS0,VE131
etag
"231e03dfe50f4954e645ce7e4236cc5c"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
b399f15f107de251c3a7772e9b9094c8.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
6 KB
6 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/b399f15f107de251c3a7772e9b9094c8.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
7725c5c54f16127b910ebbb7d8d0fb638f654859a963da9ecf30b3e963eb2754

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
273858
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/b399f15f107de251c3a7772e9b9094c8.jpg
content-length
6307
x-request-id
c169326b22d909b4
x-served-by
cache-hhn1548-HHN
last-modified
Tue, 14 May 2019 08:11:49 GMT
server
cloudinary
x-timer
S1558119545.462259,VS0,VE0
etag
"4013dd3d592acf5a4af9ea7eaa3502c1"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
76aec40ddcab5cbbac886585ab64d03c.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
7 KB
8 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/76aec40ddcab5cbbac886585ab64d03c.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
aca8dc14fe648f964689a5138e7d7f6c436eea9392c07bd11c722c4920fd6748

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
343508
x-cache
HIT
status
200
expiration
expiry-date="Mon, 27 May 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/76aec40ddcab5cbbac886585ab64d03c.jpg
content-length
7436
x-served-by
cache-hhn1548-HHN
last-modified
Fri, 26 Apr 2019 18:32:12 GMT
server
cloudinary
x-timer
S1558119545.462235,VS0,VE1
etag
"d759be42f7fa0af3d18e5e3521ac9d74"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
fe9ed3ba21e30f05846d98527cd1de1e.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
16 KB
16 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/fe9ed3ba21e30f05846d98527cd1de1e.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
8f35ec8a5003d2b0051606cf5cf8776e88ea44b7d1b2740c46b77400a0c2d524

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
450232
x-cache
HIT
status
200
expiration
expiry-date="Fri, 24 May 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/fe9ed3ba21e30f05846d98527cd1de1e.jpg
content-length
16380
x-served-by
cache-hhn1548-HHN
last-modified
Tue, 23 Apr 2019 21:31:30 GMT
server
cloudinary
x-timer
S1558119545.462266,VS0,VE1
etag
"1e35924c60ab8f93bd3464a908d02d34"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
565b34259a9689a4ddd9ff2e8f444ec5.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
14 KB
14 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/565b34259a9689a4ddd9ff2e8f444ec5.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
1d43fb8d1b75387cccaa21d83b1d967b5faa782bfaa3205ebee611e0e2d4b4d5

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
2721
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/565b34259a9689a4ddd9ff2e8f444ec5.jpg
content-length
14129
x-request-id
89e5b6d8a9fd4929
x-served-by
cache-hhn1548-HHN
last-modified
Fri, 17 May 2019 06:25:23 GMT
server
cloudinary
x-timer
S1558119545.479483,VS0,VE1
etag
"69d8dd123a3f744c58c0c01e4aecbba9"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
707fd401aadc328220ca6c014db6b053.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
16 KB
16 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/707fd401aadc328220ca6c014db6b053.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
6131868993239ba71cd558f4d9bd0dd75139a4201fff982cb621d2534a4e09e8

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
98641
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/707fd401aadc328220ca6c014db6b053.jpg
content-length
16140
x-request-id
c60fe808f47fc39f
x-served-by
cache-hhn1548-HHN
last-modified
Thu, 16 May 2019 08:29:08 GMT
server
cloudinary
x-timer
S1558119545.479676,VS0,VE1
etag
"304366c6b4d292efbe408f0a45398028"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1
f539211219b796ffbb49949997c764f0.png
cdn.taboola.com/libtrc/static/thumbnails/
254 B
730 B
Image
General
Full URL
https://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.357-555-RELEASE.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f68019eb4b4e5933301d4ee75969e0cb94ed8333bf514630fa749eb9c3e483c9

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

x-amz-version-id
hL.cyLD7Q4TL5ceY.7JQwF9m5IYI8mkC
via
1.1 varnish
age
6945788
x-cache
HIT
status
200
date
Fri, 17 May 2019 18:59:05 GMT
x-amz-replication-status
COMPLETED
content-length
254
x-amz-id-2
XvamycYj5i9elo1HIxQVWoqB3bzM0MDs3mgweXjpvYdi7ZZIyzbyvzEvbwKvdJGIx5LiaLJce0k=
x-served-by
cache-hhn1548-HHN
last-modified
Wed, 24 Jun 2015 07:14:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1377415166/atime:1435052450/md5:dfa7b52c86e56bd67fa4002f6ed19854/ctime:1422381567
x-timer
S1558119545.457642,VS0,VE0
etag
"dfa7b52c86e56bd67fa4002f6ed19854"
x-req
/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
x-amz-request-id
093E8082E423E036
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/png
abp
60
x-cache-hits
3808653
43c068485d409ac97905957b10c6b1de.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
12 KB
12 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/43c068485d409ac97905957b10c6b1de.jpg
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
6db2c5b3d7a29769ae15475d17dcd79e9518e44446f8de1e200bc9f76b4a5586

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
90877
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/43c068485d409ac97905957b10c6b1de.jpg
content-length
12291
x-request-id
38dda7cdfb81e8b1
x-served-by
cache-hhn1548-HHN
last-modified
Thu, 16 May 2019 10:05:13 GMT
server
cloudinary
x-timer
S1558119546.523969,VS0,VE0
etag
"707477f5b7d2ac6893606c33e648e634"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
af89193769d6408ccbc36a5227dbb53a.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
13 KB
14 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/af89193769d6408ccbc36a5227dbb53a.jpg
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
726c833c18881b940a856fa791d708deb98c8891210650f7c3c5d1cf687f3cea

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
584871
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/af89193769d6408ccbc36a5227dbb53a.jpg
content-length
13447
x-request-id
0e93a42a6f838cb0
x-served-by
cache-hhn1548-HHN
last-modified
Fri, 10 May 2019 15:17:46 GMT
server
cloudinary
x-timer
S1558119546.524236,VS0,VE0
etag
"06329254c8237c04afc5cc5bd9210d07"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
b399f15f107de251c3a7772e9b9094c8.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
6 KB
6 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/b399f15f107de251c3a7772e9b9094c8.jpg
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/cbsdfp5832910442/moatad.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
7725c5c54f16127b910ebbb7d8d0fb638f654859a963da9ecf30b3e963eb2754

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
273858
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/b399f15f107de251c3a7772e9b9094c8.jpg
content-length
6307
x-request-id
c169326b22d909b4
x-served-by
cache-hhn1548-HHN
last-modified
Tue, 14 May 2019 08:11:49 GMT
server
cloudinary
x-timer
S1558119546.524325,VS0,VE0
etag
"4013dd3d592acf5a4af9ea7eaa3502c1"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
3
76aec40ddcab5cbbac886585ab64d03c.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
7 KB
8 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/76aec40ddcab5cbbac886585ab64d03c.jpg
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
aca8dc14fe648f964689a5138e7d7f6c436eea9392c07bd11c722c4920fd6748

