cyberfeed.io
Open in
urlscan Pro
2a09:8280:1::6:8b6f
Public Scan
Effective URL: https://cyberfeed.io/
Submission: On April 18 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on April 3rd 2023. Valid for: 3 months.
This is the only time cyberfeed.io was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
ASN16509 (AMAZON-02, US)
PTR: server-52-222-232-57.fra56.r.cloudfront.net
d2908q01vomqb2.cloudfront.net |
ASN2635 (AUTOMATTIC, US)
PTR: wordpress.com
149400697.v2.pressablecdn.com |
ASN30148 (SUCURI-SEC, US)
PTR: cloudproxy10038.sucuri.net
heimdalsecurity.com |
ASN2635 (AUTOMATTIC, US)
eclecticlightdotcom.files.wordpress.com |
ASN20940 (AKAMAI-ASN1, NL)
cdn-icons-png.flaticon.com |
ASN63949 (AKAMAI-AP Akamai Technologies, Inc., SG)
cyberfeed.goatcounter.com |
Domain | Requested by | |
---|---|---|
10 | eu-images.contentstack.com |
cyberfeed.io
|
8 | cyberfeed.io |
1 redirects
cyberfeed.io
|
5 | thehackernews.com |
cyberfeed.io
|
5 | www.securityweek.com |
cyberfeed.io
|
4 | www.bleepstatic.com |
cyberfeed.io
|
3 | cdn-icons-png.flaticon.com |
cyberfeed.io
|
3 | i.ytimg.com |
cyberfeed.io
|
2 | eclecticlightdotcom.files.wordpress.com |
cyberfeed.io
|
2 | heimdalsecurity.com |
cyberfeed.io
|
2 | d2908q01vomqb2.cloudfront.net |
cyberfeed.io
|
2 | cdn.tailwindcss.com |
1 redirects
cyberfeed.io
|
1 | cyberfeed.goatcounter.com |
cyberfeed.io
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | beta.darkreading.com |
cyberfeed.io
|
1 | birchtree.me |
cyberfeed.io
|
1 | risky.biz |
cyberfeed.io
|
1 | 149400697.v2.pressablecdn.com |
cyberfeed.io
|
1 | cdn.comparitech.com |
cyberfeed.io
|
1 | gc.zgo.at |
cyberfeed.io
|
1 | fonts.googleapis.com |
cyberfeed.io
|
53 | 20 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cyberfeed.io R3 |
2023-04-03 - 2023-07-02 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-04-03 - 2023-06-26 |
3 months | crt.sh |
gc.zgo.at R3 |
2023-03-14 - 2023-06-12 |
3 months | crt.sh |
*.contentstack.com Gandi Standard SSL CA 2 |
2022-08-02 - 2023-07-22 |
a year | crt.sh |
www.securityweek.com Cloudflare Inc ECC CA-3 |
2023-01-24 - 2024-01-23 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-04-16 - 2024-04-15 |
a year | crt.sh |
*.cloudfront.net Amazon RSA 2048 M01 |
2022-12-08 - 2023-12-07 |
a year | crt.sh |
edgestatic.com GTS CA 1C3 |
2023-04-03 - 2023-06-26 |
3 months | crt.sh |
www.comparitech.com R3 |
2023-04-16 - 2023-07-15 |
3 months | crt.sh |
thehackernews.com Cloudflare Inc ECC CA-3 |
2023-04-01 - 2024-03-31 |
a year | crt.sh |
*.v2.pressablecdn.com Sectigo RSA Domain Validation Secure Server CA |
2022-07-21 - 2023-08-21 |
a year | crt.sh |
heimdalsecurity.com Starfield Secure Certificate Authority - G2 |
2023-03-04 - 2024-03-04 |
a year | crt.sh |
*.files.wordpress.com Sectigo ECC Domain Validation Secure Server CA |
2022-11-23 - 2023-12-24 |
a year | crt.sh |
risky.biz Sectigo RSA Domain Validation Secure Server CA |
2022-12-01 - 2023-12-01 |
a year | crt.sh |
darkreading.com Cloudflare Inc ECC CA-3 |
2023-04-09 - 2024-04-08 |
a year | crt.sh |
freepik.com Sectigo RSA Domain Validation Secure Server CA |
2022-07-22 - 2023-07-22 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-04-03 - 2023-06-26 |
3 months | crt.sh |
*.goatcounter.com R3 |
2023-01-29 - 2023-04-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cyberfeed.io/
Frame ID: 8896F7A676369CFF4D2436C48069FA93
Requests: 53 HTTP requests in this frame
Screenshot
Page Title
Cyberfeed.io | Daily Cybersecurity News and InsightsPage URL History Show full URLs
-
http://cyberfeed.io/
HTTP 301
https://cyberfeed.io/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
56 Outgoing links
These are links going to different origins than the main page.
