URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Submission: On December 03 via api from CZ

Summary

This website contacted 66 IPs in 8 countries across 38 domains to perform 182 HTTP transactions. The main IP is 192.0.79.32, located in San Francisco, United States and belongs to AUTOMATTIC - Automattic, Inc, US. The main domain is bgr.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on November 4th 2019. Valid for: 3 months.
This is the only time bgr.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 192.0.79.32 2635 (AUTOMATTIC)
1 199.166.0.32 7415 (ADSAFE-1)
1 143.204.101.113 16509 (AMAZON-02)
1 192.0.78.19 2635 (AUTOMATTIC)
33 192.0.77.32 2635 (AUTOMATTIC)
1 2a00:1450:400... 15169 (GOOGLE)
1 2600:9000:215... 16509 (AMAZON-02)
1 3 172.217.16.162 15169 (GOOGLE)
3 13.225.78.107 16509 (AMAZON-02)
10 192.0.72.19 2635 (AUTOMATTIC)
9 2606:2800:234... 15133 (EDGECAST)
1 147.75.84.181 54825 (PACKET)
2 13.225.86.250 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 13.225.77.205 16509 (AMAZON-02)
5 151.139.128.10 20446 (HIGHWINDS3)
1 2600:9000:20e... 16509 (AMAZON-02)
3 2a04:fa87:fff... 2635 (AUTOMATTIC)
11 72.247.225.215 16625 (AKAMAI-AS)
4 192.0.76.3 2635 (AUTOMATTIC)
1 3 23.5.97.37 16625 (AKAMAI-AS)
1 151.101.13.2 54113 (FASTLY)
2 2a03:2880:f01... 32934 (FACEBOOK)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.216.129.109 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 2 52.49.19.196 16509 (AMAZON-02)
6 72.21.206.141 16509 (AMAZON-02)
1 3 35.190.59.101 15169 (GOOGLE)
2 35.201.67.47 15169 (GOOGLE)
1 91.228.74.245 27281 (QUANTCAST)
1 2600:9000:21f... 16509 (AMAZON-02)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 147.75.32.75 54825 (PACKET)
1 2600:9000:21f... 16509 (AMAZON-02)
1 35.190.40.172 15169 (GOOGLE)
1 52.72.234.232 14618 (AMAZON-AES)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 72.247.226.107 16625 (AKAMAI-AS)
2 199.166.0.26 7415 (ADSAFE-1)
1 2600:9000:21f... 16509 (AMAZON-02)
2 2600:9000:20e... 16509 (AMAZON-02)
1 147.75.85.25 54825 (PACKET)
3 3 63.33.115.128 16509 (AMAZON-02)
2 2 147.75.102.200 54825 (PACKET)
1 64.202.112.31 22075 (AS-OUTBRAIN)
2 143.204.101.58 16509 (AMAZON-02)
2 2a03:2880:f11... 32934 (FACEBOOK)
2 4 104.244.42.136 13414 (TWITTER)
4 2606:2800:134... 15133 (EDGECAST)
3 52.46.128.194 16509 (AMAZON-02)
1 52.94.237.66 16509 (AMAZON-02)
1 2600:9000:21f... 16509 (AMAZON-02)
1 143.204.101.95 16509 (AMAZON-02)
1 192.0.72.24 2635 (AUTOMATTIC)
2 2 34.246.122.148 16509 (AMAZON-02)
3 151.101.14.2 54113 (FASTLY)
5 70.42.32.63 22075 (AS-OUTBRAIN)
8 23.58.216.21 16625 (AKAMAI-AS)
2 2606:2800:134... 15133 (EDGECAST)
1 2.21.37.220 20940 (AKAMAI-ASN1)
4 184.31.90.250 20940 (AKAMAI-ASN1)
1 2a02:26f0:10c... 20940 (AKAMAI-ASN1)
4 69.16.175.10 20446 (HIGHWINDS3)
2 34.237.181.155 14618 (AMAZON-AES)
1 69.16.175.42 20446 (HIGHWINDS3)
182 66
Apex Domain
Subdomains
Transfer
37 wp.com
s0.wp.com
s1.wp.com
s2.wp.com
stats.wp.com
pixel.wp.com
440 KB
21 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
libs.outbrain.com
mv.outbrain.com
videoclientsservicescalls.outbrain.com
vastcdn.outbrain.com
133 KB
13 skimresources.com
s.skimresources.com
r.skimresources.com
t.skimresources.com
p.skimresources.com
x.skimresources.com
20 KB
13 amazon-adsystem.com
c.amazon-adsystem.com
z-na.amazon-adsystem.com
aax-us-east.amazon-adsystem.com
ir-na.amazon-adsystem.com
fls-na.amazon-adsystem.com
45 KB
13 twitter.com
platform.twitter.com
syndication.twitter.com
135 KB
12 wordpress.com
r-login.wordpress.com
boygeniusreport.files.wordpress.com
pmccorp2.files.wordpress.com
510 KB
10 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
247 KB
7 vidazoo.com
static.vidazoo.com
server.vidazoo.com
inventory.vidazoo.com
670 KB
7 consensu.org
quantcast.mgr.consensu.org
api.skimlinks.mgr.consensu.org
static.quantcast.mgr.consensu.org
vendorlist.consensu.org
api.quantcast.mgr.consensu.org
audit.quantcast.mgr.consensu.org
137 KB
6 twimg.com
cdn.syndication.twimg.com
pbs.twimg.com
ton.twimg.com
70 KB
4 sphere.com
libs.sphere.com
74 KB
4 adsafeprotected.com
static.adsafeprotected.com
cdn.adsafeprotected.com
pixel.adsafeprotected.com
15 KB
3 google.com
adservice.google.com
apis.google.com
68 KB
3 scorecardresearch.com
sb.scorecardresearch.com
2 KB
3 gravatar.com
0.gravatar.com
9 KB
3 hotjar.com
static.hotjar.com
script.hotjar.com
vars.hotjar.com
72 KB
3 adlightning.com
tagan.adlightning.com
52 KB
3 doubleclick.net
securepubads.g.doubleclick.net
74 KB
2 crwdcntrl.net
sync.crwdcntrl.net
1 KB
2 facebook.com
www.facebook.com
299 B
2 exelator.com
loadeu.exelator.com
2 KB
2 imrworldwide.com
secure-us.imrworldwide.com
839 B
2 facebook.net
connect.facebook.net
112 KB
2 quora.com
a.quora.com
q.quora.com
14 KB
2 agkn.com
js.agkn.com
d.agkn.com
3 KB
2 bgr.com
bgr.com
50 KB
1 sharethrough.com
native.sharethrough.com
116 KB
1 quantcount.com
rules.quantcount.com
1 KB
1 polarcdn-terrax.com
polarcdn-terrax.com
915 B
1 crazyegg.com
script.crazyegg.com
347 B
1 quantserve.com
secure.quantserve.com
6 KB
1 googletagmanager.com
www.googletagmanager.com
21 KB
1 amazonaws.com
s3.amazonaws.com
442 B
1 google.de
adservice.google.de
171 B
1 mediavoice.com
plugin.mediavoice.com
27 KB
1 jwplatform.com
content.jwplatform.com
39 KB
1 googleapis.com
fonts.googleapis.com
965 B
0 cloudfront.net Failed
d3ezl4ajpp2zy8.cloudfront.net Failed
182 38
Domain Requested by
15 s2.wp.com bgr.com
15 s0.wp.com bgr.com
s.skimresources.com
s0.wp.com
11 widgets.outbrain.com bgr.com
tagan.adlightning.com
widgets.outbrain.com
libs.sphere.com
10 boygeniusreport.files.wordpress.com bgr.com
9 platform.twitter.com bgr.com
tagan.adlightning.com
platform.twitter.com
8 images.outbrainimg.com bgr.com
6 aax-us-east.amazon-adsystem.com z-na.amazon-adsystem.com
bgr.com
4 static.vidazoo.com tagan.adlightning.com
static.vidazoo.com
4 libs.sphere.com tagan.adlightning.com
libs.sphere.com
4 syndication.twitter.com 2 redirects bgr.com
4 p.skimresources.com bgr.com
3 mcdp-nydc1.outbrain.com widgets.outbrain.com
3 pbs.twimg.com bgr.com
3 ir-na.amazon-adsystem.com bgr.com
3 x.skimresources.com 3 redirects
3 pixel.wp.com bgr.com
3 r.skimresources.com 1 redirects bgr.com
3 sb.scorecardresearch.com 1 redirects bgr.com
3 0.gravatar.com bgr.com
tagan.adlightning.com
3 tagan.adlightning.com bgr.com
tagan.adlightning.com
3 securepubads.g.doubleclick.net 1 redirects bgr.com
securepubads.g.doubleclick.net
3 s1.wp.com bgr.com
2 server.vidazoo.com static.vidazoo.com
2 videoclientsservicescalls.outbrain.com libs.outbrain.com
libs.sphere.com
2 ton.twimg.com platform.twitter.com
2 odb.outbrain.com tagan.adlightning.com
2 sync.crwdcntrl.net 2 redirects
2 www.facebook.com bgr.com
connect.facebook.net
2 loadeu.exelator.com 2 redirects
2 static.quantcast.mgr.consensu.org tagan.adlightning.com
quantcast.mgr.consensu.org
2 pixel.adsafeprotected.com cdn.adsafeprotected.com
2 t.skimresources.com bgr.com
s.skimresources.com
2 secure-us.imrworldwide.com 1 redirects bgr.com
2 apis.google.com bgr.com
apis.google.com
2 connect.facebook.net bgr.com
connect.facebook.net
2 c.amazon-adsystem.com bgr.com
c.amazon-adsystem.com
2 bgr.com s0.wp.com
1 inventory.vidazoo.com
1 vastcdn.outbrain.com tagan.adlightning.com
1 mv.outbrain.com tagan.adlightning.com
1 libs.outbrain.com tagan.adlightning.com
1 audit.quantcast.mgr.consensu.org static.quantcast.mgr.consensu.org
1 pmccorp2.files.wordpress.com bgr.com
1 api.quantcast.mgr.consensu.org quantcast.mgr.consensu.org
1 vendorlist.consensu.org quantcast.mgr.consensu.org
1 fls-na.amazon-adsystem.com bgr.com
1 cdn.syndication.twimg.com tagan.adlightning.com
1 native.sharethrough.com plugin.mediavoice.com
1 log.outbrainimg.com widgets.outbrain.com
1 vars.hotjar.com tagan.adlightning.com
1 rules.quantcount.com secure.quantserve.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 polarcdn-terrax.com plugin.mediavoice.com
1 q.quora.com bgr.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 d.agkn.com js.agkn.com
1 script.hotjar.com tagan.adlightning.com
1 script.crazyegg.com bgr.com
1 quantcast.mgr.consensu.org s0.wp.com
1 secure.quantserve.com bgr.com
1 www.googletagmanager.com bgr.com
1 s3.amazonaws.com bgr.com
1 adservice.google.com securepubads.g.doubleclick.net
1 adservice.google.de securepubads.g.doubleclick.net
1 a.quora.com bgr.com
1 stats.wp.com bgr.com
1 js.agkn.com bgr.com
1 s.skimresources.com bgr.com
1 z-na.amazon-adsystem.com bgr.com
1 plugin.mediavoice.com bgr.com
1 static.hotjar.com bgr.com
1 content.jwplatform.com bgr.com
1 fonts.googleapis.com bgr.com
1 r-login.wordpress.com bgr.com
1 cdn.adsafeprotected.com bgr.com
1 static.adsafeprotected.com bgr.com
0 d3ezl4ajpp2zy8.cloudfront.net Failed bgr.com
182 77
Subject Issuer Validity Valid
bgr.com
Let's Encrypt Authority X3
2019-11-04 -
2020-02-02
3 months crt.sh
*.adsafeprotected.com
COMODO RSA Domain Validation Secure Server CA
2018-08-20 -
2020-09-17
2 years crt.sh
*.wordpress.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.wp.com
Go Daddy Secure Certificate Authority - G2
2018-04-10 -
2020-05-11
2 years crt.sh
*.googleapis.com
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
jwplayer.com
Amazon
2019-03-28 -
2020-04-28
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
*.adlightning.com
Amazon
2019-08-19 -
2020-09-19
a year crt.sh
*.files.wordpress.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-15 -
2021-01-14
2 years crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
static.hotjar.com
Let's Encrypt Authority X3
2019-10-06 -
2020-01-04
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-12 -
2020-05-20
6 months crt.sh
z-na.amazon-adsystem.com
Amazon
2019-06-12 -
2020-06-07
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.agkn.com
RapidSSL RSA CA 2018
2018-06-21 -
2020-09-16
2 years crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
quora.com
Let's Encrypt Authority X3
2019-10-25 -
2020-01-23
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-11-06 -
2020-02-04
3 months crt.sh
*.google.com
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2019-11-09 -
2020-12-02
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
*.apis.google.com
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
*.imrworldwide.com
DigiCert SHA2 Secure Server CA
2019-02-25 -
2020-02-25
a year crt.sh
aax-us-east.amazon-adsystem.com
Amazon
2019-02-04 -
2020-02-04
a year crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
quantcast.mgr.consensu.org
Amazon
2019-05-06 -
2020-06-06
a year crt.sh
ssl945600.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-20 -
2020-02-26
6 months crt.sh
script.hotjar.com
Let's Encrypt Authority X3
2019-10-06 -
2020-01-04
3 months crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
*.quora.com
Let's Encrypt Authority X3
2019-12-01 -
2020-02-29
3 months crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-13 -
2020-03-21
6 months crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
vars.hotjar.com
Let's Encrypt Authority X3
2019-10-06 -
2020-01-04
3 months crt.sh
*.sharethrough.com
Amazon
2019-10-07 -
2020-11-07
a year crt.sh
syndication.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
www.assoc-amazon.com
Amazon
2019-03-09 -
2020-02-19
a year crt.sh
fls-na.amazon-adsystem.com
Amazon
2019-02-12 -
2020-01-26
a year crt.sh
vendorlist.consensu.org
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.sphere.com
DigiCert SHA2 Secure Server CA
2019-03-15 -
2020-06-13
a year crt.sh
*.vidazoo.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-20 -
2021-04-03
2 years crt.sh
adserver.vidazoo.com
Let's Encrypt Authority X3
2019-10-29 -
2020-01-27
3 months crt.sh