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
343508
x-cache
HIT
status
200
expiration
expiry-date="Mon, 27 May 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/76aec40ddcab5cbbac886585ab64d03c.jpg
content-length
7436
x-served-by
cache-hhn1548-HHN
last-modified
Fri, 26 Apr 2019 18:32:12 GMT
server
cloudinary
x-timer
S1558119546.524425,VS0,VE0
etag
"d759be42f7fa0af3d18e5e3521ac9d74"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
fe9ed3ba21e30f05846d98527cd1de1e.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
16 KB
16 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/fe9ed3ba21e30f05846d98527cd1de1e.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
8f35ec8a5003d2b0051606cf5cf8776e88ea44b7d1b2740c46b77400a0c2d524

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
450232
x-cache
HIT
status
200
expiration
expiry-date="Fri, 24 May 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/fe9ed3ba21e30f05846d98527cd1de1e.jpg
content-length
16380
x-served-by
cache-hhn1548-HHN
last-modified
Tue, 23 Apr 2019 21:31:30 GMT
server
cloudinary
x-timer
S1558119546.530739,VS0,VE0
etag
"1e35924c60ab8f93bd3464a908d02d34"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
565b34259a9689a4ddd9ff2e8f444ec5.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
14 KB
14 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/565b34259a9689a4ddd9ff2e8f444ec5.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
1d43fb8d1b75387cccaa21d83b1d967b5faa782bfaa3205ebee611e0e2d4b4d5

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
2721
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/565b34259a9689a4ddd9ff2e8f444ec5.jpg
content-length
14129
x-request-id
89e5b6d8a9fd4929
x-served-by
cache-hhn1548-HHN
last-modified
Fri, 17 May 2019 06:25:23 GMT
server
cloudinary
x-timer
S1558119546.541458,VS0,VE0
etag
"69d8dd123a3f744c58c0c01e4aecbba9"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
707fd401aadc328220ca6c014db6b053.jpg
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
16 KB
16 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/707fd401aadc328220ca6c014db6b053.jpg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
6131868993239ba71cd558f4d9bd0dd75139a4201fff982cb621d2534a4e09e8

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
98641
x-cache
HIT
status
200, 200 OK
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/707fd401aadc328220ca6c014db6b053.jpg
content-length
16140
x-request-id
c60fe808f47fc39f
x-served-by
cache-hhn1548-HHN
last-modified
Thu, 16 May 2019 08:29:08 GMT
server
cloudinary
x-timer
S1558119546.541508,VS0,VE0
etag
"304366c6b4d292efbe408f0a45398028"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
count-data.js
zdnet-1.disqus.com/
243 B
768 B
Script
General
Full URL
https://zdnet-1.disqus.com/count-data.js?1=29171f76-766b-4149-941c-e2afcd592c6b
Requested by
Host: zdnet-1.disqus.com
URL: https://zdnet-1.disqus.com/count.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.36.134 Amsterdam, Netherlands, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
7dbeed374168459dfc812703a8dffbdeaaabdbc56500d57abc63d1bb39c8fc83
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:05 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
nginx
Age
706
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Cache-Control
public, max-age=600
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Vary
Accept-Encoding
Content-Length
205
X-XSS-Protection
1; mode=block
ab6dcee1906c17a7547fc56498914217.png
images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
12 KB
12 KB
Image
General
Full URL
https://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/ab6dcee1906c17a7547fc56498914217.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
452618f0529d925cf73a65154e843f9fb9cd9f555d58c0255f5e06c49feba5a7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:05 GMT
via
1.1 varnish
age
523837
x-cache
HIT
status
200
expiration
expiry-date="Thu, 25 Apr 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_184%2Cw_220%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/ab6dcee1906c17a7547fc56498914217.png
content-length
12170
x-served-by
cache-hhn1548-HHN
last-modified
Mon, 25 Mar 2019 08:44:54 GMT
server
cloudinary
x-timer
S1558119546.631536,VS0,VE0
etag
"231e03dfe50f4954e645ce7e4236cc5c"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
2
domains
api.viglink.com/api/
97 B
776 B
XHR
General
Full URL
https://api.viglink.com/api/domains
Requested by
Host: cdn.viglink.com
URL: https://cdn.viglink.com/api/vglnk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.175.204 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-175-204.eu-west-1.compute.amazonaws.com
Software
Apache-Coyote/1.1 /
Resource Hash
045c705d8e031b7f83ec92baf45f90db8b3b348d4c1fbcd1ac8530cc563cf9c5

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:05 GMT
Server
Apache-Coyote/1.1
P3P
CP="ALL IND DSP COR CUR ADM TAIo PSDo OUR COM INT NAV PUR STA UNI"
Access-Control-Allow-Origin
https://www.zdnet.com
Cache-Control
no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript;charset=UTF-8
Content-Length
97
Expires
Thu, 01 Jan 1970 00:00:00 GMT
utsync.ashx
ml314.com/ Frame C66E
793 B
1 KB
Script
General
Full URL
https://ml314.com/utsync.ashx?pub=&adv=&et=0&eid=50070&ct=js&pi=&fp=&clid=&if=1&ps=&cl=&mlt=&data=&&cp=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&pv=1558119543437_vgpstffdf&bl=en-us&cb=2543408&return=&ht=&d=&dc=&si=1558119543437_vgpstffdf&cid=&s=1600x1200&rp=
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1742019
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
cf32d339550e7bbaca605ce9a6b0c68ec33a2a4db62eb4724bfdb1d97c6fe7f4

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:05 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
p3P
CP="NON DSP COR ADMo PSAo DEVo BUS COM UNI NAV DEM STA"
Cache-Control
private
Connection
keep-alive
Content-Type
application/javascript; charset=utf-8
Content-Length
486
Expires
0
ud.ashx
in.ml314.com/ Frame C66E
20 B
698 B
Script
General
Full URL
https://in.ml314.com/ud.ashx?topiclimit=&cb=1742019
Requested by
Host: ml314.com
URL: https://ml314.com/tag.aspx?1742019
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.53.91 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-235-53-91.compute-1.amazonaws.com
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
d0e4a6372d6fb5ffe9505dbe9e94aee8f1b9b96ec8e5e20684cce8b4c5a88fa7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:06 GMT
Content-Encoding
gzip
Server
Microsoft-IIS/8.5
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, no-cache="set-cookie"
Connection
keep-alive
Content-Length
138
Expires
Sat, 18 May 2019 18:59:06 GMT
csync.ashx
ml314.com/ Frame C66E
Redirect Chain
  • https://tags.bluekai.com/site/20486?limit=0&id=5978151474556677828&redir=https://ml314.com/csync.ashx%3Ffp=$_BK_UUID%26person_id=5978151474556677828%26eid=50056
  • https://ml314.com/csync.ashx?fp=M52zny9999OXPB2z&person_id=5978151474556677828&eid=50056
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=M52zny9999OXPB2z&person_id=5978151474556677828&eid=50056
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:06 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sat, 18 May 2019 14:59:06 GMT

