URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Submission: On June 06 via api from BR

Summary

This website contacted 17 IPs in 6 countries across 17 domains to perform 58 HTTP transactions. The main IP is 2606:4700:30::681b:b4fa, located in United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is mundohacker.net.br.
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on December 27th 2018. Valid for: a year.
This is the only time mundohacker.net.br was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
24 2606:4700:30:... 13335 (CLOUDFLAR...)
1 2.18.233.149 16625 (AKAMAI-AS)
1 2a04:fa87:fff... 2635 (AUTOMATTIC)
1 2606:4700::68... 13335 (CLOUDFLAR...)
3 2a00:1450:400... 15169 (GOOGLE)
7 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
2 2a03:2880:f01... 32934 (FACEBOOK)
2 2a00:1288:84:... 203219 (YAHOO-AMA)
2 2a05:f500:11:... 14413 (LINKEDIN)
2 23.210.248.189 16625 (AKAMAI-AS)
2 104.18.166.29 13335 (CLOUDFLAR...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 6 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 54.82.244.85 14618 (AMAZON-AES)
58 17
Domain Requested by
24 mundohacker.net.br mundohacker.net.br
ajax.cloudflare.com
7 pagead2.googlesyndication.com ajax.cloudflare.com
pagead2.googlesyndication.com
6 googleads.g.doubleclick.net 1 redirects pagead2.googlesyndication.com
3 fonts.gstatic.com mundohacker.net.br
2 api.bufferapp.com mundohacker.net.br
2 api.pinterest.com mundohacker.net.br
2 www.linkedin.com mundohacker.net.br
2 api.tumblr.com mundohacker.net.br
2 graph.facebook.com mundohacker.net.br
2 www.google-analytics.com mundohacker.net.br
1 www.imaginarionerd.com.br pagead2.googlesyndication.com
1 www.googletagservices.com pagead2.googlesyndication.com
1 adservice.google.com pagead2.googlesyndication.com
1 adservice.google.de pagead2.googlesyndication.com
1 ajax.cloudflare.com mundohacker.net.br
1 secure.gravatar.com mundohacker.net.br
1 zdnet1.cbsistatic.com mundohacker.net.br
58 17
Subject Issuer Validity Valid
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2018-12-27 -
2019-12-27
a year crt.sh
cc.cnetcontent.com
DigiCert SHA2 Secure Server CA
2019-04-15 -
2020-07-14
a year crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
ssl412106.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-03-02 -
2019-09-08
6 months crt.sh
*.google.com
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-05-21 -
2019-08-13
3 months crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-05-14 -
2019-08-06
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-04-22 -
2019-07-21
3 months crt.sh
*.yahoo.com
DigiCert SHA2 High Assurance Server CA
2019-06-03 -
2019-07-18
a month crt.sh
www.linkedin.com
DigiCert SHA2 Secure Server CA
2018-05-30 -
2020-09-01
2 years crt.sh
*.pinterest.com
DigiCert SHA2 High Assurance Server CA
2019-06-05 -
2020-07-22
a year crt.sh
api.bufferapp.com
DigiCert SHA2 Secure Server CA
2018-07-11 -
2020-07-15
2 years crt.sh
www.imaginarionerd.com.br
Let's Encrypt Authority X3
2019-05-20 -
2019-08-18
3 months crt.sh

This page contains 8 frames:

Primary Page: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Frame ID: 4D2AD43973FDD4E88F390062003289A1
Requests: 50 HTTP requests in this frame

Frame: https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Frame ID: 18088CD896EF07D38913DE166EB0748C
Requests: 2 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20190603/r20190131/zrt_lookup.html
Frame ID: 64E5F816BD3D0FE080CEFE863B152DDC
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&adk=1812271804&adf=3025194257&lmt=1559844484&plat=1%3A32776%2C2%3A32776%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C30%3A1081344&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1559844484779&bpp=52&bdt=771&fdt=197&idt=197&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&nras=1&correlator=4870649502191&frm=20&pv=2&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2148334251&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=0&ady=0&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=2&fc=1936&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2016045443&ifi=0&uci=0.rwqw7v1yzyi9&fsb=1&dtd=225
Frame ID: 5CF7E7CEC4F92E510CB86782321D011E
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&h=60&slotname=6097213995&adk=4159193640&adf=709448937&w=676&fwr_io=true&fwrn=4&fwrnh=100&lmt=1559844485&rafmt=1&guci=1.2.0.0.2.2.0.0&format=676x60&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&fwr=0&fwrattr=true&resp_fmts=3&wgl=1&adsid=NT&dt=1559844484831&bpp=42&bdt=823&fdt=222&idt=223&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2685205163&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=2609&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1936&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&osw_key=2680192990&ifi=1&uci=1.dtaiv3lp8wfa&fsb=1&xpc=SUhJ0XvwXH&p=https%3A//mundohacker.net.br&dtd=249
Frame ID: DC03EFD4359D5E9F6556FF32CDDECD7D
Requests: 1 HTTP requests in this frame

Frame: https://www.imaginarionerd.com.br/
Frame ID: 623BCDEFAD28A575FB7C9FDD758F92F7
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&h=169&adk=2080432792&adf=319813720&w=676&lmt=1559844485&num_ads=1&sem=mc&pwprc=4642793139&guci=1.2.0.0.2.2.0.0&ad_type=text_image&format=676x169&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&pra=3&wgl=1&fa=27&adsid=NT&dt=1559844485315&bpp=16&bdt=1307&fdt=17&idt=18&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C676x60%2C312x250&nras=2&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2685205163&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=1325&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1424&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2234260145&ifi=3&uci=3.z5b0qtbeeou4&xpc=cPhD1MdWst&p=https%3A//mundohacker.net.br&dtd=22
Frame ID: E9DC3F543843DD176487DE65593AD030
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&h=169&adk=2080432792&adf=1332395379&w=676&lmt=1559844485&num_ads=1&sem=mc&pwprc=4642793139&guci=1.2.0.0.2.2.0.0&ad_type=text_image&format=676x169&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&pra=3&wgl=1&fa=27&adsid=NT&dt=1559844485340&bpp=11&bdt=1332&fdt=14&idt=15&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C676x60%2C312x250%2C676x169&nras=3&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=11275139755&dssz=28&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=2280&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1424&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2234260145&ifi=4&uci=4.j9srrowib0re&xpc=FAbaPSDtd6&p=https%3A//mundohacker.net.br&dtd=21
Frame ID: 67EC818E40C1443018B2CA5118D0DCAC
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • script /react.*\.js/i

Overall confidence: 100%
Detected patterns
  • html /<!-- This site is optimized with the Yoast/i