This page contains 13 frames:

Primary Page: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Frame ID: C94A597DB15EF5DB0BC18D71D28AA037
Requests: 177 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.9902616813646066
Frame ID: BD962A588574C0C50C54441CDB3BC3C2
Requests: 3 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.6a44a9d26983bbb5b04ae399f9e496fe.html?origin=https%3A%2F%2Fbgr.com
Frame ID: BCC6DEC9E4ABE578680CFED42FA05F84
Requests: 1 HTTP requests in this frame

Frame: https://d.agkn.com/iframe/8613/?che=686435021&gdpr=&gdpr_consent=&ref=&bpid=penskemedia&c=%7B%22bpid%22%3A%22penskemedia%22%2C%22loc%22%3A%22https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Tech%22%2C%22brd%22%3A%22-1%22%2C%22subcategory%22%3A%22%22%7D
Frame ID: 6F0BDE821CDD4504C002ACEC4E3D4CC0
Requests: 1 HTTP requests in this frame

Frame: https://static.quantcast.mgr.consensu.org/v27/cmp-3pc-check.html
Frame ID: EEFE6E4CB2AAD2DC0596D39D928B708A
Requests: 1 HTTP requests in this frame

Frame: https://vars.hotjar.com/box-b736908ce6b0e933fad3a2e45df61b38.html
Frame ID: C2E7C34069F21609BE5480745C668D68
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/nanoWidget/externals/obPixelFrame/obPixelFrame.htm
Frame ID: B7301165AFFEE9DA5744D2BDA727D770
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: C01A8C84686904A4B4FF430D19D7365D
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: B8EBCA119935D2A40270E0E0F35DB9B4
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/nanoWidget/externals/obPixelFrame/obPixelFrame.htm
Frame ID: A1E49E58AEBFC4C8C33D3324620B4000
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: F4497E92C4715B966643620482B350A2
Requests: 1 HTTP requests in this frame

Frame: https://vastcdn.outbrain.com/frame?h=https%3A%2F%2Fbgr.com&id=obe56331-e949-907e-df69-e15aebeca1c5&url=https%3A%2F%2Frtr.innovid.com%2Fr1.5d74ea88c29ad7.25687688%3FobOrigUrl%3Dtrue
Frame ID: F7797144D1ECCE8436ADEC07826C7228
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 3385E4225A918BBB4F94DE892BFD2010
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

182
Requests

98 %
HTTPS

32 %
IPv6

38
Domains

77
Subdomains

66
IPs

8
Countries

3162 kB
Transfer

6748 kB
Size

5
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 10
  • https://securepubads.g.doubleclick.net/tag/js/gpt.js?ver=1 HTTP 301
  • https://securepubads.g.doubleclick.net/tag/js/gpt.js
Request Chain 61
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-203220h&cg=0&cc=1&si=https%3A//bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/&rp=&ts=compact&rnd=1575378579491 HTTP 302
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-203220h&cg=0&cc=1&si=https%3A//bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/&rp=&ts=compact&rnd=1575378579491&ja=1
Request Chain 66
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DV5Y2W2A95TT4D5X9HD84KM6&persistence=1&checksum=bafc5bb95ead0deb230a486ce1df84d0783d5e02adf94ef0bef2a64372c37088
Request Chain 86
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035310&c3=&c4=&c5=&c6=&c15=&ns__t=1575378579617&ns_c=UTF-8&cv=3.1&c8=Disney%3A%20Hackers%20may%20have%20stolen%20your%20Disney%2B%20login%2C%20but%20don%E2%80%99t%20blame%20us%20%E2%80%93%20BGR&c7=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035310&c3=&c4=&c5=&c6=&c15=&ns__t=1575378579617&ns_c=UTF-8&cv=3.1&c8=Disney%3A%20Hackers%20may%20have%20stolen%20your%20Disney%2B%20login%2C%20but%20don%E2%80%99t%20blame%20us%20%E2%80%93%20BGR&c7=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&c9=
Request Chain 100
  • https://x.skimresources.com/?provider=exelate HTTP 302
  • https://loadeu.exelator.com/load/?p=787&g=001&j=0& HTTP 302
  • https://loadeu.exelator.com/load/?p=787&g=001&j=0&&xl8blockcheck=1 HTTP 302
  • https://x.skimresources.com/?provider=exelate&skim_mapping=true&provider_id=a93dd9cdd39672ef12f3cacd9c0af69d HTTP 302
  • https://p.skimresources.com/?provider_id=a93dd9cdd39672ef12f3cacd9c0af69d&skim_mapping=true
Request Chain 115
  • https://sync.crwdcntrl.net/map/c=7505/tp=SKIM/?https%3A%2F%2Fx.skimresources.com%2F%3Fprovider%3Dlotame%26skim_mapping%3Dtrue%26provider_id%3D%24%7Bprofile_id%7D HTTP 302
  • https://sync.crwdcntrl.net/map/ct=y/c=7505/tp=SKIM/?https%3A%2F%2Fx.skimresources.com%2F%3Fprovider%3Dlotame%26skim_mapping%3Dtrue%26provider_id%3D%24%7Bprofile_id%7D HTTP 302
  • https://x.skimresources.com/?provider=lotame&skim_mapping=true&provider_id=19d8a061c7fd1aaaea65d8fcd60b439a HTTP 302
  • https://p.skimresources.com/?provider_id=19d8a061c7fd1aaaea65d8fcd60b439a&skim_mapping=true
Request Chain 151
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 171
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html