Redirect headers

Location
https://ml314.com/csync.ashx?fp=M52zny9999OXPB2z&person_id=5978151474556677828&eid=50056
Date
Fri, 17 May 2019 18:59:06 GMT
Connection
keep-alive
Content-Length
0
BK-Server
1035
P3P
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
csync.ashx
ml314.com/ Frame C66E
Redirect Chain
  • https://idsync.rlcdn.com/395886.gif?partner_uid=5978151474556677828
  • https://idsync.rlcdn.com/1000.gif?memo=CO6UGBIeChoIARCuXxoTNTk3ODE1MTQ3NDU1NjY3NzgyOBAAGg0I-oj85gUSBQjoBxAAQgBKAA
  • https://ml314.com/csync.ashx?fp=&person_id=5978151474556677828&eid=50082
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=&person_id=5978151474556677828&eid=50082
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:06 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sat, 18 May 2019 14:59:06 GMT

Redirect headers

date
Fri, 17 May 2019 18:59:06 GMT
via
1.1 google
location
https://ml314.com/csync.ashx?fp=&person_id=5978151474556677828&eid=50082
p3p
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
status
307
cache-control
no-cache, no-store
timing-allow-origin
*
alt-svc
clear
content-length
0
csync.ashx
ml314.com/ Frame C66E
Redirect Chain
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151474556677828%26eid=50220
  • https://pixel.mathtag.com/sync/img?redir=https://ml314.com/csync.ashx%3Ffp=[MM_UUID]%26person_id=5978151474556677828%26eid=50220&mm_bnc&mm_bct
  • https://ml314.com/csync.ashx?fp=d2125cde-fa1a-4800-963e-bd7d0b24e73e&person_id=5978151474556677828&eid=50220
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=d2125cde-fa1a-4800-963e-bd7d0b24e73e&person_id=5978151474556677828&eid=50220
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:06 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sat, 18 May 2019 14:59:06 GMT

Redirect headers

Date
Fri, 17 May 2019 18:59:06 GMT
Server
MT3 1047 bd25af8 master zrh-pixel-x18
P3P
CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Location
https://ml314.com/csync.ashx?fp=d2125cde-fa1a-4800-963e-bd7d0b24e73e&person_id=5978151474556677828&eid=50220
Cache-Control
no-cache
Connection
keep-alive
Content-Type
image/gif
Content-Length
0
Expires
Fri, 17 May 2019 18:59:05 GMT
csync.ashx
ml314.com/ Frame C66E
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151474556677828
  • https://sync.crwdcntrl.net/map/ct=y/c=6985/tp=BOMB?https://ml314.com/csync.ashx%3Ffp%3D%24%7Bprofile_id%7D%26eid%3D50146%26person_id%3D5978151474556677828
  • https://ml314.com/csync.ashx?fp=ac8b9248acd8b862d6f5f6677663db3f&eid=50146&person_id=5978151474556677828
43 B
312 B
Image
General
Full URL
https://ml314.com/csync.ashx?fp=ac8b9248acd8b862d6f5f6677663db3f&eid=50146&person_id=5978151474556677828
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.171.224.12 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-171-224-12.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:06 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
image/gif
Cache-Control
private
Connection
keep-alive
Content-Length
43
Expires
Sat, 18 May 2019 14:59:06 GMT

Redirect headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:06 GMT
P3P
CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Location
https://ml314.com/csync.ashx?fp=ac8b9248acd8b862d6f5f6677663db3f&eid=50146&person_id=5978151474556677828
Cache-Control
no-cache
X-Server
10.26.17.233
Connection
keep-alive
Content-Length
0
Expires
0
match
ps.eyeota.net/ Frame C66E
Redirect Chain
  • https://ps.eyeota.net/pixel?pid=r8hrb20&t=gif
  • https://ps.eyeota.net/pixel/bounce/?pid=r8hrb20&t=gif
  • https://ml314.com/utsync.ashx?eid=50052&et=0&fp=2li2TXibvVdus0yZvh69GBu_-d2_2S3klFjdkjbRAmPE&gdpr=1&gdpr_consent=&return=https%3A%2F%2Fps.eyeota.net%2Fmatch%3Fbid%3Dr8hrb20%26uid%3Dnil
  • https://ml314.com/csync.ashx?fp=2li2TXibvVdus0yZvh69GBu_-d2_2S3klFjdkjbRAmPE&person_id=5978151474556677828&eid=50052&return=https%3a%2f%2fps.eyeota.net%2fmatch%3fbid%3dr8hrb20%26uid%3dnil
  • https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
70 B
171 B
Image
General
Full URL
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
18.185.83.216 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-185-83-216.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
de9d3fd0eb948bd294477d0eda60a73b85caff1794803530d0463193a113da98

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:06 GMT
Content-Length
70
Content-Type
image/gif

Redirect headers

Date
Fri, 17 May 2019 18:59:06 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Content-Type
text/html; charset=utf-8
Location
https://ps.eyeota.net/match?bid=r8hrb20&uid=nil
Cache-Control
private
Connection
keep-alive
Content-Length
168
Expires
Sat, 18 May 2019 14:59:06 GMT
v4
btlr.sharethrough.com/
5 KB
2 KB
XHR
General
Full URL
https://btlr.sharethrough.com/v4?placement_key=8ec3a4f3&campaign_key=DSbrSFRryqCYMafsUpQCvgZ6NP&mrid=d6b0f800-78d5-11e9-9070-d11aca277667
Requested by
Host: native.sharethrough.com
URL: https://native.sharethrough.com/assets/sfp.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.59.128.192 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-59-128-192.eu-central-1.compute.amazonaws.com
Software
nginx/1.14.1 / Express
Resource Hash
0b112e18e1a45ef61acdb3b5f195bff6d25b76f023291421bef8f3eee5a4f957