Title: NDAQ 0.11%
Search URL Search Domain Scan URL
Title: VTI 0.0%
Search URL Search Domain Scan URL
Title: SPY 0.02%
Search URL Search Domain Scan URL
Title: AAPL 0.74%
Search URL Search Domain Scan URL
Title: JAMF -0.25%
Search URL Search Domain Scan URL
Title: CIBR -0.2%
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks 2023-04-18 17:58:00 UTC China-linked hacking group APT41 has shifted tactics by using open source penetration tools to target a Taiwanese media organization and an Italian job agency. The group is known for its sophisticated cyber espionage operations, but has now turned to using Google's Red Teaming Tool to steal information in targeted attacks.
Search URL Search Domain Scan URL
Title: Why Your Anti-Fraud, Identity & Cybersecurity Efforts Should Be Merged 2023-04-18 17:00:00 UTC Innovative organizations are merging their anti-fraud, identity, and cybersecurity efforts to combat the growing threat of online fraud, identity theft, and cyberattacks. Businesses are recommended to follow suit to prepare for the risks posed by these threats.
Search URL Search Domain Scan URL
Title: Takedown of GitHub Repositories Disrupts RedLine Malware Operations 2023-04-18 16:09:18 UTC SecurityWeek reports that the operations of RedLine malware have been disrupted after four GitHub repositories used by the malware's control panels were suspended. The takedown of these repositories has prevented the malware from carrying out further attacks.
Search URL Search Domain Scan URL
Title: 'Goldoson' Malware Sneaks into Google Play Apps, Racks Up 100M Downloads 2023-04-18 16:09:00 UTC A new malware called 'Goldoson' made its way to Google Play apps, tricking nearly 100 million users to unknowingly download it. This malware can easily steal private information, track the user's location, and even commit click fraud. The malware was accidentally built into the applications through an infected third-party library, leading to more concerns about the supply chain risk.
Search URL Search Domain Scan URL
Title: New ‘Domino’ Malware Linked to FIN7 Group, Ex-Conti Members 2023-04-18 16:01:51 UTC A new malware called 'Domino' has been discovered and is linked to the FIN7 group as well as former members of the Conti group. This backdoor is causing concern within the cybersecurity industry. The news was reported by SecurityWeek.
Search URL Search Domain Scan URL
Title: Australians lost a record $3.1 billion to scams last year 2023-04-18 16:00:24 UTC The Australian Competition & Consumer Commission (ACCC) has revealed that a record $3.1 billion was lost to scams in Australia last year. This marks an 80% increase in losses compared to the previous year.
Search URL Search Domain Scan URL
Title: Scaling security and compliance 2023-04-18 15:53:57 UTC Amazon Web Services (AWS) is upscaling its security and compliance measures to cater to the changing demands of its clients. Its services are designed to meet the strictest security and compliance standards. The AWS Security Guardians program is also closely coordinating with service teams to ensure compliance efforts are maintained.
Search URL Search Domain Scan URL
Title: Learn to Hack Web Apps - Live | #APIs #BOPLA #CTF 2023-04-18 15:48:55 UTC A live session called "Learn to Hack Web Apps" is being held, covering topics such as APIs, CTF, pentesting, appSec and an AMA. #BOPLA is also included in the hashtag.
Search URL Search Domain Scan URL
Title: SpecterOps Scores $25M Funding to Secure ID Attack Paths 2023-04-18 15:38:26 UTC Seattle-based startup SpecterOps has raised $25 million in a Series A funding round to enhance its BloodHound Enterprise platform, which focuses on securing ID attack paths. The company's success has been hailed as a major milestone in the industry. The news was reported on SecurityWeek.
Search URL Search Domain Scan URL
Title: Looking for a LastPass alternative? NordPass might be the answer 2023-04-18 15:00:01 UTC Are you tired of constantly forgetting your passwords? Look no further than NordPass Password Manager! With top-notch security features and an easy-to-use interface, NordPass will keep all of your passwords safe and easily accessible. And don't just take our word for it - even LastPass users have made the switch to NordPass!
Search URL Search Domain Scan URL
Title: NSO Group Used at Least 3 iOS Zero-Click Exploits in 2022: Citizen Lab 2023-04-18 14:59:35 UTC According to Citizen Lab, NSO Group exploited at least three iOS vulnerabilities in Pegasus attacks this year. The zero-click exploits, coined as FindMyPwn, PwnYourHome, and LatentImage, were all used in the attacks. The full details can be found on SecurityWeek.
Search URL Search Domain Scan URL
Title: New sandbox escape PoC exploit available for VM2 library, patch now 2023-04-18 14:39:28 UTC Security researchers have issued a warning about a new sandbox escape proof of concept (PoC) exploit for the VM2 library. The exploit, which allows for the execution of potentially harmful code on the host, can be prevented with a patch. End users are urged to update immediately to avoid any potential security risks.