182 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
89 KB
25 KB
Document
General
Full URL
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.79.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
dfe3f243dadc0a989e43d42ea05212575ed8cf5426da050c3443b08fcee9c11d
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests

Request headers

:method
GET
:authority
bgr.com
:scheme
https
:path
/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Tue, 03 Dec 2019 13:09:39 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding Cookie
x-hacker
If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
x-ua-compatible
IE=Edge
content-security-policy
upgrade-insecure-requests
content-security-policy-report-only
default-src data: 'unsafe-inline' 'unsafe-eval' https: blob: http://*.files.wordpress.com wss://bgr.com; report-uri https://pmcuri.report-uri.com/r/d/csp/reportOnly
link
<https://wp.me/p2sPFm-oaNi>; rel=shortlink
content-encoding
gzip
x-ac
4.fra _dfw
vans-adapter-google-ima.js
static.adsafeprotected.com/
19 KB
7 KB
Script
General
Full URL
https://static.adsafeprotected.com/vans-adapter-google-ima.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.166.0.32 , United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
anycast.static.adsafeprotected.com
Software
nginx /
Resource Hash
a86144e215a0820ba5bba260e2ae3df87690aa1b8423496a8157aa9951e41141

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Last-Modified
Thu, 24 Oct 2019 15:26:47 GMT
X-Server-Name
app27ami.ami.303net.pvt
ETag
"5db1c2b7-19e2"
Content-Type
application/javascript
Cache-Control
no-cache
Connection
keep-alive
Content-Length
6626
Server
nginx
Expires
Tue, 03 Dec 2019 13:09:38 GMT
iasPET.1.js
cdn.adsafeprotected.com/
20 KB
6 KB
Script
General
Full URL
https://cdn.adsafeprotected.com/iasPET.1.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.113 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-113.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
91f5ca0043a7cc77672586fb31d9fecea2d06824a28147d5e8bc699f63681372

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 26 Nov 2019 20:34:43 GMT
Content-Encoding
gzip
Last-Modified
Tue, 19 Nov 2019 20:34:39 GMT
Server
AmazonS3
Age
578097
ETag
"06de737f886bc22ff71c11d3f8bb29ac"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 fa5a3d5abd34c6fac657b045a4dcbdc5.cloudfront.net (CloudFront)
Cache-Control
max-age=604800
X-Amz-Cf-Pop
FRA50-C1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5739
X-Amz-Cf-Id
AQZt1VUH1ociV3mhhmvtquKLRDbFG7Pgk5PnS1gJfnvDaJG51DijnQ==
remote-login.php
r-login.wordpress.com/
0
66 B
Script
General
Full URL
https://r-login.wordpress.com/remote-login.php?action=js&host=bgr.com&id=36424464&t=1575378578&back=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.78.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Tue, 03 Dec 2019 13:09:39 GMT
server
nginx
content-length
0
vary
Cookie
content-type
text/javascript
/
s0.wp.com/_static/
44 KB
7 KB
Stylesheet
General
Full URL
https://s0.wp.com/_static/??-eJx9jtEKgzAMRX9oNWwisoexb2lr2KJNLU2K+PdmPuxp7CWQe88hga24uGbFrMDNldRelAUSLSgwoxYfF3duXRS5gOGUY2qT1RbARKIQ0npSofq6g+iesGPKX+PHgbhWtJyL1w/BOJHHhGzYP20r5rgQSkURZ5OpsdO3ieeDT35ch7EfxtvY3+cDKsFSBw==?cssminify=yes
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
d1e84436e02aa37fef525ae0fb210e3b2861103b863a434736b6f0a7ed44826d

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Tue, 12 Nov 2019 15:33:04 GMT
server
nginx
etag
W/"5dcad0b0-aff6"
vary
Accept-Encoding
content-type
text/css;charset=utf-8
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Wed, 11 Nov 2020 15:33:18 GMT
css
fonts.googleapis.com/
14 KB
965 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans%3A400%2C400i%2C600%2C600i%2C700%2C700i&ver=5.3
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
c46e7c5c5f26d1f7e6f789fecd0602ad73b8aab6059236c29b223ee6b16d4fe8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Tue, 03 Dec 2019 13:09:39 GMT
server
ESF
access-control-allow-origin
*
date
Tue, 03 Dec 2019 13:09:39 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Tue, 03 Dec 2019 13:09:39 GMT
/
s0.wp.com/_static/
255 KB
52 KB
Stylesheet
General
Full URL
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
5ed557260bdbf8e70a731e86379d37efc96a11d85cdebc902d983147b095aa7d

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Mon, 25 Nov 2019 16:02:29 GMT
server
nginx
etag
W/"5ddbfb15-3fdce"
vary
Accept-Encoding
content-type
text/css;charset=utf-8
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Tue, 24 Nov 2020 16:02:42 GMT
pmc-utils.js
s1.wp.com/wp-content/themes/vip/pmc-plugins/pmc-global-functions/js/
9 KB
3 KB
Script
General
Full URL
https://s1.wp.com/wp-content/themes/vip/pmc-plugins/pmc-global-functions/js/pmc-utils.js?m=1559073512h
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
f0812f68943f5880cbd3c27f15cf17a59b15cf7da1807031daef6ad3e4563dd4

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
server
nginx
etag
W/"5ced9c76-4d50"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Wed, 27 May 2020 20:39:21 GMT
/
s0.wp.com/_static/
229 KB
68 KB
Script
General
Full URL
https://s0.wp.com/_static/??-eJyVkttOwzAMhl+INEOCAReIZ3EzN3WbE7HbwZ6erFqlFaqtSJESO59/HxJ9TIqCccMBWXdlfQ6Yvy9b1fGDvgUoTzaDYOUpzLCJQTDImU2RxSMzWFy59bEmh2pgzAUIUtI0cYVblkRhJDzexTqUBKZXGZlOf7JLi6UuPVLSyRuV3GAp8HS2LtbgVDMEIxTD1PPZ38bY8z90wMMpBgWJBawGZpRJa+Ffm9sNzSYT14hXahfPHZ3a5qsYRsim3YxvaX4ZUWaeyuRoREVNhgJtC3VUz/+qoS+J81tOxnaJ8o0okKBik6Nzv+0q9fZQ1D78++Pzy27/tHt923c//jEjgQ==
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
0d4032e30a548cad47aebad5bbc292b0b9b03fe0b58d32b844cc54495e94b6f2

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Wed, 09 Oct 2019 17:24:11 GMT
server
nginx
etag
W/"5d9e17bb-3936b"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Thu, 08 Oct 2020 17:24:18 GMT
AuPAHJqR.js
content.jwplatform.com/libraries/
121 KB
39 KB
Script
General
Full URL
https://content.jwplatform.com/libraries/AuPAHJqR.js?ver=5.3
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:6800:1:a3fa:7cc0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
openresty /
Resource Hash
cffd4b20aa99bc4f145651d704e40e86d76e9991bcab098a785dbdb9dbb71ffa

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
server
openresty
x-amz-cf-pop
FRA50-C1
x-cache
Miss from cloudfront
content-type
text/javascript; charset=utf-8
status
200
cache-control
max-age=150, max-stale=180
access-control-allow-origin
*
content-length
39610
via
1.1 bee9d99ac2913ec4167e166e6bdb691e.cloudfront.net (CloudFront)
x-amz-cf-id
3FeqBkKrvVg4czK_jCnFXLmyFeeRquDYaJYejYdwhi9NsDWCG4o8xw==
expires
Tue, 03 Dec 2019 13:12:09 GMT
/
s1.wp.com/_static/
60 KB
18 KB
Script
General
Full URL
https://s1.wp.com/_static/??-eJydjcsKwjAQRX/Idipi60b8ljQd64QkEzJJSv/eUFyIiGBX8+Cec2EJjWaf0CdID3QoUChAcLoJNs/kZdsLTcj1o1aMYARERwqpNXKA74Jx3nJ1/Ah9tqjJbXLOUeOYJdWy96N15P/XBbbrnawFqkQU1InYNzwKxrLXaVlNe1lS8gJv7no8D6e+v3TdYJ4xDZK3
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
44edf6141792978cc09e3fb9a85acb39b4f715dadeba592a2afcb84f86f42c73