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
Origin
https://www.zdnet.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:08 GMT
content-encoding
gzip
ETag
W/"12b8-GfZcEwGdz/pItncbCnWF/nM28n8"
Server
nginx/1.14.1
X-Powered-By
Express
Vary
Origin
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.zdnet.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
2121
butler
b.sharethrough.com/
0
154 B
Image
General
Full URL
https://b.sharethrough.com/butler?type=networkImpressionRequest&pkey=8ec3a4f3&placementIndex=1&networkKey=stxnetwork&networkOrder=1&bwidth=1600&bheight=1200&byscroll=0&ploc=https%253A%252F%252Fwww.zdnet.com%252Farticle%252Fchinese-cyberspies-breached-teamviewer-in-2016%252F&umtime=1558119548841&version=638-27630c75-eu&mrid=d6b0f800-78d5-11e9-9070-d11aca277667&bidId=NO_BID_ID
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.207.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-207-232.compute-1.amazonaws.com
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:09 GMT
Server
nginx/1.4.6 (Ubuntu)
Connection
keep-alive
Content-Length
0
Content-Type
image/gif
moatad.js
z.moatads.com/sharethroughv2465247317527/
287 KB
89 KB
Script
General
Full URL
https://z.moatads.com/sharethroughv2465247317527/moatad.js?moatClientLevel1=2ac18247&moatClientLevel2=DSbrSFRryqCYMafsUpQCvgZ6NP&moatClientLevel3=sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q&moatClientLevel4=DSxLHBNP2i6vQjZjhyJ8s6sesV&moatClientSlicer1=aec2767996d7a4df64f4df7e&moatClientSlicer2=8ec3a4f3&zMoatDSP=sfp&zMoatURLFunc=str-third-party-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1&zMoatIsInView=str-visibility-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1&zMoatTimeInView=str-time-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1
Requested by
Host: native.sharethrough.com
URL: https://native.sharethrough.com/assets/sfp.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.111.216.96 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-111-216-96.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
39a39ac4cf32cacdb7fd1e7b46515049f9644a53950ccf8732412884b05cf5ca

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:09 GMT
Content-Encoding
gzip
Last-Modified
Mon, 06 May 2019 17:10:41 GMT
Server
AmazonS3
x-amz-request-id
AE0FBE1D1F0DCC7F
ETag
"2d7382e5277e8ce735facb0e92464a49"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=41468
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
90465
x-amz-id-2
EDwQhKj1pel16VQSliy+SM6p0mLFitD76gdH/dKwR8d+K0f1sciCXHfiT3Q2HJ7PmunOps/pqgQ=
truncated
/
42 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/gif
intearct-twitter-logo_400x400.jpg
static.sharethrough.com/sfp/campaigns/25090/brand_logos/mobile/
2 KB
2 KB
Image
General
Full URL
https://static.sharethrough.com/sfp/campaigns/25090/brand_logos/mobile/intearct-twitter-logo_400x400.jpg
Requested by
Host: native.sharethrough.com
URL: https://native.sharethrough.com/assets/sfp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.222.167.189 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-167-189.fra54.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
0325e248491bb36d9c780a5931986a4b5913c20e138eaaddcfd44a0447fbc0d7

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 22 Apr 2019 03:14:56 GMT
via
1.1 07318a09275049862b4535d73a930b7d.cloudfront.net (CloudFront)
last-modified
Thu, 14 Feb 2019 09:54:01 GMT
server
AmazonS3
age
69
etag
"632674b316825a01738042c7b57d764c"
x-cache
Hit from cloudfront
content-type
image/jpeg
status
200
cache-control
max-age=600
x-amz-cf-pop
FRA54
accept-ranges
bytes
content-length
1617
x-amz-cf-id
Poiunz2WKPE9Mbq3S42sSSP9Qe7RhuhBSCrBF-3Fgv2gIapEScxACw==
image-1.jpg
str-assets.imgix.net/creative_workflow/creative_thumbnails/413252/images/original/
7 KB
7 KB
Image
General
Full URL
https://str-assets.imgix.net/creative_workflow/creative_thumbnails/413252/images/original/image-1.jpg?w=170&h=89&auto=format&fit=crop&dpr=1
Requested by
Host: native.sharethrough.com
URL: https://native.sharethrough.com/assets/sfp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a04:4e42::720 , Ascension Island, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
imgix /
Resource Hash
49b0346307a7e79ce7a029c998f60941a520c41a177e99813ee2fca520666381