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

58
Requests

100 %
HTTPS

76 %
IPv6

17
Domains

17
Subdomains

17
IPs

6
Countries

1109 kB
Transfer

2011 kB
Size

3
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 52
  • https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&h=250&slotname=3693092685&adk=1269935764&adf=4089897525&w=312&fwr_io=true&fwrn=4&fwrnh=100&lmt=1559844485&rafmt=1&guci=1.2.0.0.2.2.0.0&format=312x250&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&fwr=0&fwrattr=true&resp_fmts=3&wgl=1&adsid=NT&dt=1559844484873&bpp=21&bdt=865&fdt=299&idt=299&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C676x60&nras=1&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2685205163&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1001&ady=262&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1936&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeE%7C&abl=CS&pfx=0&fu=144&bc=31&osw_key=1714299631&ifi=2&uci=2.m8vzzary01hd&fsb=1&xpc=BOqJdmyNze&p=https%3A//mundohacker.net.br&dtd=304 HTTP 302
  • https://www.imaginarionerd.com.br/

58 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
52 KB
12 KB
Document
General
Full URL
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f8809866d66f6298044839f0f214c073174c0b9b3c7f8176215777fcf84e470a

Request headers

:method
GET
:authority
mundohacker.net.br
:scheme
https
:path
/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Thu, 06 Jun 2019 18:08:03 GMT
content-type
text/html; charset=UTF-8
set-cookie
__cfduid=d9ae2fb4e33387915f0b346a78f7d83c11559844482; expires=Fri, 05-Jun-20 18:08:02 GMT; path=/; domain=.mundohacker.net.br; HttpOnly visid_incap_1927708=OTIYUhnjRC2jrI4nm0Agh4JW+VwAAAAAQUIPAAAAAADEG70wZ+4nVaKvjYwQDcvQ; expires=Fri, 05 Jun 2020 10:09:33 GMT; path=/; Domain=.mundohacker.net.br incap_ses_1055_1927708=cXPBF9IyQkqhUgNtch2kDoNW+VwAAAAAiIxaJP3WKdZocdj4IWEr3w==; path=/; Domain=.mundohacker.net.br
link
<https://mundohacker.net.br/wp-json/>; rel="https://api.w.org/"
vary
Accept-Encoding
x-iinfo
5-9145220-9145221 NNNN CT(42 -1 0) RT(1559844482058 1) q(0 0 1 0) r(12 12) U10000
x-cdn
Incapsula
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
4e2c544f4934d6d9-FRA
content-encoding
br
header-c8c32a0c.min.css
mundohacker.net.br/wp-content/cache/fvm/1559746788/out/
163 KB
24 KB
Stylesheet
General
Full URL
https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-c8c32a0c.min.css
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c58a2fcd536b261e6364d9a439483a1eaf844ecff9a7f41879842cba210baea0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 Jun 2019 14:59:58 GMT
x-cdn
Incapsula
etag
W/"68bd162d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
x-iinfo
11-22552529-22548217 2VNN RT(1559788451658 0) q(0 0 0 0) r(1 1) U18
cache-control
public, max-age=31536000
cf-ray
4e2c5459181ed6d9-FRA
server
cloudflare
expires
Fri, 05 Jun 2020 18:08:04 GMT
frontend.min.css
mundohacker.net.br/wp-content/plugins/starbox//themes/business/css/
6 KB
1 KB
Stylesheet
General
Full URL
https://mundohacker.net.br/wp-content/plugins/starbox//themes/business/css/frontend.min.css
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
93f13cf6620e0f1f5a3ebf5beeda2e9ea6a3c6fb7e7c7fbf5ef89250b9928d38

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 Jun 2019 14:59:48 GMT
x-cdn
Incapsula
etag
W/"e84c407e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
x-iinfo
13-5149974-5148491 2CNN RT(1559839038735 0) q(0 0 0 0) r(0 0)
cache-control
public, max-age=31536000
cf-ray
4e2c54591822d6d9-FRA
server
cloudflare
expires
Fri, 05 Jun 2020 18:08:04 GMT
hidedefault.min.css
mundohacker.net.br/wp-content/plugins/starbox//themes/admin/css/
139 B
224 B
Stylesheet
General
Full URL
https://mundohacker.net.br/wp-content/plugins/starbox//themes/admin/css/hidedefault.min.css
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
949d9782a1a9f714a131642eb7d93f4933a92f7a7893e088b0298acc7dcbebc9

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 Jun 2019 14:59:48 GMT
x-cdn
Incapsula
etag
W/"ac35f5c9"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
x-iinfo
5-13017832-0 0CNN RT(1559839038290 0) q(0 -1 -1 0) r(0 -1)
cache-control
public, max-age=31536000
cf-ray
4e2c54591825d6d9-FRA
server
cloudflare
expires
Fri, 05 Jun 2020 18:08:04 GMT
cropped-76052525-1.png
mundohacker.net.br/wp-content/uploads/2019/01/
3 KB
3 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/2019/01/cropped-76052525-1.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c33115882525d24fdb51312aa73e4a9fbc014ae19987fd398512c2eeb65edee7

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
12-15314533-15311671 2CNN RT(1559788451168 0) q(0 0 0 0) r(0 0)
content-length
2674
last-modified
Fri, 25 Jan 2019 18:27:11 GMT
server
cloudflare
etag
"1c015ffc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c54591827d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
gandcrab-ransomware.jpg
mundohacker.net.br/wp-content/uploads/2019/05/
59 KB
59 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/2019/05/gandcrab-ransomware.jpg
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
de2d2728d87897267914f5f8add911fe7309032d57922a572659e35031701b9c

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
3-8714450-8712857 2CNN RT(1559839038739 0) q(0 0 0 0) r(0 0)
content-length
60552
last-modified
Sat, 25 May 2019 12:58:18 GMT
server
cloudflare
etag
"e34fc4f0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c54591829d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
61408381_695442184230463_7859649414191644672_n.png
mundohacker.net.br/wp-content/uploads/2019/05/
51 KB
51 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/2019/05/61408381_695442184230463_7859649414191644672_n.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
de32a6e41a07a6edd712ce74d67c313874b47cda423bf5da33f6e54e094fd6da

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
4-2063613-0 0CNN RT(1559601930885 0) q(0 -1 -1 0) r(0 -1)
content-length
51728
last-modified
Fri, 31 May 2019 03:00:31 GMT
server
cloudflare
etag
"6d397038"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c5459182bd6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
gandcrab-mysql-campaign.png
zdnet1.cbsistatic.com/hub/i/r/2019/05/24/d080abd9-eac8-47e2-b1c0-fca1a4a420a3/resize/370xauto/3e8af47777c7d17f77e1bb0f4d579d48/
82 KB
82 KB
Image
General
Full URL
https://zdnet1.cbsistatic.com/hub/i/r/2019/05/24/d080abd9-eac8-47e2-b1c0-fca1a4a420a3/resize/370xauto/3e8af47777c7d17f77e1bb0f4d579d48/gandcrab-mysql-campaign.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.149 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-149.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
c1eace0bb21bf3b387f9f3f1e912e62a23f7868461635b5c2ad8a1d237801346