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Wed, 13 Nov 2019 18:08:47 GMT
server
nginx
etag
W/"5dcc46af-ee05"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Thu, 12 Nov 2020 18:09:17 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/
Redirect Chain
  • https://securepubads.g.doubleclick.net/tag/js/gpt.js?ver=1
  • https://securepubads.g.doubleclick.net/tag/js/gpt.js
51 KB
16 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
sffe /
Resource Hash
9d5718f13181da45241b915b1d7ae28f54f80f543bb8aab1904fe3efbcb2465e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"355 / 345 of 1000 / last-modified: 1575323226"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15723
x-xss-protection
0
expires
Tue, 03 Dec 2019 13:09:39 GMT

Redirect headers

date
Mon, 02 Dec 2019 23:57:31 GMT
x-content-type-options
nosniff
server
sffe
age
47528
location
https://securepubads.g.doubleclick.net/tag/js/gpt.js
content-type
text/html; charset=UTF-8
status
301
cache-control
public, max-age=86400
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
249
x-xss-protection
0
expires
Tue, 03 Dec 2019 23:57:31 GMT
op.js
tagan.adlightning.com/penske/
47 KB
14 KB
Script
General
Full URL
https://tagan.adlightning.com/penske/op.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.107 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-107.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d87f127d5207f261327b0aa552d5eb1d1afc0cd0d6ebae89ce974337d0f07c12

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 09:13:17 GMT
content-encoding
gzip
age
479
x-cache
Hit from cloudfront
status
200
content-length
13805
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 02 Dec 2019 22:57:13 GMT
server
AmazonS3
etag
"1b1dd2560299571138f8c18ff422b93a"
x-amz-version-id
gHWIkYs9oHY02vqjepsV1rvIFMCCcoAI
via
1.1 03d509e8374e9f42668961b5e0201349.cloudfront.net (CloudFront)
cache-control
max-age=900
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
Ryki-UlodkFNBGTrFytvGA4ar6yhKuoiyyq-apb5498ubQbzwnLX6g==
logo-header-black.png
s2.wp.com/wp-content/themes/vip/bgr/images/sprite_2x/
3 KB
3 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/images/sprite_2x/logo-header-black.png
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
f193eb96aab06fb4a1611bec5dcdf1e607daa5329de212d1fa2aa1149e1f60c8

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Mon, 16 May 2016 00:21:47 GMT
server
nginx
etag
"5739129b-a0a"
content-type
image/png
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
2570
expires
Sat, 21 Nov 2020 08:30:45 GMT
disney-plus-sign.jpg
boygeniusreport.files.wordpress.com/2019/11/
112 KB
113 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2019/11/disney-plus-sign.jpg?quality=98&strip=all&w=782
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
97ed9a1ff10a378f5cd86f427cad9f1536d5d35cb62a098921c013754dd5c4bf

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:39 GMT
last-modified
Tue, 12 Nov 2019 12:33:12 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
114942
expires
Sun, 29 Dec 2019 02:43:43 GMT
chris-smith-125x125.jpg
boygeniusreport.files.wordpress.com/2013/11/
15 KB
15 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2013/11/chris-smith-125x125.jpg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
3a8d6ad2266f06e851f32316dd5d446ef25d9c27bd8874dc4dff31aa6466bfbf

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:39 GMT
last-modified
Fri, 15 Nov 2013 15:59:20 GMT
server
nginx
x-orig-src
01_mogdir
content-type
image/jpeg
status
200
accept-ranges
bytes
content-length
15485
expires
Mon, 06 Jan 2020 23:26:07 GMT
twitter-blue.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
2 KB
1 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/twitter-blue.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
334d1f4155f2dc04589f5ecd213b108f8576cd1afd6977daf64bae9185c9e55e

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Sat, 31 Dec 2016 05:48:48 GMT
server
nginx
access-control-allow-origin
*
etag
W/"586746c0-82e"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:12 GMT
facebook.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
2 KB
836 B
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/facebook.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
11d64dbd2a2250d8621a697e33cabd0f53953e3538172e27f0c0132f66d761fb

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Thu, 13 Oct 2016 16:09:21 GMT
server
nginx
access-control-allow-origin
*
etag
W/"57ffb1b1-769"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:35 GMT
twitter.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
2 KB
1 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/twitter.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
156066874c247919d2928afc5477391a5e3bacf8ea01319ed1d12e6f0eefd7c8

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Mon, 07 Jan 2019 05:00:26 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5c32dcea-895"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:35 GMT
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4191) /
Resource Hash
13c88608140b103dd0eb9040e4466efcb7b0a1d7784bdd802c702e3a25fea222

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 18:14:56 GMT
Server
ECS (fcn/4191)
Etag
"6448d12e510c748220c730e694411504+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
28852
9399319a.jpg
boygeniusreport.files.wordpress.com/2019/11/
31 KB
31 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2019/11/9399319a.jpg?quality=98&strip=all&w=400&h=234&crop=1
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
07db9d934c2106b41ad365df0822be81d617cd9e47b33da345cad51e381746e6

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:39 GMT
last-modified
Fri, 01 Nov 2019 17:32:05 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
31674
expires
Wed, 01 Jan 2020 09:30:16 GMT
ipad-pro_smart-keyboard-apple-pencil_10302018.jpg
boygeniusreport.files.wordpress.com/2018/11/
22 KB
23 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2018/11/ipad-pro_smart-keyboard-apple-pencil_10302018.jpg?quality=98&strip=all&w=400&h=234&crop=1
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
ad5da1eeee7343ba32cd34c0dc59439e4e51119cbd45fa8cc585087776fb01ec

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:39 GMT
last-modified
Mon, 05 Nov 2018 13:56:31 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
23008
expires
Sun, 05 Jan 2020 22:32:45 GMT
amazon-sign-black-friday-deals-1.jpg
boygeniusreport.files.wordpress.com/2019/11/
45 KB
45 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2019/11/amazon-sign-black-friday-deals-1.jpg?quality=98&strip=all&w=400&h=234&crop=1
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
dc92f6a1073eb854971d0394494185b0af17b68ea81b3006a3ed1f8b135038c4

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:39 GMT
last-modified
Sat, 16 Nov 2019 12:11:52 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
45686
expires
Sat, 21 Dec 2019 12:12:37 GMT
facebook-white.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
2 KB
714 B
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/facebook-white.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
3148910cc98e786e41da388222d55c0d33c07436373ac9012c48891c076cce2c

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Sat, 31 Dec 2016 05:36:50 GMT
server
nginx
access-control-allow-origin
*
etag
W/"586743f2-7f5"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:35 GMT
hotjar-1291937.js
static.hotjar.com/c/
3 KB
2 KB
Script
General
Full URL
https://static.hotjar.com/c/hotjar-1291937.js?sv=5
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.84.181 Parsippany, United States, ASN54825 (PACKET - Packet Host, Inc., US),
Reverse DNS
Software
openresty /
Resource Hash
d96a1ea37497a7138344158565695e8518fc97dd051b8d3b95b1c169c3edc18f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript
section-io-tag
hotjar
age
48
status
200
access-control-max-age
600
section-io-cache
Hit
content-length
1601
x-cache-hit
1
server
openresty
x-frame-options
SAMEORIGIN
etag
W/102350a3c962bb77126d52f801e396f5
vary
Accept-Encoding
section-io-origin-status
304
access-control-allow-origin
*
cache-control
max-age=60
section-io-origin-time-seconds
0.075
accept-ranges
bytes
section-io-id
e3e4c85de83ca642224ecf665c06ed85
apstag.js
c.amazon-adsystem.com/aax2/
88 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.86.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-86-250.fra2.r.cloudfront.net
Software
Server /
Resource Hash
1412d7245072504d1975da264074e475485b5bab1edab58938a536542a4f3dd5

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 02 Dec 2019 17:32:54 GMT
content-encoding
gzip
server
Server
age
70605
etag
f95fda3d4fe6103808d969fc52fa66db
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
x-amz-cf-id
-oLfP9d8HSa7I2SG0qZ21fzgefkrDpszMxVFm2ah3H4Q6n2SFlQ_ew==
via
1.1 32e3b86ae254a231182567c0124af893.cloudfront.net (CloudFront)
twitter-white.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
3 KB
1 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/twitter-white.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
01636d1d601abd4df225b027e0ee7e83c289ca04cb5e502ac7afb94ffd7dc68e

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Wed, 07 Dec 2016 22:07:11 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5848880f-ab5"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:35 GMT
feed-white.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
2 KB
788 B
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/icons/feed-white.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
ce07021555cb02f08553d8b3d02fd62f6a81081d4db315f8dcec0810bd7bc4bd

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Sat, 31 Dec 2016 05:36:50 GMT
server
nginx
access-control-allow-origin
*
etag
W/"586743f2-8a3"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:35 GMT
pmc.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/
3 KB
2 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/pmc.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
46d342ea2563517188d1f407dfc7004418230265debf29ccb4757f4dc9be02ab

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Sat, 31 Dec 2016 05:48:48 GMT
server
nginx
access-control-allow-origin
*
etag
W/"586746c0-b67"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:35 GMT
hollywood-life.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/
7 KB
5 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/hollywood-life.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
9207bd1d945d33c78a95b083e15df733325c5939d9c51b64361838eac7e30397