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:09 GMT
server
imgix
age
397
vary
Accept, User-Agent
x-cache
HIT, MISS
content-type
image/webp
status
200
cache-control
public, max-age=600
x-imgix-id
e0dc09cce2ac9656f74dfd74e7fa851cf5ca53c8
accept-ranges
bytes
access-control-allow-origin
*
content-length
6690
x-served-by
cache-lax8633-LAX, cache-fra19154-FRA
butler
b.sharethrough.com/
0
154 B
Image
General
Full URL
https://b.sharethrough.com/butler?type=impressionReceived&pkey=8ec3a4f3&placementIndex=1&ckey=sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q&vkey=DSxLHBNP2i6vQjZjhyJ8s6sesV&arid=dfd74c403-2a99-4d18-b8a1-52aceed2d2a5&awid=065ef439-18cd-400b-b623-35598bab4439&renderOffset=0&responseTime=200&butlerLatency=200.1499980688095&bwidth=1600&bheight=1200&byscroll=0&ploc=https%253A%252F%252Fwww.zdnet.com%252Farticle%252Fchinese-cyberspies-breached-teamviewer-in-2016%252F&umtime=1558119549042&version=638-27630c75-eu&mrid=d6b0f800-78d5-11e9-9070-d11aca277667&bidId=NO_BID_ID
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.207.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-207-232.compute-1.amazonaws.com
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:09 GMT
Server
nginx/1.4.6 (Ubuntu)
Connection
keep-alive
Content-Length
0
Content-Type
image/gif
butler
b.sharethrough.com/
0
154 B
Image
General
Full URL
https://b.sharethrough.com/butler?bwidth=1600&bheight=1200&pwidth=770&pheight=131&pxoff=208&pyoff=1639&pkey=8ec3a4f3&ckey=sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q&tkey=bqSbBKSUnnhMPViET2buaJ7u&vkey=DSxLHBNP2i6vQjZjhyJ8s6sesV&arid=dfd74c403-2a99-4d18-b8a1-52aceed2d2a5&awid=065ef439-18cd-400b-b623-35598bab4439&sourceId=sfp&renderInPlace=false&placementIndex=1&twidth=170&theight=89&action=clickout&isVast=false&renderOffset=0&type=impression&byscroll=0&ploc=https%253A%252F%252Fwww.zdnet.com%252Farticle%252Fchinese-cyberspies-breached-teamviewer-in-2016%252F&umtime=1558119549064&version=638-27630c75-eu&mrid=d6b0f800-78d5-11e9-9070-d11aca277667&bidId=NO_BID_ID
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.207.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-207-232.compute-1.amazonaws.com
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:09 GMT
Server
nginx/1.4.6 (Ubuntu)
Connection
keep-alive
Content-Length
0
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=SHARETHROUGHV21&hp=1&cm=3&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=0&f=0&j=&o=3&t=1558119549119&de=839065154318&m=0&ar=9b2d1fb-clean&q=42&cb=0&cu=1558119549119&ll=2&lm=0&ln=0&r=0&em=0&en=0&d=2ac18247%3ADSbrSFRryqCYMafsUpQCvgZ6NP%3Asfp-DS1BVMsbycSoqWBCxeQnWv6Z8q%3ADSxLHBNP2i6vQjZjhyJ8s6sesV&zMoatDSP=sfp&zMoatURLFunc=str-third-party-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1&zMoatIsInView=str-visibility-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1&zMoatTimeInView=str-time-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1&zMoatJS=-&qs=1&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&id=1&bo=aec2767996d7a4df64f4df7e&bd=8ec3a4f3&gw=sharethroughv2465247317527&fd=1&ac=1&it=500&fs=163876&na=758685378&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.101.253.141 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-101-253-141.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:09 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:09 GMT
butler
b.sharethrough.com/
0
154 B
Image
General
Full URL
https://b.sharethrough.com/butler?bwidth=1600&bheight=1200&pwidth=770&pheight=131&pxoff=208&pyoff=1639&pkey=8ec3a4f3&ckey=sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q&tkey=bqSbBKSUnnhMPViET2buaJ7u&vkey=DSxLHBNP2i6vQjZjhyJ8s6sesV&arid=dfd74c403-2a99-4d18-b8a1-52aceed2d2a5&awid=065ef439-18cd-400b-b623-35598bab4439&sourceId=sfp&renderInPlace=false&placementIndex=1&twidth=170&theight=89&action=clickout&isVast=false&responseTime=62.425002455711365&type=moatLatency&byscroll=0&ploc=https%253A%252F%252Fwww.zdnet.com%252Farticle%252Fchinese-cyberspies-breached-teamviewer-in-2016%252F&umtime=1558119549208&version=638-27630c75-eu&mrid=d6b0f800-78d5-11e9-9070-d11aca277667&bidId=NO_BID_ID
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.233.1.251 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-233-1-251.compute-1.amazonaws.com
Software
nginx/1.4.6 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 17 May 2019 18:59:09 GMT
Server
nginx/1.4.6 (Ubuntu)
Connection
keep-alive
Content-Length
0
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&kq=1&lo=0&ua=null&pk=1&wk=1&rk=1&tk=0&qs=1&ak=https%3A%2F%2Fwww.zdnet.com%2F%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F-&i=SHARETHROUGHV21&ud=undefined&qn=(%2BIb%7Cj8o%3FJ(jkkeL07ta_*JRM!6t9B%2CN%3Ey)%2ChXbvU37_*NhSfBghz%5D*vOJ%23_%3DNoUA%5DRgBU_Gr1%3E%3AHuFTn%3ADXqJHZ%3BR%23yAb%2Bho8bYLaXBjA%3AmQ)%3CF!tAbjrzJ%3BgoVYGVxc%40lQQV%23tc3%2Fh%7C%3FVKV%3BW5.NO)Wx%7C*E%24%3D!L2ux%7Ci_lOfxECSR23_hFAkD%3Dv%3CN%5B.%22%24b_o%3FtVD%5D%5BpN%7CQF%40Sy7%7B%2CNr1U*%26ujMUU8fvb%26%22B&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF7HfC7Kn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=c%3FgD3W%3CA&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=0&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&qr=0&bq=0&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=131&w=770&om=0&fy=207.5&gp=1639.09375&gu=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016%2F&id=1&cm=3&f=0&j=&o=3&t=1558119549119&de=839065154318&cu=1558119549119&m=84&ar=9b2d1fb-clean&cb=0&ll=2&lm=0&ln=0&r=0&dl=0&dm=1000&dn=0&gh=1&xx=undefined%3A875484570224&td=1&lk=1639.09375&lb=4279&le=1&lf=0&lg=1&gm=1&io=1&ct=undefined&vv=1&vw=1%3A3%3A0&vp=0&vx=0%3A-%3A-&as=0&ag=0&an=0&gf=0&gg=0&ix=0&ic=0&pg=0&pf=0&ib=1&cc=0&bw=0&bx=0&aa=0&ad=0&cn=0&gk=0&gl=0&ik=0&im=0&in=0&pd=0&em=0&en=0&st=0&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=27&cd=0&ah=27&am=0&rf=0&re=0&wb=1&wm=1&wi=0&zMoatCustomParams=100%25%3A3000sec%3Acumulative&cl=0&at=0&d=2ac18247%3ADSbrSFRryqCYMafsUpQCvgZ6NP%3Asfp-DS1BVMsbycSoqWBCxeQnWv6Z8q%3ADSxLHBNP2i6vQjZjhyJ8s6sesV&bo=aec2767996d7a4df64f4df7e&bd=8ec3a4f3&gw=sharethroughv2465247317527&zMoatDSP=sfp&zMoatURLFunc=str-third-party-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1&zMoatIsInView=str-visibility-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1&zMoatTimeInView=str-time-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1&zMoatJS=2%3A&ab=3&ac=1&fd=1&kt=strict&it=500&oq=0&ot=0&tc=0&fs=163876&na=1074790422&cs=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
104.101.253.141 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-101-253-141.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:09 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:09 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=107&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=4629503254&L2id=2488641989&L3id=4955832456&L4id=138262432800&S1id=23605329&S2id=23619609&ord=1558119543339&r=994025957680&t=meas&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=top&zMoatPT=article&bedc=1&q=1&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:09 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:09 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=107&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=4629503254&L2id=2488641989&L3id=4955832456&L4id=138262432800&S1id=23605329&S2id=23619609&ord=1558119543339&r=994025957680&t=nht&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=top&zMoatPT=article&bedc=1&q=2&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:09 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:09 GMT
pixel.gif
cbsdfp5832910442.s.moatpixel.com/
43 B
409 B
Image
General
Full URL
https://cbsdfp5832910442.s.moatpixel.com/pixel.gif?m=1&iv=0&tuv=-1&tet=0&fi=0&apd=208&ui=0&uit=0&h=0&th=-1&s=0&ts=-1&bfa=1&d=zdnet.com&L1id=4629503254&L2id=2488641989&L3id=4955832456&L4id=138262432800&S1id=23605329&S2id=23619609&ord=1558119543339&r=994025957680&t=hdn&os=0&fi2=0&div1=0&ait=0&zMoatVGUID=dd8c9508-9fc0-4b5d-9d0f-5c21a2117e33&zMoatCURL=zdnet.com%2Farticle%2Fchinese-cyberspies-breached-teamviewer-in-2016&zMoatPS=top&zMoatPT=article&bedc=1&q=3&nu=1&ib=1&dc=1&ob=1&oh=1&lt=0&ab=1&n=1&nm=1&sp=0&pt=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Fri, 17 May 2019 18:59:09 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Fri, 17 May 2019 18:59:09 GMT
/
www.zdnet.com/homepage/xhr/
261 KB
28 KB
XHR
General
Full URL
https://www.zdnet.com/homepage/xhr/
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.143 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-143.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5cb62ef7ceebbfaa3473e9a630094dd636a077ed1ab51ef75dc4febbbde01f95
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