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
server
nginx
access-control-allow-origin
http://origin.img.hub.zdnet.com
etag
"fa52ea3dc8c987eed10d4a8319ba2a0d"
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
public, max-age=30429593, s-maxage=21600
content-transfer-encoding
binary
timing-allow-origin
*
content-length
83425
2687466e53721ca51312604792b4b1ff
secure.gravatar.com/avatar/
81 KB
82 KB
Image
General
Full URL
https://secure.gravatar.com/avatar/2687466e53721ca51312604792b4b1ff?s=250&r=g
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
ec478f6e3a9dd13e514e071671422a55dbfab93fc7aca021eebc73903f7186f2

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT vie 4
date
Thu, 06 Jun 2019 18:08:04 GMT
last-modified
Wed, 27 Feb 2019 17:01:07 GMT
server
nginx
access-control-allow-origin
*
source-age
4645499
content-type
image/png
status
200
cache-control
max-age=300
content-disposition
inline; filename="2687466e53721ca51312604792b4b1ff.png"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/2687466e53721ca51312604792b4b1ff?s=250&r=g>; rel="canonical"
content-length
83314
expires
Thu, 06 Jun 2019 18:13:04 GMT
7238-featured-75x75.png
mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/
5 KB
5 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/7238-featured-75x75.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
fd3f73bd299f46de8be73e32cbc5b9b0662c0561af68643e3c973fdf8a57a802

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
3-30088077-30087448 2CNN RT(1559823613642 0) q(0 0 0 0) r(0 0) U18
content-length
5246
last-modified
Tue, 04 Jun 2019 21:43:56 GMT
server
cloudflare
etag
"2ce0e411"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c54596972d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
5297-featured-75x75.png
mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/
8 KB
8 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/5297-featured-75x75.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d5b7185d7057a38d1e14ab79fb34b093a53864a461d55560e679d8e797c1d79d

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
1-8260487-0 0CNN RT(1559601930063 0) q(0 -1 -1 12) r(0 -1)
content-length
8408
last-modified
Tue, 05 Feb 2019 18:23:46 GMT
server
cloudflare
etag
"2da29c49"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c54596975d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
5036-featured-75x75.jpg
mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/
2 KB
2 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/5036-featured-75x75.jpg
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b0222abdb48363b08a163627f1e9b5b82b82f67ed010ad235af79f621393daf4

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
5-16694488-16693513 2CNN RT(1559788451180 0) q(0 0 0 0) r(0 0)
content-length
1783
last-modified
Thu, 31 Jan 2019 00:06:23 GMT
server
cloudflare
etag
"c3955c5c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c54596977d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
6870-featured-75x75.png
mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/
9 KB
9 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/6870-featured-75x75.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
5f16d2c8884d7cb676c6965551f2eead3509fa7731061b5e0732684199e83163

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
4-96612218-0 0CNN RT(1559639772097 0) q(0 -1 -1 0) r(1 -1)
content-length
9032
last-modified
Thu, 25 Apr 2019 18:06:21 GMT
server
cloudflare
etag
"c9f2799f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c54596978d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
7242-featured-75x75.jpg
mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/
2 KB
2 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/wordpress-popular-posts/7242-featured-75x75.jpg
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
38d0c66e4a89d80e3b5b1aa25a7afa781001e88046295760627212b193bcafb7

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
5-13017900-13016959 2CNN RT(1559839038803 0) q(0 0 0 0) r(0 0) U18
content-length
2331
last-modified
Thu, 06 Jun 2019 11:25:50 GMT
server
cloudflare
etag
"993ce347"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c54596979d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
Whatsapp-Top-TaComVc-2-300x300.png
mundohacker.net.br/wp-content/uploads/2019/06/
45 KB
46 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/2019/06/Whatsapp-Top-TaComVc-2-300x300.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
b4e7ffe85994fa7d3ee605998a70f7409e1e7bfd686173231eb074e3d7f87248

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
6-4338379-4292601 2CNN RT(1559839039174 0) q(0 0 0 0) r(0 0) U18
content-length
46561
last-modified
Thu, 06 Jun 2019 13:00:25 GMT
server
cloudflare
etag
"69475f6a"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c5459697bd6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
61878132_449333672553395_8222927613627203584_n.png
mundohacker.net.br/wp-content/uploads/2019/06/
133 KB
134 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/2019/06/61878132_449333672553395_8222927613627203584_n.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
61ee4b8af1060370fa084232bf0f9a2bcca38316aeadb0e0fa33fe89e616f0f6

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
5-26626667-26608215 2CNN RT(1559601930732 0) q(0 0 0 1) r(0 0) U18
content-length
136579
last-modified
Mon, 03 Jun 2019 10:41:38 GMT
server
cloudflare
etag
"03419ad6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c5459697dd6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
61216388_2673187619375720_953779165469868032_n-300x123.png
mundohacker.net.br/wp-content/uploads/2019/05/
15 KB
15 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/uploads/2019/05/61216388_2673187619375720_953779165469868032_n-300x123.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c7f73f45f77f6d5418f9cdd0edaafce6d5d5ac4c5dfc67b51cfa0a578a2cd834

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
12-30250-15307 2CNN RT(1559643920251 0) q(0 0 0 1) r(0 0)
content-length
15696
last-modified
Wed, 29 May 2019 20:23:01 GMT
server
cloudflare
etag
"c052a425"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c5459697fd6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
rocket-loader.min.js
ajax.cloudflare.com/cdn-cgi/scripts/a2bd7673/cloudflare-static/
12 KB
4 KB
Script
General
Full URL
https://ajax.cloudflare.com/cdn-cgi/scripts/a2bd7673/cloudflare-static/rocket-loader.min.js
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:c697 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
09cb7c36c13be7810320607e581c11cd14b5b53eefe52a528b944a43f5a91cda
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
last-modified
Mon, 03 Jun 2019 15:11:33 GMT
server
cloudflare
x-frame-options
SAMEORIGIN
etag
W/"5cf538a5-2ef5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=172800, public
strict-transport-security
max-age=15780000; includeSubDomains
cf-ray
4e2c5459f9dbc2f9-FRA
expires
Sat, 08 Jun 2019 18:08:04 GMT
sprite.png
mundohacker.net.br/wp-content/plugins/starbox//themes/business/img/
9 KB
9 KB
Image
General
Full URL
https://mundohacker.net.br/wp-content/plugins/starbox//themes/business/img/sprite.png
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
d808fa50da4cce0f457623eb09f4146ac1e68fa7a8c0a4db28608692c90c087a