Search URL Search Domain Scan URL
Title: The Attacks that can Target your Windows Active Directory 2023-04-18 14:07:14 UTC Hackers often target Active Directory with varying attack methods, leaving organizations at risk. These attacks can be conducted through multiple channels, prompting the need for protection. Find out how organizations can safeguard their Windows Active Directory against these threats.
Search URL Search Domain Scan URL
Title: You all NEED these Obsidian community plugins 2023-04-18 14:00:32 UTC Tech influencer Christian Lempa shared a YouTube video showcasing the benefits of Obsidian and its community plugins. Obsidian is more than just a note-taking and technical documentation tool as it can be transformed into a project management solution, visualizing tool, Kanban board, and more with the right plugins. Lempa demonstrated seven community plugins for Obsidian and how to use them in the video. He also provided links to follow and his equipment list on various platforms. The video included timestamps for each plugin discussed, and some of the links provided are affiliate links.
Search URL Search Domain Scan URL
Title: Beyond CVEs: The Key to Mitigating High-Risk Security Exposures 2023-04-18 14:00:00 UTC Ongoing exposure management is the key to reducing high-risk security threats beyond CVEs. By identifying and blocking choke points in probable attack paths, organizations can effectively manage the riskiest exposures.
Search URL Search Domain Scan URL
Title: YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive Loader 2023-04-18 13:45:00 UTC Cybersecurity researchers have discovered a new loader that uses advanced anti-VM technique to deliver the Aurora information stealer malware. Dubbed as "in2al5d p3in4er", the loader is compiled with Embarcadero RAD Studio and primarily targets endpoint workstations. The loader is said to be highly evasive, making it difficult to detect and prevent the malware's distribution via YouTube videos.
Search URL Search Domain Scan URL
Title: Elon Musk Says He’ll Create ‘TruthGPT’ to Counter AI ‘Bias’ 2023-04-18 13:18:15 UTC Tech billionaire Elon Musk is set to launch a new AI chatbot called "TruthGPT" aimed at countering perceived biases in existing systems. The new platform will strive to seek out the "maximum truth" and understand the nature of the universe. Musk has been a vocal critic of some AI systems, arguing that they perpetuate biases and perpetuate social problems. He hopes TruthGPT will counter these issues and offer a more accurate, objective perspective for users.
Search URL Search Domain Scan URL
Title: Recycled Core Routers Exposed Sensitive Corporate Network Info 2023-04-18 13:17:00 UTC Researchers have issued a warning about the dangers of recycled core routers. Unwiped secondhand routers have exposed sensitive corporate network information, including configurations, credentials, customer data, and applications. Businesses should take precautions to prevent this data from being exposed.
Search URL Search Domain Scan URL
Title: Hacking Kubernetes: Vulnerable Apps to Cluster Admin 2023-04-18 13:00:28 UTC Sysdig has released a tool to help users secure their runtime environments across Kubernetes clusters, CI/CD pipelines and their production environment. The tool helps prevent hacking like that demonstrated in a recent demonstration by researchers at Lacework, which showed how vulnerable apps can be exploited to gain access to cluster administrators. Sysdig's tool is designed to keep these environments and others secure, and can be found at https://j-h.io/sysdig, where users are also invited to like, comment and subscribe. Other affiliated learning programmes, sponsors and services can be found at the same link too.
Search URL Search Domain Scan URL
Title: Mandiant 2023 M-Trends Report Provides Factual Analysis of Emerging Threat Trends 2023-04-18 13:00:00 UTC Mandiant has released its annual report, the M-Trends 2023 report, which provides an analysis of emerging threat trends. The report highlights a year dominated by kinetic/cyber war in Ukraine and North Korea's increase in cryptocurrency thefts. China and Iran's continued exploitation of vulnerabilities is also noted, as is a new form of personal intimidation of company personnel. The report is based on Mandiant Consulting Investigations and was published on Tuesday. This information was originally reported by SecurityWeek.
Search URL Search Domain Scan URL
Title: ZeroFox Acquires LookingGlass 2023-04-18 12:38:00 UTC ZeroFox has announced that it has acquired LookingGlass, a move that will enhance the company's attack surface management capabilities. The newly combined company is set to bring together two leading providers of cybersecurity solutions, with experts predicting a significant impact on the industry.
Search URL Search Domain Scan URL
Title: Lockr Raises $2.5 Million for Identity and Data Protection Platform 2023-04-18 12:28:13 UTC Lockr, a company that provides personal identity and data protection services has raised $2.5 million in pre-seed funding. This funding will support the platform's growth and development. The company intends to provide its customers with an end-to-end security solution for their personal data. Lockr's secure platform protects users' personal information, such as emails, passwords, and credit card numbers, from online threats. SecurityWeek reported on Lockr's success.