content-security-policy
frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Accept-Encoding, User-Agent
content-length
27532
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
last-modified
Fri, 17 May 2019 17:43:30 GMT
server
nginx
x-frame-options
SAMEORIGIN
date
Fri, 17 May 2019 18:59:12 GMT
expect-ct
max-age=0, report-uri="https://7a8f8748a40805618a61b617481a6ebc.report-uri.com/r/d/ct/reportOnly"
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-tx-id
3ad08750-ee13-4301-944b-6503cc38c8e7
content-type
application/json
access-control-allow-origin
https://www.zdnet.com
cache-control
max-age=5400, private
accept-ranges
bytes
expires
Fri, 17 May 2019 19:13:30 GMT
ring.gif
zdnet1.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/logos/
16 KB
9 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/logos/ring.gif
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
309e20d540054848c2bee4268a2ec8e37656da9e7d5f8084c6f66f4fd711aed6

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:12 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:26:28 GMT
server
nginx
etag
W/"5cddc774-3f75"
vary
Accept-Encoding
content-type
image/gif
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
9039
expires
Fri, 24 May 2019 18:59:12 GMT
ZDLogoMicroRed-x2.png
zdnet1.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/logos/
2 KB
2 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/logos/ZDLogoMicroRed-x2.png
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d6f28c2ecc7e7b603cead026b3febaa53ef60ef1ee17095ccaa5bfd465565e5e

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:12 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:26:28 GMT
server
nginx
etag
W/"5cddc774-6fa"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1513
expires
Fri, 24 May 2019 18:59:12 GMT
ZDLogoMicroWhite-x2.png
zdnet1.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/logos/
2 KB
2 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/fly/1558038388-fly/bundles/zdnetcss/images/logos/ZDLogoMicroWhite-x2.png
Requested by
Host: zdnet3.cbsistatic.com
URL: https://zdnet3.cbsistatic.com/fly/1695-fly/js/main.default.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d4bf85df37940345c4a0795bcc6556e480751e36f503425c25b1993071e90c9c

Request headers

Referer
https://zdnet3.cbsistatic.com/fly/1695-fly/css/core/main-597c21009e-rev.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:12 GMT
content-encoding
gzip
last-modified
Thu, 16 May 2019 20:26:28 GMT
server
nginx
etag
W/"5cddc774-691"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
max-age=604800
timing-allow-origin
*
content-length
1398
expires
Fri, 24 May 2019 18:59:12 GMT
Wavebreakmedia_iStock-652595148.jpg
creatives.techrepublic.com/whitepapers/pro/
0
0

river-time-ago-f2210a157b-rev.js
zdnet4.cbsistatic.com/fly/js/components/
753 B
637 B
Script
General
Full URL
https://zdnet4.cbsistatic.com/fly/js/components/river-time-ago-f2210a157b-rev.js
Requested by
Host: zdnet2.cbsistatic.com
URL: https://zdnet2.cbsistatic.com/fly/1695-fly/js/libs/require-2.1.2.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
2d3e9015bb665cc4e62a0aada26a74311bf87ba40e12b896724f447a98e68a89

Request headers

Referer
https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 17 May 2019 18:59:12 GMT
content-encoding
gzip
last-modified
Mon, 26 Nov 2018 11:30:11 GMT
server
nginx
etag
"5bfbd943-2f1"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=604800
accept-ranges
bytes
timing-allow-origin
*
content-length
426
expires
Fri, 24 May 2019 18:59:12 GMT
load-more-180e93ae95-rev.js
zdnet3.cbsistatic.com/fly/js/components/
0
0

/
www.zdnet.com/newsletter/xhr/widget-login/
0
0

/
www.zdnet.com/m3d0s1/xhr/horizontal/
0
0

domains
api.viglink.com/api/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
creatives.techrepublic.com
URL
https://creatives.techrepublic.com/whitepapers/pro/Wavebreakmedia_iStock-652595148.jpg
Domain
zdnet3.cbsistatic.com
URL
https://zdnet3.cbsistatic.com/fly/js/components/load-more-180e93ae95-rev.js
Domain
www.zdnet.com
URL
https://www.zdnet.com/newsletter/xhr/widget-login/?topic=
Domain
www.zdnet.com
URL
https://www.zdnet.com/m3d0s1/xhr/horizontal/
Domain
api.viglink.com
URL
https://api.viglink.com/api/domains