Request headers

Referer
https://mundohacker.net.br/wp-content/plugins/starbox//themes/business/css/frontend.min.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
10-2020260-0 0CNN RT(1559839039099 0) q(0 -1 -1 0) r(1 -1)
content-length
9212
last-modified
Fri, 22 Mar 2019 14:19:58 GMT
server
cloudflare
etag
"4c7dd00f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c5459bae8d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
tDbI2oqRg1oM3QBjjcaDkOr9rAM.woff
fonts.gstatic.com/s/droidserif/v9/
26 KB
26 KB
Font
General
Full URL
https://fonts.gstatic.com/s/droidserif/v9/tDbI2oqRg1oM3QBjjcaDkOr9rAM.woff
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c5f63ca46cb266eabe08790686081f4e6cb75468010102db68f0bfb0275472f7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Origin
https://mundohacker.net.br

Response headers

date
Sun, 02 Jun 2019 21:46:04 GMT
x-content-type-options
nosniff
last-modified
Tue, 19 Feb 2019 22:33:41 GMT
server
sffe
age
332520
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
26120
x-xss-protection
0
expires
Mon, 01 Jun 2020 21:46:04 GMT
fontawesome-webfont.woff2
mundohacker.net.br/wp-content/themes/cassions/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://mundohacker.net.br/wp-content/themes/cassions/assets/fonts/fontawesome-webfont.woff2
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-c8c32a0c.min.css
Origin
https://mundohacker.net.br

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Fri, 18 Jan 2019 07:56:25 GMT
x-cdn
Incapsula
etag
W/"6e31e18d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/plain
status
200
x-iinfo
5-13403890-13352468 2CNN RT(1559839038304 2) q(0 0 0 -1) r(0 0)
cache-control
public, max-age=31536000
cf-ray
4e2c5459caf7d6d9-FRA
server
cloudflare
expires
Fri, 05 Jun 2020 18:08:04 GMT
tDbV2oqRg1oM3QBjjcaDkOJGiRD7Owc.woff
fonts.gstatic.com/s/droidserif/v9/
29 KB
29 KB
Font
General
Full URL
https://fonts.gstatic.com/s/droidserif/v9/tDbV2oqRg1oM3QBjjcaDkOJGiRD7Owc.woff
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
81656fae16bc170a071115ef76f8d15469d3b9013497b10b7656035e40584dc3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Origin
https://mundohacker.net.br

Response headers

date
Tue, 04 Jun 2019 03:04:03 GMT
x-content-type-options
nosniff
last-modified
Tue, 19 Feb 2019 22:35:57 GMT
server
sffe
age
227041
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
29856
x-xss-protection
0
expires
Wed, 03 Jun 2020 03:04:03 GMT
tDbK2oqRg1oM3QBjjcaDkOr4nAfcGA.woff
fonts.gstatic.com/s/droidserif/v9/
24 KB
24 KB
Font
General
Full URL
https://fonts.gstatic.com/s/droidserif/v9/tDbK2oqRg1oM3QBjjcaDkOr4nAfcGA.woff
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
771f0b8eb5be0eca59c944da8bf049c71097ae9e6a9a83179edded95e19b34b7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Origin
https://mundohacker.net.br

Response headers

date
Sat, 01 Jun 2019 12:26:22 GMT
x-content-type-options
nosniff
last-modified
Tue, 19 Feb 2019 22:35:50 GMT
server
sffe
age
452502
content-type
font/woff
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
24712
x-xss-protection
0
expires
Sun, 31 May 2020 12:26:22 GMT
wpusb.woff2
mundohacker.net.br/wp-content/plugins/wpupper-share-buttons/assets/fonts/
18 KB
18 KB
Font
General
Full URL
https://mundohacker.net.br/wp-content/plugins/wpupper-share-buttons/assets/fonts/wpusb.woff2
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
7f89ce98ef32ac3fbd1ec1d22cf26c92e66f0f5189a2b3aaaf6428ac006df057

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-c8c32a0c.min.css
Origin
https://mundohacker.net.br

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
cf-cache-status
HIT
x-cdn
Incapsula
status
200
x-iinfo
3-16370415-0 0CNN RT(1559601931664 0) q(0 -1 -1 0) r(0 -1)
content-length
18096
last-modified
Thu, 09 May 2019 13:03:23 GMT
server
cloudflare
etag
"1b1d4409"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
font/woff2
cache-control
public, max-age=31536000
accept-ranges
bytes
cf-ray
4e2c5459cb11d6d9-FRA
expires
Fri, 05 Jun 2020 18:08:04 GMT
footer-a1881e9c.min.js
mundohacker.net.br/wp-content/cache/fvm/1559746788/out/
20 KB
7 KB
Script
General
Full URL
https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/footer-a1881e9c.min.js
Requested by
Host: ajax.cloudflare.com
URL: https://ajax.cloudflare.com/cdn-cgi/scripts/a2bd7673/cloudflare-static/rocket-loader.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2d29ee88c766932cc4e46266f58448ead1e447ad0e9a7ac1e1f258768d46ea74

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 Jun 2019 15:00:47 GMT
x-cdn
Incapsula
etag
W/"a51ab9a7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
x-iinfo
14-11832153-11782081 2VNN RT(1559839037982 0) q(0 0 0 -1) r(1 1) U18
cache-control
public, max-age=31536000
cf-ray
4e2c545c7dbad6d9-FRA
server
cloudflare
expires
Fri, 05 Jun 2020 18:08:04 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
88 KB
33 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: ajax.cloudflare.com
URL: https://ajax.cloudflare.com/cdn-cgi/scripts/a2bd7673/cloudflare-static/rocket-loader.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
12a2bea79acc7aaf41bb4f5141b97387c518ea9975cbb5b1fda02837c1a34224
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
33192
x-xss-protection
0
server
cafe
etag
4698524695557668470
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Thu, 06 Jun 2019 18:08:04 GMT
frontend.min.js
mundohacker.net.br/wp-content/plugins/starbox//themes/business/js/
2 KB
1013 B
Script
General
Full URL
https://mundohacker.net.br/wp-content/plugins/starbox//themes/business/js/frontend.min.js
Requested by
Host: ajax.cloudflare.com
URL: https://ajax.cloudflare.com/cdn-cgi/scripts/a2bd7673/cloudflare-static/rocket-loader.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f04530230919d523e344ae24581bcb1c829a1e9cf9d01046d59445e698d33d9c

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 Jun 2019 14:59:48 GMT
x-cdn
Incapsula
etag
W/"1ef281d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
x-iinfo
12-3225956-3225522 2CNN RT(1559839038820 0) q(0 0 0 1) r(0 0)
cache-control
public, max-age=31536000
cf-ray
4e2c545c7dbed6d9-FRA
server
cloudflare
expires
Fri, 05 Jun 2020 18:08:04 GMT
header-30541514.min.js
mundohacker.net.br/wp-content/cache/fvm/1559746788/out/
106 KB
36 KB
Script
General
Full URL
https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Requested by
Host: ajax.cloudflare.com
URL: https://ajax.cloudflare.com/cdn-cgi/scripts/a2bd7673/cloudflare-static/rocket-loader.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
1af07276cac3239d214ad33c7962773dea47b2d990043f89c4acd905d59bbaf3