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Mon, 07 Jan 2019 05:00:26 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5c32dcea-1a86"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:35 GMT
deadline.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/
4 KB
3 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/deadline.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
0396ae91b9115af39a1fdc308dcf0f9cc34480114b9325a1282a3d1a9bdc6bc4

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Mon, 07 Jan 2019 05:00:26 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5c32dcea-11f2"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:35 GMT
variety.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/
5 KB
4 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/variety.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
3601a7bdddac63591874028e834844f4e2b93d2bda57d87d2a63907d4a112d7a

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Wed, 07 Dec 2016 22:07:11 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5848880f-1550"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:36 GMT
tvline.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/
3 KB
2 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/tvline.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
7a8433acc5c45ebb2ce666dc7252a2c10b79ddcfbefdc243d1aab20b6f297735

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Mon, 07 Jan 2019 05:00:26 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5c32dcea-cbd"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:36 GMT
wwd.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/
3 KB
2 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/wwd.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
83344c7409157f8651fa8f510054c3825e4474d9cb74a4528088199133fbb80e

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Sat, 31 Dec 2016 05:36:50 GMT
server
nginx
access-control-allow-origin
*
etag
W/"586743f2-d9d"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:36 GMT
fn.svg
s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/
2 KB
1 KB
Image
General
Full URL
https://s2.wp.com/wp-content/themes/vip/bgr/assets/images/pmc-logos/fn.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
0dcc438cf8c6fdee3f73a68710e7f0f98c889119aa7eddc9bd14001a662d1993

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Sat, 31 Dec 2016 05:48:48 GMT
server
nginx
access-control-allow-origin
*
etag
W/"586746c0-77f"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:36 GMT
mc.js
plugin.mediavoice.com/mediaconductor/
67 KB
27 KB
Script
General
Full URL
https://plugin.mediavoice.com/mediaconductor/mc.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:d983 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4a6e0be6b7f93728e4ab91eeb20be7a3444121e35cbebd767bd80139dfe9af26

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
cf-cache-status
HIT
age
22318
cf-ray
53f5c6b9ae9dcbc4-VIE
status
200
content-length
26510
via
1.1 varnish
x-varnish
1892321381 1892214471
last-modified
Sun, 20 Jan 2019 20:19:08 GMT
server
cloudflare
etag
W/"5c44d7bc-10b9b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Tue, 03 Dec 2019 12:10:25 GMT
onejs
z-na.amazon-adsystem.com/widgets/
22 KB
8 KB
Script
General
Full URL
https://z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US&adInstanceId=1e33850c-6557-44f9-8fa9-d8a945b7bb10
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.77.205 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-77-205.fra2.r.cloudfront.net
Software
Server /
Resource Hash
ec5f5b6bc2af2f19fec404e67badc128f32aca23dc9b1d9b097000a0f42f6541

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 02 Dec 2019 16:57:19 GMT
content-encoding
gzip
age
72302
x-cache
Hit from cloudfront
status
200
cneonction
close
content-length
7323
via
1.1 1bf129b8787cf2e96d3bce725554e4d5.cloudfront.net (CloudFront)
pragma
Public
server
Server
content-type
application/javascript;charset=UTF-8
access-control-allow-origin
*
charset
UTF-8
cache-control
public,max-age=300,s-maxage=300,no-transform
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
ufmaH5NNg-T1jll-7xQAri9gSb_vHZ824sIT3pZ8-4gghYwIGANWiQ==
expires
Mon, 02 Dec 2019 17:02:19 GMT
87443X1540249.skimlinks.js
s.skimresources.com/js/
41 KB
16 KB
Script
General
Full URL
https://s.skimresources.com/js/87443X1540249.skimlinks.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
08e8edc183a13b0d6dbeef8563d813b618c66c24dea9831d7fa16b24e3308716

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Wed, 06 Nov 2019 13:34:16 GMT
server
AmazonS3
x-amz-request-id
166D94B0771753EE
etag
"07051bfd4e3f6739012c01aaa5d01e10"
x-hw
1575378579.cds105.fr8.hn,1575378579.cds111.fr8.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15999
x-amz-id-2
VVdgJqXWJdXfTsGlnYF2BQsVyXliQyd0qzx91DF5ml8Et0tcQ1HGKJI0OHSgZqtMu0+cY3FJcQk=
tag.js
js.agkn.com/prod/v0/
3 KB
3 KB
Script
General
Full URL
https://js.agkn.com/prod/v0/tag.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:8a00:15:efbc:e300:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
dc82de33871a9ed40a5379ed264dd0456d9bf58839286b913231648f527bc72b

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 02 Dec 2019 23:48:54 GMT
via
1.1 e86025dac63232624d2273c5fd256ce4.cloudfront.net (CloudFront)
last-modified
Tue, 22 Oct 2019 20:22:52 GMT
server
AmazonS3
age
67618
etag
"f53f55cbab099be3a970b446a66c496a"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
3167
x-amz-cf-id
t4t0t1j2nu8VzlBCW9pCvHLM4q9MouFLIRlwyEVy9MDQYuYKlPbbeg==
gprofiles.js
0.gravatar.com/js/
20 KB
7 KB
Script
General
Full URL
https://0.gravatar.com/js/gprofiles.js?ver=201949y
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
9c42615b9f87888a452f177c5ea19899fb8a835b8f6d0b458824e6c332a0adce

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Thu, 23 Aug 2018 15:01:14 GMT
server
nginx
etag
W/"5b7ecc3a-50bc"
content-type
application/x-javascript
status
200
cache-control
max-age=604800
expires
Tue, 10 Dec 2019 13:09:39 GMT
wpgroho.js
s1.wp.com/wp-content/mu-plugins/gravatar-hovercards/
582 B
388 B
Script
General
Full URL
https://s1.wp.com/wp-content/mu-plugins/gravatar-hovercards/wpgroho.js?m=1380573781h
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
21c557180f1bd074974eb41ae4228b6aa9c41234ab1729d780bc8f05761110bb

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
server
nginx
etag
W/"58674607-2f0"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:30:14 GMT
queuehandler.js
s2.wp.com/wp-content/mu-plugins/likes/
6 KB
2 KB
Script
General
Full URL
https://s2.wp.com/wp-content/mu-plugins/likes/queuehandler.js?m=1549314680h
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
980bab43f5f0f1cf129f9fcb989f1d95ae84b48577c9091077d1d6215274d36c

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
server
nginx
etag
W/"5c58aa7e-2078"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Tue, 04 Feb 2020 21:11:31 GMT
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js?ver=20111117
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40B1) /
Resource Hash
13c88608140b103dd0eb9040e4466efcb7b0a1d7784bdd802c702e3a25fea222

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 18:14:56 GMT
Server
ECS (fcn/40B1)
Etag
"6448d12e510c748220c730e694411504+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
28852
/
s0.wp.com/_static/
78 KB
25 KB
Script
General
Full URL
https://s0.wp.com/_static/??-eJytk91OwzAMhV+INBswBheIZ0lTq3jLXx2n694et53GkIZQ2aReOK7zuT7H1YekbAwMgbUvKrnSYsiaD8gMpGpn7L5GalRC0AlCg6GtdvlBL7kXoAe6fpc/wUPWPSadvD1zxnhPZVBsWr3LeooTDuAWAHZZOazJEI4F0j/SnO8K0FHBIICMUarX1er6m8pjuLHjiYmhRzhMnX5kLjtgsK40clUmLqEByjYSLPyGNsbWgSoBRfRsnDLBuCOjnbDiRGDFJPaMbtwTHQvL6BjUTT16bCBKxhyBRup8Ns09rGgiz4/Y8FKtn09OVOf8b2bMdbqg/ochpvEjY6ocuIhs83TXMBe/0qMaYZMC6VvoBX27YgJbk1lZn7TJGXgaRk4yHPIdUF1nCVIk/nMaEUE2ozakvWCAJFJRtohwlPicW0iYdmzU5MO/rzfbp+1ms3p73X0BunvQng==
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
a41d9166f9111af10fc05ea7515f9efa04b4b0fc33e5a0a67c646a60c0f05d3e

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Thu, 14 Nov 2019 18:16:27 GMT
server
nginx
etag
W/"5dcd99fb-136d1"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Fri, 13 Nov 2020 18:16:56 GMT
outbrain.js
widgets.outbrain.com/
108 KB
37 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?ver=5.3
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bc9479d8090b85f1a2379022288a54cbe322ba5a39078f0d7d4cd90ce120831e

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Nov 2019 12:25:03 GMT
Server
Apache
ETag
"8569cbfae4fbb2310bec49abfdf5e1fc:1574685892"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
37500
w.js
stats.wp.com/
13 KB
4 KB
Script
General
Full URL
https://stats.wp.com/w.js?60
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
050c2ca74a4941fedd88349d977d960b8ab384ebb83a3c9e4b233160476ee8f1

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
server
nginx
etag
W/"5cb5925e-4f31"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
expires
Wed, 15 Apr 2020 08:43:53 GMT
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.5.97.37 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-5-97-37.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
d0fd74148f4cbe78bd0e6328dc5ce5955f0a0ecdb1eb2919da4a7e596ac65912

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
901
Expires
Wed, 04 Dec 2019 13:09:39 GMT
qevents.js
a.quora.com/
39 KB
14 KB
Script
General
Full URL
https://a.quora.com/qevents.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.13.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ef6de6beb1cf5bf809eccfe10f99aea0e0969c71d4eab5446410fef72695679f