Verdicts & Comments Add Verdict or Comment

326 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| soastaTracking object| ZdnetPageVars object| ZdnetFunctions boolean| gdprConsent object| evidon object| knownServiceWorkers object| cbsiGptDivIds function| UUIDv4 string| __tealium_data_guid object| utag_data function| requirejs function| require function| define number| BOOMR_lstart object| _sp_ function| $ function| jQuery object| googletag object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| BOOMR object| BOOMR_mq function| renderAdCallback function| blankAdCallback undefined| testGroup undefined| testName object| __core-js_shared__ function| setImmediate function| clearImmediate function| UUIDv1 function| clamp object| STR undefined| UUID object| Audit undefined| google_measure_js_timing object| Modernizr function| Waypoint object| debug object| jQuery1830177484913375775 string| waypointContextKey object| sticky object| CryptoJS object| mPulseApp object| utag_err boolean| utag_condload function| getCookieValue object| isInternal object| js object| s object| adData string| adCookieName undefined| adCookieData undefined| adRegion function| parseJson object| match object| utag function| runInternalUserFuncs function| cbsiInternal function| _tealium_old_error boolean| isEuUser object| vglnk object| omnitureMgr object| dwMgr object| om string| firstpgvar function| lightboxjs function| lightboxlib object| _ml function| dw_callback object| EF function| setUpAgknTag function| AppMeasurement_Module_AudienceManagement function| AppMeasurement_Module_ActivityMap function| AppMeasurement function| s_gi function| s_pgicq function| doSiteCatalystTag object| headID object| newScript object| s_c_il number| s_c_in function| Visitor object| visitor function| DIL number| s_objectID number| s_giq function| vl_cB function| vl_disable function| vglnk_15581195389046 undefined| _ function| Hls undefined| uuid function| addResizeListener function| removeResizeListener object| cvui object| uvpjs function| Class object| mpulseUserTiming number| BOOMR_configt function| agknTagBuilder object| _agknTag string| _agknTagName object| _agknEchoTag number| _isAgknTagSet object| __ql string| path string| host object| scriptTags object| _bmrEvents object| headertag function| headertag_render object| pbjs object| DIGIOH_API object| LIGHTBOX_API object| DW undefined| vglnk_15581195394067 undefined| jQuery17104125329849266035_1558119539182 function| dw_anonc object| DW_anonc object| optimizely string| f0 object| omMgr object| TRUE_ANTHEM undefined| vglnk_15581195396389 object| jQuery17104125329849266035 object| s_i_cnetzdnetglobalsite number| BOOMR_onload string| adBlockCookieValue object| $tealium boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id object| ret boolean| searchOpen object| $lastFocusedInput string| pageType function| udm_ function| ns_order object| ns_ object| ns_p string| ZN_3xeBFJDuSs0SRW5_ed string| ZN_3xeBFJDuSs0SRW5_sampleRate string| ZN_3xeBFJDuSs0SRW5_url function| fbq function| _fbq object| UA object| QSI number| google_unique_id object| google_reactive_ads_global_state object| gaGlobal string| disqus_shortname number| _rnd string| __prot object| __i function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| vglnk_155811954267710 object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| TRC object| _tblConsole object| _taboola object| _comscore undefined| msg string| pm_pgtp object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 boolean| attachedML object| MoatDataJsonpRequest object| COMSCORE function| __trcCopyProps function| __trcFromError function| __trcClientTimestamp function| __trcLog function| __trcError function| __trcDebug function| __trcInfo function| __trcWarn function| __trcDOMWalker function| __trcPurgeEventHandlers function| __trcJSONify function| __trcUnJSONify function| __trcGetMargins function| __trcAttachResize function| __trcDetachResize function| __trcTrim function| __trcGetElementsByClass function| __trcToArray function| __trcObjectCreate function| PageManager object| params number| trc_debug_level string| trc_article_id string| trc_item_url object| TRCImpl string| pm_ppy string| pm_geo string| _pmep string| _pmep_geo string| _pmpmk boolean| _pmasync boolean| _pmoptimization boolean| _pmoptimizationmanipulation boolean| _pmhp boolean| _pmsb function| _pmloadfile object| bbVer object| pmk object| pmglb object| pmfa object| pmad object| pmdebug_c object| _pmenv undefined| _tb_d undefined| _tb_rand function| getBBVersion function| _tb_getUrlParameter object| _pm_mcm function| pmws_request_done object| _tb_ext_xp object| _pmk function| TBWidgetStorage function| TBWidgetPersonalization function| TBWidgetWhatsApp function| TBWidgetGawkerComments function| TBWidgetGawkerPersonalization function| TBWidgetWeatherStories function| TBWidgetFBCommentPersonalization function| TBWidgetDisqusPersonalization function| TBWidgetFacebookComments function| TBWidgetCommentButton function| TBWidgetMsnTsb function| TBClickToPlayVideo function| TBClickToPlayVideoElem function| TBWidgetVideoPlayer function| TBGenericVideoModule function| TBOtherPlayer function| TBVideoMetaData function| TBKalturaPlayer function| TBBrightcovePlayer function| TBOoYalaPlayer function| TBMSNPlayer function| TBWidgetMsnTsbPersonalization function| TBVideoCarousel function| TBVideoRightRail function| TBWidgetVideoPersonalization function| TBWidgetFPORunner function| PMTargeting function| PMTracking function| PMUniversalGA function| PMMdotLabs function| PMComScore function| PMPublisher function| TBOptimization function| TBWidgetFacebook function| TBWidgetTwitter function| TBWidgetAddThis function| TBWidgetShareThis function| TBWidgetDisqus function| TBWidgetGigya function| TBWidgetReddit function| TBWidgetPinterest function| TBWidgetSC function| TBWidgetSTPPersonalization function| TBWidgetSCPersonalization function| _comcast_fn function| PMRetry function| PMGlobal function| PMIdentifier function| pmws_getlocation_done object| pmdebug object| pmws object| xq string| GoogleAnalyticsObject function| ga object| _pm_mcg object| tbopt function| PMAd function| openx_ad_request_done function| pm_image_onload_done object| google_jobrunner object| google_ad_modifications number| google_global_correlator object| google_prev_clients object| google_tag_data object| gaplugins object| gaData number| taboola_view_id object| DISQUSWIDGETS undefined| disqus_domain undefined| vglnk_155811954579711 function| str-time-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1 function| str-third-party-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1 function| str-visibility-sfp-DS1BVMsbycSoqWBCxeQnWv6Z8q-8ec3a4f3-1 undefined| GLOBAL_VAR undefined| ct undefined| et undefined| hourElapsed undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| pxSrc undefined| px object| callbacks object| Moat#PML#26#1.2 object| Moat#PSCB31394810 function| MoatPxIOPT30441104 object| Moat#PSCB52801183 function| MoatPxIOPT94232019 object| Moat#PSCB14623985 function| MoatPxIOPT17979092 object| Moat#PSCB54941464 function| MoatPxIOPT64281326 number| customInviewPercentThreshold object| time

2 Cookies

Domain/Path Name / Value
.zdnet.com/ Name: RT
Value: "sl=1&ss=1558119537424&tt=4432&obo=0&bcn=%2F%2F0211c816.akstat.io%2F&sh=1558119541885%3D1%3A0%3A4432&dm=zdnet.com&si=b798a74c-0361-4736-8516-a43d8dd409a1&ld=1558119541885"
.zdnet.com/ Name: utag_main
Value: _sn:1$_ss:0$_st:1558121341812$ses_id:1558119538794%3Bexp-session$_pn:1%3Bexp-session$linktag:undefined%3Bexp-session