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 05 Jun 2019 14:59:58 GMT
x-cdn
Incapsula
etag
W/"5c395726"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
x-iinfo
3-5842346-5804524 2VNN RT(1559839038654 0) q(0 0 0 0) r(1 1) U18
cache-control
public, max-age=31536000
cf-ray
4e2c545c7dc9d6d9-FRA
server
cloudflare
expires
Fri, 05 Jun 2020 18:08:04 GMT
/
mundohacker.net.br/wp-json/wordpress-popular-posts/v1/popular-posts/
43 B
712 B
XHR
General
Full URL
https://mundohacker.net.br/wp-json/wordpress-popular-posts/v1/popular-posts/
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e714538f9bcc71726fa30359a52239d1f9b6929e6abc23d151cde2a3bfa31c69
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Origin
https://mundohacker.net.br
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Thu, 06 Jun 2019 18:08:06 GMT
content-encoding
br
x-content-type-options
nosniff
x-cdn
Incapsula
status
200
x-iinfo
4-25636651-25636652 NNNN CT(0 -1 0) RT(1559844484185 0) q(0 0 0 0) r(11 11) U6
link
<https://mundohacker.net.br/wp-json/>; rel="https://api.w.org/"
allow
GET, POST
server
cloudflare
x-wp-nonce
bfea0386c0
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin
access-control-allow-methods
OPTIONS, GET, POST, PUT, PATCH, DELETE
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://mundohacker.net.br
access-control-expose-headers
X-WP-Total, X-WP-TotalPages
x-robots-tag
noindex
access-control-allow-credentials
true
cf-ray
4e2c545d7970d6d9-FRA
access-control-allow-headers
Authorization, Content-Type
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8f88cb7a1cd4134f5d616b9fca90b9069fa16c162b7ae66ba1b500c490b41dd2
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 21 May 2019 23:53:44 GMT
server
Golfe2
age
4857
date
Thu, 06 Jun 2019 16:47:07 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
17595
expires
Thu, 06 Jun 2019 18:47:07 GMT
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
88 KB
33 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: ajax.cloudflare.com
URL: https://ajax.cloudflare.com/cdn-cgi/scripts/a2bd7673/cloudflare-static/rocket-loader.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
12a2bea79acc7aaf41bb4f5141b97387c518ea9975cbb5b1fda02837c1a34224
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
33192
x-xss-protection
0
server
cafe
etag
4698524695557668470
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Thu, 06 Jun 2019 18:08:04 GMT
_Incapsula_Resource
mundohacker.net.br/
103 KB
15 KB
Script
General
Full URL
https://mundohacker.net.br/_Incapsula_Resource?SWJIYLWA=719d34d31c8e3a6e6fffd425f7e032f3&ns=1&cb=787123236
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ab6a7b03f73d3d01fc7de133831846414ef3dcd408087c455ce588b101bb784c