Search URL Search Domain Scan URL
Title: Goldoson Android Malware Infects Over 100 Million Google Play Store Downloads 2023-04-18 12:27:00 UTC Over 100 million Google Play Store downloads have been infected with a new Android malware called Goldoson. The malware has been found in more than 60 legitimate apps available in the store. The rogue component is part of a third-party software library used by these apps. Additionally, eight million installations have been traced back to ONE, a top third-party app store in South Korea.
Search URL Search Domain Scan URL
Title: Cyberinsurance Backstop: Can the Industry Survive Without One? 2023-04-18 12:00:00 UTC The question of whether the cyberinsurance industry can continue without a backstop is being raised. The backstop would make cyberinsurance more accessible and cost-effective for everyone. However, it remains unclear if this is possible. This was reported in SecurityWeek.
Search URL Search Domain Scan URL
Title: DFIR via XDR: How to expedite your investigations with a DFIRent approach 2023-04-18 11:31:00 UTC "New Approach in DFIR with XDR to Accelerate Investigations. As technology advances, security measures must follow suit. Digital forensics and incident response (DFIR) has undergone a transformation in the last few years, with a focus on digital forensics and the implementation of XDR. In this article, we will explore how XDR fits into the picture and how it can expedite investigations."
Search URL Search Domain Scan URL
Title: Using LLMs to Create Bioweapons 2023-04-18 11:19:03 UTC There is growing concern about the potential misuse of molecular machine learning models to create harmful bioweapons. The use of large language models and automated experimentation for dual-use purposes has raised alarm, with particular concern surrounding the creation of new poisons and chemical weapons. Researchers have tested these risks by submitting a test set of compounds to an agent to determine if extensive analysis and planning were carried out. The issues of illicit drugs and chemical weapons are considered critical, and the findings suggest the need for strong guardrails to prevent such potential misuse.
Search URL Search Domain Scan URL
Title: CISA Adds Chrome, macOS Bugs to Known Exploited Vulnerabilities Catalog 2023-04-18 10:31:00 UTC The Cybersecurity and Infrastructure Agency (CISA) has updated its list of vulnerable software, adding two vulnerabilities that have been exploited by cyber attackers. The update includes a flaw in Chrome, which has since been fixed, and a vulnerability in macOS, which has been exploited by malware called DazzleSpy. The new additions have been labeled as "must patch" by CISA, acting as a guide for IT security teams to prioritize their patching efforts.
Search URL Search Domain Scan URL
Title: New ”Domino” Malware Strain Targets Corporate Networks 2023-04-18 10:30:02 UTC Heimdal Security Blog reports that a new malware known as "Domino" has been discovered targeting corporate networks. Researchers attribute the creation of "Domino" to ITG14, also known as the FIN7 threat group. The malware has been used since February 2023 by ex-Conti hackers to spread Project Nemesis info stealer or Cobalt Strike. Researchers have also attributed the malware to Lizar post-exploitation toolkit due to massive code overlap.
Search URL Search Domain Scan URL
Title: Rheinmetall Suffers Another Cyberattack – Company Operations Still Functional 2023-04-18 10:09:31 UTC Rheinmetall, a major German armaments and technology company, has been struck by another cyberattack, though officials say the company's operations remain unaffected. As Germany's largest arms firm and one of the top three Western producers of military equipment and ammunition, Rheinmetall's value stands at over €10 billion ($11.9 billion).
Search URL Search Domain Scan URL
Title: Cybersecurity M&A Roundup for April 1-15, 2023 2023-04-18 10:00:00 UTC SecurityWeek reports that 16 cybersecurity-related mergers and acquisitions (M&A) deals were announced during the first two weeks of April 2023.
Search URL Search Domain Scan URL
Title: Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access 2023-04-18 09:05:00 UTC MuddyWater, a notorious Iranian hacking group, is reportedly using the SimpleHelp remote support software to gain persistent access to targeted systems, according to a new analysis by Group-IB. This tactic is consistent with the group's previous use of legitimate remote administration tools such as ScreenConnect, RemoteUtilities, and Syncro. Despite international pressure to curtail cyber espionage, Iranian hackers continue to pose a significant threat to global organizations.
Search URL Search Domain Scan URL
Title: Creative Software Maker Affinity Informs Customers of Forum Breach 2023-04-18 08:24:00 UTC UK creative software developer Affinity has advised its forum's 175,000 users of a data breach that occurred on 6 April. The breach involved data from the forum and the company has warned all users to change passwords and secure their personal data. The company alerted customers to the breach in a recent post.
Search URL Search Domain Scan URL
Title: Mints version 1.13 fixes a crashing bug 2023-04-18 07:30:00 UTC The latest version 1.13 of Mints has been released, which includes a fix for a crashing bug in the Disk Check feature.