59 Console Messages

Source Level URL
Text
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service pending (GDPR consent not granted): script_indexexchange
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service pending (GDPR consent not granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service pending (GDPR consent not granted): script_sourcepoint
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service pending (GDPR consent not granted): script_gpt
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 723)
Message:
ADS: queuing nav-ad-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1193)
Message:
ADS: queuing intromercial-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1260)
Message:
ADS: queuing leader-plus-top-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1367)
Message:
ADS: queuing inpage-video-top-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1377)
Message:
ADS: queuing sharethrough-top-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1642)
Message:
ADS: queuing mpu-plus-top-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1752)
Message:
ADS: queuing dynamic-showcase-top-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1759)
Message:
ADS: queuing mpu-middle-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1981)
Message:
ADS: queuing mpu-bottom-5cdef5c3d57cd for display
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 1998)
Message:
ADS: queuing leader-plus-bottom-5cdef5c3d57cd for display
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom not ready, setting event
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom not ready, setting event
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service pending (GDPR consent not granted): script_sharethrough
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom ready, triggering load
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
dom ready, triggering load
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
GDPR consent granted
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent finally granted): script_indexexchange
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent finally granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent finally granted): script_sourcepoint
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent finally granted): script_gpt
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent finally granted): script_sharethrough
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_mpulse
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): _injectQueryStringGCP
console-api log (Line 2)
Message:
ADS: queuing mpu-bottom-5cdef5c3d57cd for display
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 9)
Message:
Missing adCookieData!
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_ad
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.1787.js?utv=ut4.43.201905061552(Line 177)
Message:
Service: sitecatalyst
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_sharebar
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_sharebar
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_taboola
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_async_load
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_urban_airship
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_disqus_count
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_disqus_count
console-api log URL: https://tags.tiqcdn.com/utag/cbsi/zdnetglobalsite/prod/utag.js(Line 92)
Message:
zdnet
console-api log (Line 33)
Message:
blank creative loaded: 138239468890 (5 x 5, pos=nav)
console-api log (Line 33)
Message:
blank creative loaded: 138239368367 (641 x 321, pos=top)
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 164)
Message:
Dynamic Showcase Center container ::: creative id = 138247024569
console-api log (Line 33)
Message:
blank creative loaded: 138239468731 (372 x 142, pos=)
console-api log (Line 33)
Message:
blank creative loaded: 138239375540 (372 x 142, pos=)
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_taboola
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_async_load
console-api log URL: https://www.zdnet.com/article/chinese-cyberspies-breached-teamviewer-in-2016/(Line 83)
Message:
Service loading (GDPR consent already granted): script_medusa_recommendation

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self' *.zdnet.com *.ampproject.org *.amp.cloudflare.com; default-src https: blob: 'unsafe-inline' 'unsafe-eval' data:; font-src https: blob: data:; img-src https: data: android-webview-video-poster: blob:; form-action https:; block-all-mixed-content; media-src https: blob: data:;
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0211c816.akstat.io
5f651e64.akstat.io
ad.doubleclick.net
ad.yieldmanager.com
ads.rubiconproject.com
adservice.google.com
adservice.google.de
api.viglink.com
api1.lightboxcdn.com
as-sec.casalemedia.com
b.sharethrough.com
beacon-eu-ams3.rubiconproject.com
beacon.tru.am
btlr.sharethrough.com
c.evidon.com
c.go-mpulse.net
cbsdfp5832910442.s.moatpixel.com
cbsi.demdex.net
cdn.jsdelivr.net
cdn.taboola.com
cdn.viglink.com
cm.everesttech.net
cm.g.doubleclick.net
connect.facebook.net
creatives.techrepublic.com
d.agkn.com
dpm.demdex.net
dw.cbsi.com
eus.rubiconproject.com
fonts.googleapis.com
fonts.gstatic.com
geo.moatads.com
googleads.g.doubleclick.net
idsync.rlcdn.com
iicbsi-a.akamaihd.net
images.taboola.com
in.ml314.com
js-sec.indexww.com
js.agkn.com
l.betrad.com
lightboxapi1.azurewebsites.net
match.adsrvr.org
ml314.com
native.sharethrough.com
optimized-by.rubiconproject.com
pagead2.googlesyndication.com
pixel.everesttech.net
pixel.mathtag.com
platform-cdn.sharethrough.com
ps.eyeota.net
px.moatads.com
rev.cbsi.com
saa.cbsi.com
sb.scorecardresearch.com
secure-us.imrworldwide.com
secure.adnxs.com
securepubads.g.doubleclick.net
static.sharethrough.com
str-assets.imgix.net
sync.crwdcntrl.net
tags.bluekai.com
tags.tiqcdn.com
tpc.googlesyndication.com
trc.taboola.com
tru.am
vidtech.cbsinteractive.com
web-sdk.urbanairship.com
widget.perfectmarket.com
www.everestjs.net
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googleadservices.com
www.googletagservices.com
www.lightboxcdn.com
www.summerhamster.com
www.zdnet.com
z.moatads.com
zdnet-1.disqus.com
zdnet1.cbsistatic.com
zdnet2.cbsistatic.com
zdnet3.cbsistatic.com
zdnet4.cbsistatic.com
zn_3xebfjduss0srw5-cbs.siteintercept.qualtrics.com
api.viglink.com
creatives.techrepublic.com
www.zdnet.com
zdnet3.cbsistatic.com
104.101.253.141
104.102.18.225
104.102.52.135
104.111.214.229
104.111.215.135
104.111.215.35
104.111.216.96
104.111.230.142
151.101.1.181
151.101.2.2
151.101.36.134
151.101.38.133
172.217.16.162
172.217.18.2
172.217.22.66
18.184.145.163
18.185.4.39
18.185.83.216
184.31.82.196
184.31.90.90
185.33.223.208
2.18.233.143
2.18.233.149
2.18.233.201
2.19.184.136
213.19.162.21
213.19.162.67
216.58.207.70
23.210.250.213
23.5.97.37
23.99.128.52
2600:9000:2043:c600:15:efbc:e300:93a1
2606:4700:20::6819:a222
2606:4700:20::6819:a322
2606:4700::6810:4ea5
2606:4700::6810:4fa5
2606:4700::6810:a00d
2a00:1288:110:422::3000
2a00:1450:4001:808::2002
2a00:1450:4001:808::2003
2a00:1450:4001:809::2002
2a00:1450:4001:814::2001
2a00:1450:4001:817::200e
2a00:1450:4001:819::2004
2a00:1450:4001:81a::2002
2a00:1450:4001:81d::2002
2a00:1450:4001:81f::2003
2a00:1450:4001:820::2002
2a00:1450:4001:824::200a
2a02:26f0:f4::17ca:e549
2a03:2880:f01c:216:face:b00c:0:3
2a03:2880:f11c:8083:face:b00c:0:25de
2a04:4e42::621
2a04:4e42::720
3.9.25.189
34.198.36.32
34.233.1.251
34.235.53.91
34.251.85.190
34.95.92.78
35.177.188.212
35.227.208.151
52.0.145.219
52.222.167.165
52.222.167.189
52.222.167.30
52.30.113.91
52.31.188.57
52.59.128.192
52.72.207.232
54.154.175.204
54.171.224.12
54.229.236.204
63.32.166.115
64.30.230.22
66.117.28.68
66.117.28.86
68.232.35.180
99.80.15.126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