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
application/javascript
status
200
cache-control
no-cache
cf-ray
4e2c545d89cbd6d9-FRA
/
graph.facebook.com/
670 B
577 B
Script
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484705&_=1559844484706
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:20e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
c5a3b9e199491eee3869a368189a392a908bef75ae83d784fb2a1177f4703f0a
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
date
Thu, 06 Jun 2019 18:08:04 GMT
x-fb-rev
1000796185
content-length
389
pragma
no-cache
x-fb-debug
o/H1F/7J5ZuX5Rv5+/pIZ2/zBhJv9xG5rb1BVzHvh+DlyjN0y+SPGPydgovN65qySt9ihOqJJVM8tRS3OOWhpg==
x-fb-trace-id
CkV5Z5pu5Tq
etag
"76bc7eb4ba77bdf15cf1b324073851c88f180423"
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
x-fb-request-id
ANWsocGxn275pCv1Qt5wiL6
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.9
expires
Sat, 01 Jan 2000 00:00:00 GMT
stats
api.tumblr.com/v2/share/
226 B
229 B
Script
General
Full URL
https://api.tumblr.com/v2/share/stats?url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484707&_=1559844484708
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.3, , CHACHA20_POLY1305
Server
2a00:1288:84:800::1004 , United Kingdom, ASN203219 (YAHOO-AMA, NL),
Reverse DNS
Software
ATS /
Resource Hash
53558c68c18d78565672cd5036425fe6b4404f20dd360633b5c8cad167bacea5
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
x-content-type-options
nosniff
age
0
p3p
CP="Tumblr's privacy policy is available here: https://www.tumblr.com/policy/en/privacy"
status
200
x-rid
1d2efvlefilk4
strict-transport-security
max-age=15552000
x-xss-protection
1; mode=block
x-ua-compatible
IE=Edge,chrome=1
referrer-policy
no-referrer-when-downgrade
server
ATS
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
vary
Accept-Encoding, Accept-Encoding
public-key-pins-report-only
max-age=2592000; pin-sha256="2fRAUXyxl4A1/XHrKNBmc8bTkzA7y4FB/GLJuNAzCqY="; pin-sha256="I/Lt/z7ekCWanjD0Cvj5EqXls2lOaThEA0H2Bg4BT/o="; pin-sha256="Wd8xe/qfTwq3ylFNd3IpaqLHZbh2ZNCLluVzmeNkcpw="; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="; pin-sha256="uUwZgwDOxcBXrQcntwu+kYFpkiVkOaezL0WYEZ3anJc="; pin-sha256="dolnbtzEBnELx/9lOEQ22e6OZO/QNb6VSSX2XHA3E7A="; includeSubdomains; report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-hpkp-report-only"
content-type
application/javascript; charset=utf-8
share
www.linkedin.com/countserv/count/
208 B
424 B
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484709&_=1559844484710
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:11:101::b93f:9001 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
dd5fc223c5514b31b0e7c4deaff4c8f15826140f1522602c0d7bb67752efe441
Security Headers
Name Value
Content-Security-Policy default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
Strict-Transport-Security max-age=2592000
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-li-pop
prod-tln1
x-li-uuid
fyn2jEuupRVAE2kjsSoAAA==
pragma
no-cache
server
Apache-Coyote/1.1
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
vary
Accept-Encoding
strict-transport-security
max-age=2592000
content-type
text/javascript;charset=UTF-8
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'; report-uri https://www.linkedin.com/platform-telemetry/csp?f=l
x-li-proto
http/2
x-li-fabric
prod-lor1
expires
Thu, 01 Jan 1970 00:00:00 GMT
count.json
api.pinterest.com/v1/urls/
174 B
414 B
Script
General
Full URL
https://api.pinterest.com/v1/urls/count.json?url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484711&_=1559844484712
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.189 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-189.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
2a7f41b4c27c97b3aa7b1f1a11208412ce6a3b3c3b0f5075933f6370098fc8df
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:05 GMT
x-content-type-options
nosniff
x-cdn
akamai
age
0
content-type
application/javascript
status
200
cache-control
private
x-envoy-upstream-service-time
2
x-pinterest-rid
9137835840329094
access-control-allow-origin
*
content-length
174
expires
Thu, 06 Jun 2019 18:23:05 GMT
shares.json
api.bufferapp.com/1/links/
130 B
536 B
Script
General
Full URL
https://api.bufferapp.com/1/links/shares.json?url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484713&_=1559844484714
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.18.166.29 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
19263ce7063f67279feb3d1d05972d8debb5d04414406481369c816fdb187849
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
MISS
server
cloudflare
x-powered-by
Express
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
status
200
cache-control
public, max-age=14400
cf-ray
4e2c545e0d972b7a-AMS
etag
W/"82-zuLVcb2ZOIoEFxwflA8UWA"
expires
Thu, 06 Jun 2019 22:08:05 GMT
/
graph.facebook.com/
670 B
835 B
Script
General
Full URL
https://graph.facebook.com/?id=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484715&_=1559844484716
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:20e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
4d456b1d3def77964d59428ec90765057e9276481b1bce8196920777a48fc8db
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
date
Thu, 06 Jun 2019 18:08:04 GMT
x-fb-rev
1000796185
content-length
390
pragma
no-cache
x-fb-debug
tPNi0bxHsnz5nQRKmiq4KrBxdJHg0kk/TMyz2d5iEcsovb9Gb1G6nKMi8pBWhaQ5O5xtGzGPQjykevenH7puBg==
x-fb-trace-id
BEOBEZc8HlC
etag
"999a64f4198ff1305ac2075b7f97b0fb8f7c64e0"
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
x-fb-request-id
AV740LnJnA1A2t_J_uGNh9p
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.9
expires
Sat, 01 Jan 2000 00:00:00 GMT
stats
api.tumblr.com/v2/share/
226 B
1 KB
Script
General
Full URL
https://api.tumblr.com/v2/share/stats?url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484717&_=1559844484718
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.3, , CHACHA20_POLY1305
Server
2a00:1288:84:800::1004 , United Kingdom, ASN203219 (YAHOO-AMA, NL),
Reverse DNS
Software
ATS /
Resource Hash
572cf5d52659bebf84ab2ef995229b0b2e678d14c6cf71002a5a9276a58c95c3
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
br
x-content-type-options
nosniff
age
0
p3p
CP="Tumblr's privacy policy is available here: https://www.tumblr.com/policy/en/privacy"
status
200
x-rid
7c32105efilk4
strict-transport-security
max-age=15552000
x-xss-protection
1; mode=block
x-ua-compatible
IE=Edge,chrome=1
referrer-policy
no-referrer-when-downgrade
server
ATS
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
vary
Accept-Encoding, Accept-Encoding
public-key-pins-report-only
max-age=2592000; pin-sha256="2fRAUXyxl4A1/XHrKNBmc8bTkzA7y4FB/GLJuNAzCqY="; pin-sha256="I/Lt/z7ekCWanjD0Cvj5EqXls2lOaThEA0H2Bg4BT/o="; pin-sha256="Wd8xe/qfTwq3ylFNd3IpaqLHZbh2ZNCLluVzmeNkcpw="; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="i7WTqTvh0OioIruIfFR4kMPnBqrS2rdiVPl/s2uC/CY="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="; pin-sha256="uUwZgwDOxcBXrQcntwu+kYFpkiVkOaezL0WYEZ3anJc="; pin-sha256="dolnbtzEBnELx/9lOEQ22e6OZO/QNb6VSSX2XHA3E7A="; includeSubdomains; report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-hpkp-report-only"
content-type
application/javascript; charset=utf-8
share
www.linkedin.com/countserv/count/
208 B
987 B
Script
General
Full URL
https://www.linkedin.com/countserv/count/share?url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484719&_=1559844484720
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:11:101::b93f:9001 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
1ed993c3723c8925b24cd517a1efbfe72790d0fb456363276255bb9b7d9946b6
Security Headers
Name Value
Content-Security-Policy default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
Strict-Transport-Security max-age=2592000
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
x-li-pop
prod-tln1
x-li-uuid
96dOjUuupRWgUsQasSoAAA==
pragma
no-cache
server
Apache-Coyote/1.1
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
vary
Accept-Encoding
strict-transport-security
max-age=2592000
content-type
text/javascript;charset=UTF-8
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-li-proto
http/2
x-li-fabric
prod-lor1
expires
Thu, 01 Jan 1970 00:00:00 GMT
count.json
api.pinterest.com/v1/urls/
174 B
414 B
Script
General
Full URL
https://api.pinterest.com/v1/urls/count.json?url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484721&_=1559844484722
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.248.189 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-189.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6cb27c956d102b55641e9d758bdadc866d975c15fde131c8fba2f6d5f12a86a5
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:05 GMT
x-content-type-options
nosniff
x-cdn
akamai
age
0
content-type