Search URL Search Domain Scan URL
Title: LockBit Ransomware Now Targeting Apple macOS Devices 2023-04-18 07:10:00 UTC The notorious LockBit ransomware group has expanded its reach to Apple macOS devices, utilizing new tools to encrypt files on the popular operating system. This marks the first time a big-game ransomware gang has targeted macOS. The news was reported by the MalwareHunterTeam and further samples were discovered by vx-underground.
Search URL Search Domain Scan URL
Title: How well do USB 3 SSDs work on a Thunderbolt hub? 2023-04-18 06:30:00 UTC New research is examining how USB 3.1 Gen 2 SSDs perform when connected to a Thunderbolt 4 hub, alongside Thunderbolt 3 SSDs. The study aims to determine how well the two types of drives interact and perform when connected to the same hub.
Search URL Search Domain Scan URL
Title: Making friends as an adult is hard (2021) 2023-04-18 01:41:47 UTC A new thread was posted on HN. Check it out!
Search URL Search Domain Scan URL
Title: Between Two Nerds: The NCF's Practical Guide to Offensive Cyber Operations 2023-04-18 00:00:00 UTC The UK's National Cyber Force (NCF) has released their new guide, "Responsible Cyber Power in Practice," which has been praised for its practical insights into offensive cyber operations. The document was discussed in the latest episode of "Between Two Nerds," featuring Tom Uren and The Grugq. While The Grugq raised concerns of possible plagiarism, Uren questioned the doctrine of cognitive effects and its limitations in cyber operations. The guide is expected to have a significant impact on how offensive operations are perceived and discussed.
Search URL Search Domain Scan URL
Title: The Windows 11 Trash Party 2023-04-17 22:57:18 UTC A new thread was posted on HN. Check it out!
Search URL Search Domain Scan URL
Title: FIN7, Former Conti Gang Members Collaborate on 'Domino' Malware 2023-04-17 21:59:00 UTC Former members of the notorious ransomware gang Conti have reportedly teamed up with FIN7 to create a new malware called 'Domino'. This malware utilizes the backdoor of FIN7 to deliver dangerous malware like Cobalt Strike to targeted systems. Cybersecurity experts have warned that this development could lead to a surge in cyber attacks in the near future.
Search URL Search Domain Scan URL
Title: lockr Raises $2.5M 2023-04-17 21:11:00 UTC Lockr, a company that aims to preserve open access to information on the internet while respecting consumer privacy and choice, has raised $2.5 million in funding.
Search URL Search Domain Scan URL
Title: AWS Security Profile – Cryptography Edition: Panos Kampanakis, Principal Security Engineer 2023-04-17 21:09:10 UTC Amazon Web Services (AWS) has released a new interview as part of its "AWS Security Profile - Cryptography Edition" series. The interview features Panos Kampanakis, the Principal Security Engineer of AWS Cryptography, who discusses topics such as data protection, cloud security, and post-quantum cryptography. The interview aims to provide insights into how AWS thought leaders work to keep customers safe and secure.
Search URL Search Domain Scan URL
Title: Google Issues Emergency Chrome Update for Zero-Day Bug 2023-04-17 20:59:00 UTC Google has released an emergency update for its popular Chrome browser due to a zero-day vulnerability that is actively being exploited. To prevent users from being vulnerable to this security flaw, Google has not provided full details on the issue.
Search URL Search Domain Scan URL
Title: Ex-Conti members and FIN7 devs team up to push new Domino malware 2023-04-17 20:36:21 UTC Former members of the Conti ransomware group have joined forces with the FIN7 hacking group to launch a new virus called 'Domino.' This new malware has been used to target corporate networks in a series of cyber-attacks, raising concerns about data security.
Search URL Search Domain Scan URL
Title: NSA's National Centers for Academic Excellent (NCAE) Cyber Games to Hold National Finals on April 22 2023-04-17 20:36:00 UTC The NSA's National Centers for Academic Excellence Cyber Games will be hosting its national finals on April 22.
Search URL Search Domain Scan URL
Title: Pentesters Need to Hack AI, but Also Question its Existence 2023-04-17 20:01:00 UTC In cybersecurity news, pentesters are urging for a reconsideration of AI technology's existence. As artificial intelligence continues to advance, security researchers are focusing on hacking AI models and ensuring enough measures are in place to prevent their misuse. These precautions include sufficient guardrails and testing for potential vulnerabilities.