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
s3LlaOWABX1LUjiLldBNr49lVAylKDRo
content-encoding
gzip
age
5602
x-cache
HIT
status
200
date
Tue, 03 Dec 2019 13:09:39 GMT
content-length
13681
x-amz-id-2
zQAAngX4bjjK1T8QyGsms189DMHe38t08Rol4m2IV5IYXTpoCoWK1HOdDq7meaP1YJfyyQc+w6E=
x-served-by
cache-fra19148-FRA
last-modified
Fri, 25 Oct 2019 19:28:38 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
atime:1572031715/ctime:1572031714/gid:1000000/gname:employee/md5:f32ebb1e93a72c0a57add6d07f688510/mode:33188/mtime:1149709104/uid:1000332/uname:tzhou
x-timer
S1575378579.455458,VS0,VE0
etag
"f32ebb1e93a72c0a57add6d07f688510"
vary
Accept-Encoding
x-amz-request-id
1C9CBC521FCEE95F
via
1.1 varnish
cache-control
max-age=7200
accept-ranges
bytes
content-type
text/plain
x-cache-hits
1134
fbevents.js
connect.facebook.net/en_US/
121 KB
26 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
71b52274b1b43661e6523b2774c9fa98a673e1861703bea5f32d75a32a850394
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
26702
x-xss-protection
0
pragma
public
x-fb-debug
kjE2CgeMJdrLDy5ycCdwzgt7D07GnvN/lNQngfURulcQmOtnm8bwQX49MHo6fk0bBIL6cyj6qgZLqEONTiCbOQ==
x-fb-trip-id
420120009
date
Tue, 03 Dec 2019 13:09:39 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
wp-emoji-release.min.js
s0.wp.com/wp-includes/js/
14 KB
5 KB
Script
General
Full URL
https://s0.wp.com/wp-includes/js/wp-emoji-release.min.js?m=1573557586h&ver=5.3
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
1a351abc3f3b435497ddb8a55f09268d3e641dc22455deac06cf0181a4de52ee

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
server
nginx
etag
W/"5dca955d-362a"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Wed, 25 Nov 2020 13:29:05 GMT
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=bgr.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=bgr.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2019111801.js
securepubads.g.doubleclick.net/gpt/
159 KB
58 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019111801.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s11-in-f2.1e100.net
Software
sffe /
Resource Hash
03b07f320a1692a2d507465027fffaa6560d19d248c33bb6a5f2c97b75680c1d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 18 Nov 2019 14:07:04 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
59620
x-xss-protection
0
expires
Tue, 03 Dec 2019 13:09:39 GMT
track
s3.amazonaws.com/heartbeat.pmc.com/
35 B
442 B
Image
General
Full URL
https://s3.amazonaws.com/heartbeat.pmc.com/track?host=bgr.com&path=%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&ct=article&lob=bgr&loc=de&env=desktop&post_id=5761368&omni_visit_id=bgr.1575378579242.57580c4c-4bf6-41fb-860c-a107a99f2ac9&ts=1575378579407
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.216.129.109 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
6a842ea462daca2a0b5a0f5f25bcfc8e0059ac811ca6c6a1bc54e4d9119621c3

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Last-Modified
Thu, 24 Apr 2014 00:38:32 GMT
Server
AmazonS3
x-amz-request-id
2CA2267E53F53C6E
ETag
"729c3007a8ed0597531b0c76d54a94bb"
Content-Type
image/gif
Cache-Control
no-cache, no-store, must-revalidate
Accept-Ranges
bytes
Content-Length
35
x-amz-id-2
WhoLqDfbKtjY5FxoCOSR8LNOOoKmEtwjN9b3hpSEa47GfhJITM6B+5IKJ2tzm9Za4J/w6NBkvEs=
gtm.js
www.googletagmanager.com/
58 KB
21 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-KBGHR3
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
909a93895ffab7a8013ef7536efeb1fa111b5ef5f91089c532d151401340eddb
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
br
last-modified
Tue, 03 Dec 2019 12:00:00 GMT
server
Google Tag Manager
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
21147
x-xss-protection
0
expires
Tue, 03 Dec 2019 13:09:39 GMT
search.png
s0.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
8 KB
8 KB
Image
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/images/icons/search.png
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
41c68bc12ee8b0f87a0e72a01871bc52b45d9f7977d98934def3aa66a89d9c1c

Request headers

Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Fri, 02 Jun 2017 11:12:14 GMT
server
nginx
etag
"5931480e-2010"
content-type
image/png
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
8208
expires
Sat, 21 Nov 2020 08:31:04 GMT
right-arrow.svg
s0.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
2 KB
778 B
Image
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/images/icons/right-arrow.svg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
9d082f5799b2f200f9cf756b380c33c129085bc2da77ec2c7794b16401c3d78a

Request headers

Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Wed, 07 Dec 2016 22:07:11 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5848880f-69e"
vary
Accept-Encoding
access-control-allow-methods
GET, HEAD
content-type
image/svg+xml
status
200
cache-control
max-age=31536000
x-ac
4.fra _dfw
expires
Sat, 21 Nov 2020 08:31:04 GMT
proximanova-bold-webfont.woff2
s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/proximanova-bold-webfont.woff2
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
6a4dac260dffc284594d633859fb508b2fcfade38b61c8af9cd55eb23adf9e89

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
Origin
https://bgr.com

Response headers

x-nc
HIT fra 1
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Mon, 07 Jan 2019 05:00:26 GMT
server
nginx
access-control-allow-origin
*
etag
"5c32dcea-57e4"
access-control-allow-methods
GET, HEAD
content-type
application/font-woff2
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
22500
expires
Sat, 21 Nov 2020 08:31:38 GMT
proximanova-semibold-webfont.woff2
s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/
21 KB
21 KB
Font
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/proximanova-semibold-webfont.woff2
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
fa861c8158da0846d8b78df67af609f6428aa62e0f4e460f0f546880141407f4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
Origin
https://bgr.com

Response headers

x-nc
HIT fra 1
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Mon, 09 Jul 2018 18:00:24 GMT
server
nginx
access-control-allow-origin
*
etag
"5b43a2b8-5504"
access-control-allow-methods
GET, HEAD
content-type
application/font-woff2
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
21764
expires
Sat, 21 Nov 2020 08:31:38 GMT
proximanova-light-webfont.woff2
s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/
21 KB
21 KB
Font
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/proximanova-light-webfont.woff2
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
5a9ff1d73bc8dac9280ab179531dfc5ad203f3d3045e591d4485ac8f141890d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
Origin
https://bgr.com

Response headers

x-nc
HIT fra 1
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Mon, 09 Jul 2018 18:00:24 GMT
server
nginx
access-control-allow-origin
*
etag
"5b43a2b8-53ac"
access-control-allow-methods
GET, HEAD
content-type
application/font-woff2
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
21420
expires
Sat, 21 Nov 2020 08:32:55 GMT
proximanova-regular-webfont.woff2
s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/
21 KB
21 KB
Font
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/proximanova-regular-webfont.woff2
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
501ed6d7c49a3526af1f804fff30cc8b7b8608525b100f4140b7504cc5afd4bd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
Origin
https://bgr.com

Response headers

x-nc
HIT fra 1
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Mon, 09 Jul 2018 18:00:24 GMT
server
nginx
access-control-allow-origin
*
etag
"5b43a2b8-5540"
access-control-allow-methods
GET, HEAD
content-type
application/font-woff2
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
21824
expires
Sat, 21 Nov 2020 08:31:38 GMT
plusone.js
apis.google.com/js/
48 KB
18 KB
Script
General
Full URL
https://apis.google.com/js/plusone.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
0166899095125d9e765f2b8d3a7e1f1e7b227f80b9990532f9c655cce83ba67c
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-security-policy-report-only
script-src 'report-sample' 'nonce-EcIWRfKpkKvgNudK54BOOg' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri /_/cspreport
p3p
CP="This is not a P3P policy! See g.co/p3phelp for more info."
status
200
strict-transport-security
max-age=31536000
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
x-ua-compatible
IE=edge, chrome=1
server
ESF
etag
"22fbc32cff236c1d04000a802a39cfc3"
x-frame-options
SAMEORIGIN
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=1800, stale-while-revalidate=1800
timing-allow-origin
*
expires
Tue, 03 Dec 2019 13:09:39 GMT
m
secure-us.imrworldwide.com/cgi-bin/
Redirect Chain
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-203220h&cg=0&cc=1&si=https%3A//bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/&rp=&ts=compact&rnd=1575378579491
  • https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-203220h&cg=0&cc=1&si=https%3A//bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/&rp=&ts=compact&rnd=1575378579...
44 B
332 B
Image
General
Full URL
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-203220h&cg=0&cc=1&si=https%3A//bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/&rp=&ts=compact&rnd=1575378579491&ja=1
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.49.19.196 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-49-19-196.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 03 Dec 2019 13:09:39 GMT
server
nginx
access-control-allow-origin
*
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
status
200
cache-control
no-cache
content-type
image/gif
content-length
44
expires
Thu, 01 Dec 1994 16:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 03 Dec 2019 13:09:39 GMT
server
nginx
access-control-allow-origin
*
location
https://secure-us.imrworldwide.com/cgi-bin/m?ci=us-203220h&cg=0&cc=1&si=https%3A//bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/&rp=&ts=compact&rnd=1575378579491&ja=1
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
status
302
cache-control
no-cache
content-length
0
expires
Thu, 01 Dec 1994 16:00:00 GMT
getad
aax-us-east.amazon-adsystem.com/x/
20 KB
7 KB
Script
General
Full URL
https://aax-us-east.amazon-adsystem.com/x/getad?src=330&c=100&sz=1x1&apiVersion=2.0&pj=%7B%22overwrite%22%3A%22false%22%2C%22tracking_id%22%3A%22b0c55-20%22%2C%22ad_type%22%3A%22one_tag%22%2C%22marketplace%22%3A%22amazon%22%2C%22enable_geo_redirection%22%3A%22true%22%2C%22enable_auto_tagging%22%3A%22false%22%2C%22region%22%3A%22US%22%2C%22placement%22%3A%22adunit%22%2C%22viewerCountry%22%3A%22DE%22%2C%22textlinks%22%3A%225550342011%22%2C%22debug%22%3A%22false%22%2C%22acap_publisherId%22%3A%22b0c55-20%22%2C%22slotNum%22%3A0%7D&u=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&jscb=amzn_assoc_jsonp_callback_adunit_0
Requested by
Host: z-na.amazon-adsystem.com
URL: https://z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US&adInstanceId=1e33850c-6557-44f9-8fa9-d8a945b7bb10
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
72.21.206.141 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
206-141.amazon.com
Software
Server /
Resource Hash
ee648300044bae05129bb1f412a1857d8e7929624347435e4007689cb5c4e790