application/javascript
status
200
cache-control
private
x-envoy-upstream-service-time
1
x-pinterest-rid
6343873727639623
access-control-allow-origin
*
content-length
174
expires
Thu, 06 Jun 2019 18:23:05 GMT
shares.json
api.bufferapp.com/1/links/
130 B
237 B
Script
General
Full URL
https://api.bufferapp.com/1/links/shares.json?url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&callback=jQuery1124024206378472835932_1559844484723&_=1559844484724
Requested by
Host: mundohacker.net.br
URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.18.166.29 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Express
Resource Hash
7cf374cd49b6203393ffb4cc2557c6b216fa4c3579ce3c774d254d9032546295
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:06 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
MISS
server
cloudflare
x-powered-by
Express
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
status
200
cache-control
public, max-age=14400
cf-ray
4e2c545e1d982b7a-AMS
etag
W/"82-ybHmLCxZVfTh6l8SV412WA"
expires
Thu, 06 Jun 2019 22:08:06 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=mundohacker.net.br
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=mundohacker.net.br
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/
209 KB
78 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
736097e0e338fc0479295be70e5d8b03f8d11a839565222bc15b137e93bdf6fd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
79498
x-xss-protection
0
server
cafe
etag
7134042954107520744
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Thu, 06 Jun 2019 18:08:04 GMT
show_ads_impl.js
pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/ Frame 1808
209 KB
78 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
736097e0e338fc0479295be70e5d8b03f8d11a839565222bc15b137e93bdf6fd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
79498
x-xss-protection
0
server
cafe
etag
7134042954107520744
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Thu, 06 Jun 2019 18:08:04 GMT
ca-pub-8890473371852833.js
pagead2.googlesyndication.com/pub-config/r20160913/
108 B
223 B
Script
General
Full URL
https://pagead2.googlesyndication.com/pub-config/r20160913/ca-pub-8890473371852833.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
617229202229089622770a111fef4f514877475b89056525185a70e0cbc5bc95
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:04 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 05 Jun 2019 20:58:40 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=43200
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
118
x-xss-protection
0
expires
Fri, 07 Jun 2019 06:08:04 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20190603/r20190131/ Frame 64E5
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20190603/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20190603/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Mon, 03 Jun 2019 14:10:16 GMT
expires
Mon, 17 Jun 2019 14:10:16 GMT
content-type
text/html; charset=UTF-8
etag
13732316697317830675
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
7014
x-xss-protection
0
cache-control
public, max-age=1209600
age
273469
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
collect
www.google-analytics.com/r/
35 B
101 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j76&a=1166713062&t=pageview&_s=1&dl=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&ul=en-us&de=UTF-8&dt=Hackers%20est%C3%A3o%20procurando%20por%20servidores%20MySQL%20para%20implantar%20o%20ransomware%20GandCrab&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAEAB~&jid=1084983169&gjid=1206655621&cid=2010520325.1559844485&tid=UA-131375918-1&_gid=1092744397.1559844485&_r=1&z=385564842
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81e::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 06 Jun 2019 18:08:04 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
*
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 5CF7
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&adk=1812271804&adf=3025194257&lmt=1559844484&plat=1%3A32776%2C2%3A32776%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C30%3A1081344&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1559844484779&bpp=52&bdt=771&fdt=197&idt=197&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&nras=1&correlator=4870649502191&frm=20&pv=2&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2148334251&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=0&ady=0&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=2&fc=1936&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2016045443&ifi=0&uci=0.rwqw7v1yzyi9&fsb=1&dtd=225
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8890473371852833&output=html&adk=1812271804&adf=3025194257&lmt=1559844484&plat=1%3A32776%2C2%3A32776%2C8%3A32776%2C9%3A32776%2C16%3A8388608%2C30%3A1081344&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1559844484779&bpp=52&bdt=771&fdt=197&idt=197&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&nras=1&correlator=4870649502191&frm=20&pv=2&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2148334251&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=0&ady=0&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=2&fc=1936&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2016045443&ifi=0&uci=0.rwqw7v1yzyi9&fsb=1&dtd=225
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Thu, 06 Jun 2019 18:08:05 GMT
server
cafe
content-length
651
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Thu, 06-Jun-2019 18:23:05 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
expires
Thu, 06 Jun 2019 18:08:05 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/
75 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
aa673bb151e70a5f3e4314c8e8f2652a84028ccf4a5ba92fdc10141025923a98
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1559748909028750"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
28179
x-xss-protection
0
expires
Thu, 06 Jun 2019 18:08:05 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame DC03
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&h=60&slotname=6097213995&adk=4159193640&adf=709448937&w=676&fwr_io=true&fwrn=4&fwrnh=100&lmt=1559844485&rafmt=1&guci=1.2.0.0.2.2.0.0&format=676x60&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&fwr=0&fwrattr=true&resp_fmts=3&wgl=1&adsid=NT&dt=1559844484831&bpp=42&bdt=823&fdt=222&idt=223&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2685205163&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=2609&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1936&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&osw_key=2680192990&ifi=1&uci=1.dtaiv3lp8wfa&fsb=1&xpc=SUhJ0XvwXH&p=https%3A//mundohacker.net.br&dtd=249
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8890473371852833&output=html&h=60&slotname=6097213995&adk=4159193640&adf=709448937&w=676&fwr_io=true&fwrn=4&fwrnh=100&lmt=1559844485&rafmt=1&guci=1.2.0.0.2.2.0.0&format=676x60&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&fwr=0&fwrattr=true&resp_fmts=3&wgl=1&adsid=NT&dt=1559844484831&bpp=42&bdt=823&fdt=222&idt=223&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2685205163&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=2609&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1936&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CoeEbr%7C&abl=CS&pfx=0&fu=144&bc=31&osw_key=2680192990&ifi=1&uci=1.dtaiv3lp8wfa&fsb=1&xpc=SUhJ0XvwXH&p=https%3A//mundohacker.net.br&dtd=249
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Thu, 06 Jun 2019 18:08:05 GMT
server
cafe
content-length
384
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Thu, 06-Jun-2019 18:23:05 GMT; path=/; domain=.doubleclick.net
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
expires
Thu, 06 Jun 2019 18:08:05 GMT
cache-control
private
_Incapsula_Resource
mundohacker.net.br/
1 B
78 B
Image
General
Full URL
https://mundohacker.net.br/_Incapsula_Resource?SWKMTFSR=1&e=0.983086186391851
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:30::681b:b4fa , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:05 GMT
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
content-type
text/plain
status
200
cache-control
no-cache
cf-ray
4e2c54604c0cd6d9-FRA
content-length
1
/
www.imaginarionerd.com.br/ Frame 623B
Redirect Chain
  • https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&h=250&slotname=3693092685&adk=1269935764&adf=4089897525&w=312&fwr_io=true&fwrn=4&fwrnh=100&lmt=1559844485&r...
  • https://www.imaginarionerd.com.br/
0
0
Document
General
Full URL
https://www.imaginarionerd.com.br/
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
54.82.244.85 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-82-244-85.compute-1.amazonaws.com
Software
/ vtex-integrated-store
Resource Hash