Search URL Search Domain Scan URL
Title: How CISOs Can Craft Better Narratives for the Board 2023-04-17 19:51:00 UTC CISOs are being advised to simplify and tailor their messaging when communicating cyber-risk to upper management and board members. This approach will ensure better understanding and help craft stronger narratives for decision-makers.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Andrew Katz
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://cyberfeed.io/
HTTP 301
https://cyberfeed.io/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://cdn.tailwindcss.com/ HTTP 302
- https://cdn.tailwindcss.com/3.3.1
53 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
cyberfeed.io/ Redirect Chain
|
68 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 975 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.3.1
cdn.tailwindcss.com/ Redirect Chain
|
348 KB 107 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
count.js
gc.zgo.at/ |
9 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
trend_up.svg
cyberfeed.io/app/static/ |
323 B 369 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
trend_down.svg
cyberfeed.io/app/static/ |
326 B 325 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nord.png
cyberfeed.io/app/static/ |
37 KB 37 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chinaiptheft_Pixels_Hunter_shutterstock.jpg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt7b0b1c27d52b4578/62b4ba5e9b1d980db353fdce/ |
495 KB 496 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Fraud_photobyphotoboy_Adobe.jpeg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt8fb23000be31e05b/61ad04dff1b49856b7fc6edf/ |
190 KB 191 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Cybersecurity_News-SecurityWeek.jpg
www.securityweek.com/wp-content/uploads/2023/01/ |
237 KB 238 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
android-Marc_Bruxelle_RF-Alamy.jpg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/bltfc950825a80a21a0/643eb071ee6de97ed7d65eed/ |
327 KB 327 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
data-theft-header.jpg
www.bleepstatic.com/content/hl-images/2021/12/21/ |
147 KB 147 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Global-Encryption.jpg
d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2023/04/17/ |
49 KB 49 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
maxresdefault_live.jpg
i.ytimg.com/vi/wBK_6WGHTEY/ |
178 KB 178 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NP-logo-300x273.jpg
cdn.comparitech.com/wp-content/uploads/2020/07/ |
5 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spyware.jpg
www.securityweek.com/wp-content/uploads/2023/03/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sandbox-escape.jpg
www.bleepstatic.com/content/hl-images/2022/10/11/ |
32 KB 32 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
specops-hacker-conducting-attacks.jpg
www.bleepstatic.com/content/posts/2023/04/17/ |
111 KB 112 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
maxresdefault.jpg
i.ytimg.com/vi/Yzi1o-BH6QQ/ |
100 KB 100 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
risk_medrooky_Alamy.jpg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt8e32d83735ff5002/64398110134b4e7d9f030006/ |
85 KB 85 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
play.png
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEg8OMixWmWR8H-2Z691qbD7aAdqzFre6eWA72L3EtD6CxwRQRdykZ4Kqh9cpIbtCuH3EjRsGgAKspQXCNtMq9m7uNkTeFr9fmEuz14VN3x6FmR53agzoJ4RFpnWdsLmhQ57Iaznsq909RAsiVkQD... |
225 KB 226 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
routers_Maximumm_shutterstock.jpg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt6da3fa6a0ca0e488/61f1d0071c73f512f50404d0/ |
654 KB 655 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
maxresdefault.jpg
i.ytimg.com/vi/iD_klswHJQs/ |
133 KB 133 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Mandiant-M-Trends-Report.jpg
www.securityweek.com/wp-content/uploads/2023/04/ |
111 KB 112 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
threatintelligence-ArtemisDiana-adobe.jpeg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blta7d648fcf1d5ea72/633b262f4b7a550f4af66894/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
malware-android.png