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Vary
Accept-Encoding,User-Agent
Server
Server
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
text/javascript;charset=UTF-8
top-stories-white.png
s0.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
1 KB
1 KB
Image
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/images/icons/top-stories-white.png
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/87443X1540249.skimlinks.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
f7bda44fc11d5ee7c88d98b61556f1273f08b4807a17067fb963a8f7d6c50b3c

Request headers

Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Thu, 15 Mar 2018 11:08:28 GMT
server
nginx
etag
"5aaa542c-548"
content-type
image/png
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
1352
expires
Sat, 21 Nov 2020 08:32:11 GMT
featured-channel-tech-desktop.jpg
s0.wp.com/wp-content/themes/vip/bgr/assets/images/
88 KB
88 KB
Image
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/images/featured-channel-tech-desktop.jpg
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/87443X1540249.skimlinks.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
cbabb185fd09923e90c8169370b7e0de3a0d2419443275977c535d49b76595e3

Request headers

Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Wed, 07 Dec 2016 22:07:11 GMT
server
nginx
etag
"5848880f-16065"
content-type
image/jpeg
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
90213
expires
Sat, 21 Nov 2020 08:32:11 GMT
proximanova-extrabold-webfont.woff2
s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/fonts/proximanova-extrabold-webfont.woff2
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/87443X1540249.skimlinks.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
84b78ac3e0760077d549e380450f7ad5df75ee0608e609de8d27d7dffa1352a5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
Origin
https://bgr.com

Response headers

x-nc
HIT fra 1
date
Tue, 03 Dec 2019 13:09:39 GMT
x-ac
4.fra _dfw
last-modified
Mon, 09 Jul 2018 18:00:24 GMT
server
nginx
access-control-allow-origin
*
etag
"5b43a2b8-5820"
access-control-allow-methods
GET, HEAD
content-type
application/font-woff2
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
22560
expires
Sat, 21 Nov 2020 08:32:11 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DV5Y2W2A95TT4D5X9HD84KM6&persistence=1&checksum=bafc5bb95ead0deb230a486ce1df84d0783d5e02adf94ef0bef2a64372c37088
0
-1 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DV5Y2W2A95TT4D5X9HD84KM6&persistence=1&checksum=bafc5bb95ead0deb230a486ce1df84d0783d5e02adf94ef0bef2a64372c37088
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://bgr.com
location
//r.skimresources.com/api/?xguid=01DV5Y2W2A95TT4D5X9HD84KM6&persistence=1&checksum=bafc5bb95ead0deb230a486ce1df84d0783d5e02adf94ef0bef2a64372c37088
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
307
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193

Redirect headers

date
Tue, 03 Dec 2019 13:09:39 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DV5Y2W2A95TT4D5X9HD84KM6&persistence=1&checksum=bafc5bb95ead0deb230a486ce1df84d0783d5e02adf94ef0bef2a64372c37088
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://bgr.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
robots.txt
t.skimresources.com/api/v2/ Frame BD96
0
105 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.9902616813646066
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
206
date
Tue, 03 Dec 2019 13:09:39 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
text/plain charset=UTF-8
px.gif
p.skimresources.com/
43 B
472 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=8.952058729956743
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
status
200
x-guploader-uploadid
AEnB2UqTwYSz9M4qMmGFRAzs-polhqBQm5pGtrSzp0zOtF0FwP61Pwo8xLlPAnwCKFANRzh0nsGXhSnQon5HBqOK1dPHkyiheQ
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1575378579.cds105.fr8.hn,1575378579.cds054.fr8.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=8.952058729956743
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
status
200
x-guploader-uploadid
AEnB2UqTwYSz9M4qMmGFRAzs-polhqBQm5pGtrSzp0zOtF0FwP61Pwo8xLlPAnwCKFANRzh0nsGXhSnQon5HBqOK1dPHkyiheQ
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1575378579.cds105.fr8.hn,1575378579.cds054.fr8.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.245 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 03-Dec-2019 13:09:39 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Tue, 10 Dec 2019 13:09:39 GMT
cmp.js
quantcast.mgr.consensu.org/
213 KB
58 KB
Script
General
Full URL
https://quantcast.mgr.consensu.org/cmp.js
Requested by
Host: s0.wp.com
URL: https://s0.wp.com/_static/??-eJytk91OwzAMhV+INBswBheIZ0lTq3jLXx2n694et53GkIZQ2aReOK7zuT7H1YekbAwMgbUvKrnSYsiaD8gMpGpn7L5GalRC0AlCg6GtdvlBL7kXoAe6fpc/wUPWPSadvD1zxnhPZVBsWr3LeooTDuAWAHZZOazJEI4F0j/SnO8K0FHBIICMUarX1er6m8pjuLHjiYmhRzhMnX5kLjtgsK40clUmLqEByjYSLPyGNsbWgSoBRfRsnDLBuCOjnbDiRGDFJPaMbtwTHQvL6BjUTT16bCBKxhyBRup8Ns09rGgiz4/Y8FKtn09OVOf8b2bMdbqg/ochpvEjY6ocuIhs83TXMBe/0qMaYZMC6VvoBX27YgJbk1lZn7TJGXgaRk4yHPIdUF1nCVIk/nMaEUE2ozakvWCAJFJRtohwlPicW0iYdmzU5MO/rzfbp+1ms3p73X0BunvQng==
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:6400:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ff1e65d5292ac70fa0ceaf87d04313c975d6299e212e0274d3d0362b218ccab8

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:03:53 GMT
content-encoding
gzip
last-modified
Mon, 25 Nov 2019 17:24:00 GMT
server
AmazonS3
age
512
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript;charset=UTF-8
status
200
x-amz-meta-qc-ineu
True
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
2w5fRHoGLDzxCSp09XECAkVbBEEJ8LvlZsyCtQqkxB4y0g1gOsSq_A==
via
1.1 217b7bc19321a4945b685521fa4f11ac.cloudfront.net (CloudFront)
b-eebc338.js
tagan.adlightning.com/penske/
51 KB
14 KB
Script
General
Full URL
https://tagan.adlightning.com/penske/b-eebc338.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.107 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-107.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a67d51764ea3ce8c44c7603d2af9c2e05c9a4a642c43ad34e7096c39dfb5c9cf

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 24 Oct 2019 15:37:57 GMT
content-encoding
gzip
age
3447103
x-cache
Hit from cloudfront
status
200
content-length
13742
x-amz-meta-git_commit
eebc338
last-modified
Thu, 24 Oct 2019 15:37:35 GMT
server
AmazonS3
etag
"3d976d93c7ca5c8121f7e083997470ea"
x-amz-version-id
5ugD2uDimnzCVbdHW4imVzTURvHMitP4
via
1.1 03d509e8374e9f42668961b5e0201349.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
-Tox7ICz4s1uxqbPGs62fzhdeHE0gVjq9h0rgyWf9mkg5ap67eM0xg==
bl-0d4dfcb-6a1a8f13.js
tagan.adlightning.com/penske/
63 KB
24 KB
Script
General
Full URL
https://tagan.adlightning.com/penske/bl-0d4dfcb-6a1a8f13.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.107 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-107.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
143eb9421aad9905e2097c38752ef338f441865aa92c0db5d9c6764070edafb0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 02 Dec 2019 22:57:16 GMT
content-encoding
gzip
age
51144
x-cache
Hit from cloudfront
status
200
content-length
24263
x-amz-meta-git_commit
0d4dfcb
last-modified
Mon, 02 Dec 2019 22:57:03 GMT
server
AmazonS3
etag
"940ed7cb5cb707d7901564203b4197c3"
x-amz-version-id
fXKzluzTAWMQxUXcqnnE4coZ1Uk85re4
via
1.1 03d509e8374e9f42668961b5e0201349.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
9LImeBPE9n7xpTi0s6xp_v2WMWzwpgluTjUCVksDnFE29b75IFLg1A==
/
bgr.com/2019/11/20/oneplus-8-pro-design-leaked-schematics-show-hole-punch-display/
94 KB
25 KB
XHR
General
Full URL
https://bgr.com/2019/11/20/oneplus-8-pro-design-leaked-schematics-show-hole-punch-display/
Requested by
Host: s0.wp.com
URL: https://s0.wp.com/_static/??-eJyVkttOwzAMhl+INEOCAReIZ3EzN3WbE7HbwZ6erFqlFaqtSJESO59/HxJ9TIqCccMBWXdlfQ6Yvy9b1fGDvgUoTzaDYOUpzLCJQTDImU2RxSMzWFy59bEmh2pgzAUIUtI0cYVblkRhJDzexTqUBKZXGZlOf7JLi6UuPVLSyRuV3GAp8HS2LtbgVDMEIxTD1PPZ38bY8z90wMMpBgWJBawGZpRJa+Ffm9sNzSYT14hXahfPHZ3a5qsYRsim3YxvaX4ZUWaeyuRoREVNhgJtC3VUz/+qoS+J81tOxnaJ8o0okKBik6Nzv+0q9fZQ1D78++Pzy27/tHt923c//jEjgQ==
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.79.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
aded5803cb640c70289adaf48bdd8d798e7bcebec5c43d2a4754a2d420cd8659
Security Headers
Name Value
Content-Security-Policy upgrade-insecure-requests