Request headers

Host
www.imaginarionerd.com.br
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/

Response headers

Content-Encoding
gzip
Content-Type
text/html; charset=utf-8
Date
Thu, 06 Jun 2019 17:53:09 GMT
Cache-Control
no-transform
Vary
Cookie, Accept-Encoding
Age
896
X-Cache
HIT
X-Cache-Hits
9
grace
none
X-Powered-By
vtex-integrated-store
Access-Control-Allow-Origin
*
Accept-Ranges
bytes
Content-Length
22634

Redirect headers

status
302
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
location
https://www.imaginarionerd.com.br/
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Thu, 06 Jun 2019 18:08:05 GMT
server
cafe
content-length
46
x-xss-protection
0
set-cookie
IDE=AHWqTUkekqbt5YiONe2KiSBCa6gNaVLfHbagm3KF2VHqeJ-gBjEPPKPv8g4xEbKz; expires=Tue, 30-Jun-2020 18:08:05 GMT; path=/; domain=.doubleclick.net; HttpOnly test_cookie=; domain=.doubleclick.net; path=/; expires=Mon, 21 Jul 2008 23:59:00 GMT
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
reactive_library.js
pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/
156 KB
55 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/reactive_library.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
957e0c58738925558d3242be2e1901ae89e168ee94f5a15d227a8f87217dc0a0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 06 Jun 2019 18:08:05 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
56673
x-xss-protection
0
server
cafe
etag
14414358077267222604
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Thu, 06 Jun 2019 18:08:05 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 1808
0
51 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=ama_success&c=2&wpc=ca-pub-8890473371852833&warn=12%2C13&w=1600&h=1200&eatf=false&reatf=true&a=6%2C1%2C5%2C7&apv=20190602_100331&afm=0&as_count=2&d_count=0&ng_count=0&am_count=2&atf_count=1&su=mundohacker.net.br&r=0.1
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 06 Jun 2019 18:08:05 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame E9DC
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&h=169&adk=2080432792&adf=319813720&w=676&lmt=1559844485&num_ads=1&sem=mc&pwprc=4642793139&guci=1.2.0.0.2.2.0.0&ad_type=text_image&format=676x169&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&pra=3&wgl=1&fa=27&adsid=NT&dt=1559844485315&bpp=16&bdt=1307&fdt=17&idt=18&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C676x60%2C312x250&nras=2&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2685205163&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=1325&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1424&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2234260145&ifi=3&uci=3.z5b0qtbeeou4&xpc=cPhD1MdWst&p=https%3A//mundohacker.net.br&dtd=22
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8890473371852833&output=html&h=169&adk=2080432792&adf=319813720&w=676&lmt=1559844485&num_ads=1&sem=mc&pwprc=4642793139&guci=1.2.0.0.2.2.0.0&ad_type=text_image&format=676x169&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&pra=3&wgl=1&fa=27&adsid=NT&dt=1559844485315&bpp=16&bdt=1307&fdt=17&idt=18&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C676x60%2C312x250&nras=2&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=2685205163&dssz=27&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=1325&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1424&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2234260145&ifi=3&uci=3.z5b0qtbeeou4&xpc=cPhD1MdWst&p=https%3A//mundohacker.net.br&dtd=22
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUkekqbt5YiONe2KiSBCa6gNaVLfHbagm3KF2VHqeJ-gBjEPPKPv8g4xEbKz
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Thu, 06 Jun 2019 18:08:05 GMT
server
cafe
content-length
383
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
ads
googleads.g.doubleclick.net/pagead/ Frame 67EC
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8890473371852833&output=html&h=169&adk=2080432792&adf=1332395379&w=676&lmt=1559844485&num_ads=1&sem=mc&pwprc=4642793139&guci=1.2.0.0.2.2.0.0&ad_type=text_image&format=676x169&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&pra=3&wgl=1&fa=27&adsid=NT&dt=1559844485340&bpp=11&bdt=1332&fdt=14&idt=15&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C676x60%2C312x250%2C676x169&nras=3&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=11275139755&dssz=28&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=2280&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1424&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2234260145&ifi=4&uci=4.j9srrowib0re&xpc=FAbaPSDtd6&p=https%3A//mundohacker.net.br&dtd=21
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20190603/r20190131/show_ads_impl.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:816::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-8890473371852833&output=html&h=169&adk=2080432792&adf=1332395379&w=676&lmt=1559844485&num_ads=1&sem=mc&pwprc=4642793139&guci=1.2.0.0.2.2.0.0&ad_type=text_image&format=676x169&url=https%3A%2F%2Fmundohacker.net.br%2Fhackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab%2F&flash=0&pra=3&wgl=1&fa=27&adsid=NT&dt=1559844485340&bpp=11&bdt=1332&fdt=14&idt=15&shv=r20190603&cbv=r20190131&saldr=aa&abxe=1&prev_fmts=0x0%2C676x60%2C312x250%2C676x169&nras=3&correlator=4870649502191&frm=20&pv=1&ga_vid=2010520325.1559844485&ga_sid=1559844485&ga_hid=1166713062&ga_fc=0&iag=0&icsg=11275139755&dssz=28&mdo=0&mso=0&u_tz=0&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=273&ady=2280&biw=1585&bih=1200&scr_x=0&scr_y=0&eid=21060853&oid=3&rx=0&eae=0&fc=1424&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=16&bc=31&osw_key=2234260145&ifi=4&uci=4.j9srrowib0re&xpc=FAbaPSDtd6&p=https%3A//mundohacker.net.br&dtd=21
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/
accept-encoding
gzip, deflate, br
cookie
IDE=AHWqTUkekqbt5YiONe2KiSBCa6gNaVLfHbagm3KF2VHqeJ-gBjEPPKPv8g4xEbKz
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://mundohacker.net.br/hackers-estao-procurando-por-servidores-mysql-para-implantar-o-ransomware-gandcrab/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Thu, 06 Jun 2019 18:08:05 GMT
server
cafe
content-length
383
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"

Verdicts & Comments Add Verdict or Comment

59 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| __cfQR function| advanced_ads_ready object| wpp_params object| WordPressPopularPosts boolean| do_request undefined| num undefined| $ function| jQuery object| $jscomp boolean| abh_loadbox_loaded function| abh_loadbox number| abh_timeout_loadbox object| adsbygoogle string| GoogleAnalyticsObject function| ga object| WPUSBVars undefined| SidebarMenuEffects function| WPUSB object| classie boolean| __cfRLUnblockHandlers object| google_js_reporting_queue object| google_ad_modifications object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state object| google_sa_queue object| google_sl_win function| google_process_slots function| google_spfd object| google_sv_map object| google_t12n_vars number| google_lpabyc number| google_unique_id object| google_tag_data object| gaplugins object| gaGlobal object| gaData function| google_sa_impl object| google_jobrunner object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator object| google_prev_clients object| ampInaboxIframes object| ampInaboxPendingMessages object| google_iframe_oncopy function| Goog_AdSense_getAdAdapterInstance boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| google_llp

3 Cookies

Domain/Path Name / Value
.mundohacker.net.br/ Name: incap_ses_1055_1927708
Value: cXPBF9IyQkqhUgNtch2kDoNW+VwAAAAAiIxaJP3WKdZocdj4IWEr3w==
.mundohacker.net.br/ Name: visid_incap_1927708
Value: OTIYUhnjRC2jrI4nm0Agh4JW+VwAAAAAQUIPAAAAAADEG70wZ+4nVaKvjYwQDcvQ
.mundohacker.net.br/ Name: __cfduid
Value: d9ae2fb4e33387915f0b346a78f7d83c11559844482

1 Console Messages

Source Level URL
Text
console-api log URL: https://mundohacker.net.br/wp-content/cache/fvm/1559746788/out/header-30541514.min.js(Line 1)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
adservice.google.de
ajax.cloudflare.com
api.bufferapp.com
api.pinterest.com
api.tumblr.com
fonts.gstatic.com
googleads.g.doubleclick.net
graph.facebook.com
mundohacker.net.br
pagead2.googlesyndication.com
secure.gravatar.com
www.google-analytics.com
www.googletagservices.com
www.imaginarionerd.com.br
www.linkedin.com
zdnet1.cbsistatic.com
104.18.166.29
2.18.233.149
23.210.248.189
2606:4700:30::681b:b4fa
2606:4700::6813:c697
2a00:1288:84:800::1004
2a00:1450:4001:808::2002
2a00:1450:4001:809::2002
2a00:1450:4001:816::2002
2a00:1450:4001:819::2002
2a00:1450:4001:81e::200e
2a00:1450:4001:821::2002
2a00:1450:4001:824::2003
2a03:2880:f01c:20e:face:b00c:0:2
2a04:fa87:fffe::c000:4902
2a05:f500:11:101::b93f:9001
54.82.244.85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