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEgUxaKqaj7Cp0xRY0yAUfyKsBs0QSv4s9FTs091CQSGegtktzDYz8heWwAIaitybbeKrYYqwPx3M6GhFNO58dTQpjIxty5nc1DbqBZUqD3TXr-9phuAx74PyzlsQaNpWbOIvZOoEYRlufuTgEiMr... |
22 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Cyber-Insurance.jpg
www.securityweek.com/wp-content/uploads/2023/03/ |
195 KB 195 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xdr.png
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEhI1O9SAEIRJ1ViPZHB_lbkOW40y_mlbI_Vm5tJ6raFm1ZM33a9Zj-yFlUBn9w23U1MHmpasWrkvIbuVCV3r9706JlgUn33d8Q1Ja7DKUhuyFWJ5eHC1BexIhuThmywW7KM462Hx0uRZcVFSOv3k... |
101 KB 102 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cropped-favicon-1-180x180.png
149400697.v2.pressablecdn.com/wp-content/uploads/2020/06/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
domino-malware1.png
heimdalsecurity.com/blog/wp-content/uploads/ |
170 KB 170 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Untitled-1600-%C3%97-900-px-4.png
heimdalsecurity.com/blog/wp-content/uploads/ |
566 KB 567 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Cybersecurity-Mergers-Acquisitions-Report.jpeg
www.securityweek.com/wp-content/uploads/2023/02/ |
131 KB 132 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hacking.png
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEjbU1uIeqZ5Gq9hnoAu6cEg4S-t7SQ-ZWd7w1RM7j5IYXdddtyeti9l1KRYaF0iPULRjhyCdJjedQxfEhrx860sr8zxxT0GOzy8uP23UrktwNN1uKd2ZyDe_thg7i-K17xv-if2TkGVWDv40xL5y... |
74 KB 75 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cropped-eclecticlightlogo-e1421784280911.png
eclecticlightdotcom.files.wordpress.com/2015/01/ |
14 KB 14 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lockbit-ransomware-macos.png
thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEhlj1rTUvFkHCFaaGswgeBRCd6V1Qrc97PQVLl63LvFl-S7hEqMB5ZXkNTI8KuTmBtM9cGvlK9XTDnPVto_3xQdVIExEuSxy8KbQpKOBV51hddruFiXukIVOmbKyatY0XmWVMr3VOnrBSr811QKt... |
284 KB 284 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mixedusb3btrioread.png
eclecticlightdotcom.files.wordpress.com/2023/04/ |
17 KB 17 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default_news.png
cyberfeed.io/app/static/ |
1 MB 1 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apple-icon-180x180.png
risky.biz/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Frame-3.jpg
birchtree.me/content/images/2022/10/ |
36 KB 36 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fin7_ozrimoz_shutterstock.jpg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt59b1ed0e12319538/643db1eb2b3e6c10dd5c97f5/ |
384 KB 384 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
og-image.jpg
beta.darkreading.com/images/ |
18 KB 18 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
featured_profile.jpg
d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2023/04/17/ |
45 KB 46 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
google_chrome_Stephen_Frost_Alamy.jpg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt9118d1ec2cff7a86/643da2a31a712e7c06026699/ |
2 MB 2 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
threat-actor.jpg
www.bleepstatic.com/content/hl-images/2021/09/03/ |
108 KB 108 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chatgpt-Atchariya_wattanakul_-alamy.jpg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt2f18aa4d06926f0d/63f4ecc951784e5b9479974a/ |
96 KB 96 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fairytale-AdobeStock-ThisDesign.jpeg
eu-images.contentstack.com/v3/assets/blt66983808af36a8ef/blt48068883c68e7baa/643c34d80ca665101dd0525c/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6916832.png
cdn-icons-png.flaticon.com/128/6916/ |
620 B 945 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nord2.png
cyberfeed.io/app/static/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
124021.png
cdn-icons-png.flaticon.com/512/124/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
174857.png
cdn-icons-png.flaticon.com/512/174/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Generic_Feed-icon.svg
cyberfeed.io/app/static/ |
569 B 504 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
UcCO3FwrK3iLTeHuS_fvQtMwCp50KnMw2boKoduKmMEVuLyfAZ9hiA.woff2
fonts.gstatic.com/s/inter/v12/ |
16 KB 17 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
count
cyberfeed.goatcounter.com/ |
43 B 810 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| tailwind string| /template.html object| goatcounter0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
149400697.v2.pressablecdn.com
beta.darkreading.com
birchtree.me
cdn-icons-png.flaticon.com
cdn.comparitech.com
cdn.tailwindcss.com
cyberfeed.goatcounter.com
cyberfeed.io
d2908q01vomqb2.cloudfront.net
eclecticlightdotcom.files.wordpress.com
eu-images.contentstack.com
fonts.googleapis.com
fonts.gstatic.com
gc.zgo.at
heimdalsecurity.com
i.ytimg.com
risky.biz
thehackernews.com
www.bleepstatic.com
www.securityweek.com
104.236.162.111
104.26.13.6
148.251.232.158
151.101.2.137
192.0.72.17
192.0.77.39
192.124.249.38
2606:4700:20::6818:a003
2606:4700:20::681a:296
2606:4700:20::ac43:4ad5
2606:4700:3034::6815:1c2f
2606:4700::6811:7963
2a00:1450:4001:82a::2003
2a00:1450:4001:82b::2016
2a00:1450:4001:830::200a
2a01:7e01::f03c:92ff:fe8f:edc6
2a02:26f0:480:397::312e
2a05:d014:275:cb02::c8
2a09:8280:1::6:8b6f
52.222.232.57
00db3448fbb9567a132511b5c3d8988f436fba918ff8d779bde500ba15ad5453
016bf65f29f138c65e268a312162b50d05faa00f26496df5a1e48b800148d823
0364d368abf457d4e70dbc7a7a360f3486eaea2837b194915b23d4398bee91ac
13c5bfae9ea1c49e44f47d3ee521bf0b786ec9a275f247e10693689b0c7841a7
1660a6ff98b9d52f5f523b86b9550248e4d6ae2a7e5ba36201447df1e4088943
1d3737f90f1fdb0302c9980cfe0fc49b2deb828a80ddef71765a36a5ac2372cb
1fa8efa33a909df5e0fbec257f0e3407f5cd2a5edb2a8eda6ce53130d522e8de
24d31471c388aac632fa7a0976f5cf0098178af8fe1ddc46510a2dee35be8c47
297eaf8e4fac035a230332e703abf3784bb4cf0deac844879a2d364b15130af2
2c4f1e6a370641c63ccd67a4a6fc193a934f81aed8b52426ee1377ffddb4f150
2c92ac03549d5cd2bbf9790098bbc33ed6eb0f30ecd26d1def6f102e36264a1c
2d76be9dc36ea918d776ea2f6979b1688170a788cc322f5c78135d47517c6ded
307c6efddd9f0df8754adce0ca8ae2d6c03ec8fd4e12af50106596cf9481fc14
30c27337dcf3d7c7b540ee60397fee5f4ee941f47be8f6ef606737f56d6dda8a
3253be991de54341b5a7ad67873febf7ad7b95103fa0efb7bbee818e64545d66
39aaead405ed2c3848c00aba3582cab0e671095161a5dcd33fa5489a96c84bf5
3c576b4a8367bc93af2dda164fe59d31042a9d0cd13f8bf4a548155e2dfc478a
42cb846e07917f6731406e500f24aeb2e88c42cda124eaa59e08c5331cad8bcb
458e9be5140e142278f9fa82148d7b4129bb5655cc477064faa491bdb5d2ad4c
4a924db249437e837d92850fbd9add1b6b7302a16494620dd573984fcc8ae79e
4b51ae88ced734e5aad7ce91dc6af06509c332f02cca33756240e808592a73a4
4ef68409c50c55f680c67c2b8299d266e54ae199c143a90281c7f462c3c52e48
5dd0b52c97953043e75b1dbe6584f8e4c79ee2aa78b4fae839b441dca968db64
65332e553b038626a33ecf7d5df7f0a8747f0e7584a048c1172b1ad04f8d915d
693b4f7f936bedbdcfb2ae8e8e9ead11ea6389ebbd9eaee088d3098a6de12403
6bcae1eaede6699e89898eb0eb3b0b970f4e5107f6b453d45f7b75fc157e44a7
6e9d4559c16cb1a9beb2dbaaf9f22ffcbb21655dcf3cbcdc0df0cb506789edd3
73e3ae141777c483b369db25e936d456302a5a80d30d186549a86d6980b84b68
7444bc104c5a4965dee358539f0be3ce05a7299abb61ad47c195ca49582ca67c
7e24cc9116f0ea36a3a77c3028ebe2dda4508415514ddfb9980cf2f24029d18a
80e26e4fb339b846aa365eb265c4bbe6ab2e8061de92ecb3e5a196b76d08d20e
83a5ca8af4b6dccb320d1430532502920c3db70c12dfeeef510bc988a1953e11
876e93639130e9fa66547386adcd495f0ed3b5cee07c1a4be64812e3d95b6f23
8b6091c1ad7a193a34c02bb828bb4764b66d9e25c1627d2fc8cbe5d26fbf0dd4
8b6911b3c2c89870f7c15c2dcbffb2674c3d11d44386b2bead285b50e77d8626
8d144c52235a5e47792f28f9a301d001ba8583634f775ee188869987ad7e8a93
8e978d3e75dbc8916a420c15d512d7b7d3830fa832977c35213d8dfbf722c491
9ac7a1ae9c2388635cca1633983d12a3cb60f84d6bd4451726ceace844aedc70
9eb6ffcfa297dc25aebd90fd7930e9d4ad724d8cd496d4621df28ddc29631d77
a77415935120933848d9f315681dd62d107c75b3e06448ea71d54cdc4fc63e39
b9fe28d2aa6d69132a70723580a1a18265c2a3b5f56a474784cde3f18b303541
c1177855cb7230ff8bf50ed2b3a4e230cd9882cdb1ca54d62d02f8dd8d118622
c3b1e77eb1e29c394712c68e7625ec4af6c80d6d21ff9c2fbefdedbe182dd0da
cc511b962eff327fd2bb484dade316b7af6a51dd998415603479877c95085ccf
cd9a562696ec0cdf5d0911d14c5b182774062d33d5575ec06a4356d4484d3615
d96a6244e70fb5a35019ee9f0216d741cd0395a3aa5fe63a3934b8a792fc29f9
d9ec5e07693843df2f2de8b4ceb1a64b049b14b9c65c0c6e4bd6b781f36eb638
dc563ed71957605246506c4f043f33145b6b448abcb5ba779ee962ae6941801d
dcb84be3b672dab7d7b90ecb57c0b2ba013fd3379839fdd323537442de4553ed
dfe1c3ca5d34687e717ed264cbf20872ff3e6213434d5b1d88a3ed824770029f
e8725bde95b34b4934497b8777d997ea0f87398480f380482f3098fd2494cbb1
f7fa1574569610520e9190b62a3a36675746f4ed9291fd42e71c1c1db0fc75a6
fdf4bca50fec052314ccaad04ff78ee8ba4d7906b4d24465d81b850c0ed5281a