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
X-Requested-With
XMLHttpRequest

Response headers

x-hacker
If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
vary
Accept-Encoding, Cookie
last-modified
Tue, 03 Dec 2019 13:09:39 GMT
server
nginx
content-security-policy-report-only
default-src data: 'unsafe-inline' 'unsafe-eval' https: blob: http://*.files.wordpress.com wss://bgr.com; report-uri https://pmcuri.report-uri.com/r/d/csp/reportOnly
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=300, must-revalidate
x-nananana
Batcache
content-security-policy
upgrade-insecure-requests
x-ac
4.fra _dfw
link
<https://wp.me/p2sPFm-oaMY>; rel=shortlink
x-ua-compatible
IE=Edge
hovercard.min.css
0.gravatar.com/dist/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://0.gravatar.com/dist/css/hovercard.min.css?ver=201949y
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
7b5e32cb325e9aaef357a421cd16ddf6d6ddb70fec74b6c35a73eccc6817664c

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Thu, 22 Mar 2018 09:46:04 GMT
server
nginx
etag
W/"5ab37b5c-1a2e"
content-type
text/css
status
200
cache-control
max-age=604800
expires
Tue, 10 Dec 2019 13:09:39 GMT
services.min.css
0.gravatar.com/dist/css/
3 KB
550 B
Stylesheet
General
Full URL
https://0.gravatar.com/dist/css/services.min.css?ver=201949y
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
e9fc9b1878db1b13b973252b048d19a17abb34a8da464a552c6d401728ed1e86

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
last-modified
Thu, 22 Mar 2018 09:46:04 GMT
server
nginx
etag
W/"5ab37b5c-a54"
content-type
text/css
status
200
cache-control
max-age=604800
expires
Tue, 10 Dec 2019 13:09:39 GMT
widget_iframe.6a44a9d26983bbb5b04ae399f9e496fe.html
platform.twitter.com/widgets/ Frame BCC6
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.6a44a9d26983bbb5b04ae399f9e496fe.html?origin=https%3A%2F%2Fbgr.com
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/41A6) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/

Response headers

Content-Encoding
gzip
ACCESS-CONTROL-ALLOW-METHODS
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 03 Dec 2019 13:09:39 GMT
Etag
"7d3f6ed140174a20e7c8be261a70a863+gzip"
Last-Modified
Tue, 26 Nov 2019 18:11:58 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/41A6)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5816
/
r.skimresources.com/api/
152 B
459 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DV5Y2W2A95TT4D5X9HD84KM6&persistence=1&checksum=bafc5bb95ead0deb230a486ce1df84d0783d5e02adf94ef0bef2a64372c37088
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
8881f12d0b70ed65998a3271835f907eb8d67600d89461cd34c0d8579b7f88cf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://bgr.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
8132.js
script.crazyegg.com/pages/scripts/0020/
0
347 B
Script
General
Full URL
https://script.crazyegg.com/pages/scripts/0020/8132.js?437605
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
via
1.1 a24693415d645febb9ae7d9ee007275b.cloudfront.net (CloudFront)
cf-cache-status
HIT
age
10119
x-cache
Hit from cloudfront
status
200
content-length
0
last-modified
Fri, 17 Mar 2017 19:57:26 GMT
server
cloudflare
etag
"d41d8cd98f00b204e9800998ecf8427e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=28800
accept-ranges
bytes
cf-ray
53f5c6ba7bde8c62-VIE
x-amz-cf-id
kPZk1MvIXot3iuZh_DET1TkvrzO1BkrxDepj5_flc704T-sd_UjekA==
cf-bgj
minify
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.86.250 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-86-250.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

date
Mon, 02 Dec 2019 15:48:45 GMT
content-encoding
gzip
vary
Origin
age
76854
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Fri, 01 Nov 2019 13:46:13 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 999a435eb37a050d3de26fe63534c416.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
VtR2sJY1_mZTmsnp9RcGq7uTPudSpGTaDY8siR3FUPWjQ9AzDzmL8g==
modules.1563bfc088652f728ad5.js
script.hotjar.com/
399 KB
70 KB
Script
General
Full URL
https://script.hotjar.com/modules.1563bfc088652f728ad5.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.32.75 Amsterdam, Netherlands, ASN54825 (PACKET - Packet Host, Inc., US),
Reverse DNS
pkt-ams-k1-1
Software
/
Resource Hash
464f98ed0cc4bd0a6f0858a99c60f2e018645009265ed955a0a2eb0f5ca81e00

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
br
last-modified
Thu, 28 Nov 2019 17:38:37 GMT
access-control-allow-origin
*
etag
"6f4d0398872f50ffe1212d1d3fe37a64"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
section-io-origin-time-seconds
0.026
section-io-origin-status
200
accept-ranges
bytes
section-io-id
92515fa92b3af867643a93764b667496
content-length
70909
g.gif
pixel.wp.com/
50 B
74 B
Image
General
Full URL
https://pixel.wp.com/g.gif?x_stats-initial-visibility=visible&v=wpcom-no-pv&rand=0.0877954136174437
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Tue, 03 Dec 2019 13:09:39 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
g.gif
pixel.wp.com/
50 B
74 B
Image
General
Full URL
https://pixel.wp.com/g.gif?blog=36424464&v=wpcom&tz=-5&user_id=0&post=5761368&subd=boygeniusreport&host=bgr.com&ref=&fcp=1147&rand=0.3543199162041395
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Tue, 03 Dec 2019 13:09:39 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
g.gif
pixel.wp.com/
50 B
74 B
Image
General
Full URL
https://pixel.wp.com/g.gif?crypt=UE40eW5QN0p8M2Y%2FRE1BNmNJfGhxNCVxUDExYmtib2E%2FSzdEJm0lUEtbdFU0fFk4cHZvcUFrZT90Tn4yQm1%2BR3NyNTdlRXM0SjZjfGJdZ1piZDZoak5KYSUvd3EyY05Kai44dTJ8VCxVX3JdTnBkcE9GaVJCVCY2Wiw5LE1JMStjJn43LjB6ZXNOQ1dLUDJPTjY4S3duTFFDPWduR05IdlFfWVE4ZzdYYz9wW0ktQUpRRSszUi5zW2lZWmV2LE90ZzRuZ2lXT3NHS0U0RVldYlIsLiVRfFZQYj9KMmNWWlZFYThZbmQ4JlA%3D&v=wpcom-no-pv&rand=0.6457921162363005
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Tue, 03 Dec 2019 13:09:39 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
/
d.agkn.com/iframe/8613/ Frame 6F0B
0
0
Document
General
Full URL
https://d.agkn.com/iframe/8613/?che=686435021&gdpr=&gdpr_consent=&ref=&bpid=penskemedia&c=%7B%22bpid%22%3A%22penskemedia%22%2C%22loc%22%3A%22https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Tech%22%2C%22brd%22%3A%22-1%22%2C%22subcategory%22%3A%22%22%7D
Requested by
Host: js.agkn.com
URL: https://js.agkn.com/prod/v0/tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:4a00:19:fc2c:a140:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash

Request headers

:method
GET
:authority
d.agkn.com
:scheme
https
:path
/iframe/8613/?che=686435021&gdpr=&gdpr_consent=&ref=&bpid=penskemedia&c=%7B%22bpid%22%3A%22penskemedia%22%2C%22loc%22%3A%22https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F%22%2C%22gdpr%22%3A%22%22%2C%22gdpr_consent%22%3A%22%22%2C%22ref%22%3A%22-1%22%2C%22cid%22%3A%22-1%22%2C%22sid%22%3A%22-1%22%2C%22gen%22%3A%22-1%22%2C%22age%22%3A%22-1%22%2C%22cat%22%3A%22Tech%22%2C%22brd%22%3A%22-1%22%2C%22subcategory%22%3A%22%22%7D
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/

Response headers

status
200
content-type
text/html;charset=UTF-8
content-length
481
cache-control
no-cache, must-revalidate
date
Tue, 03 Dec 2019 13:09:39 GMT
expires
Sat, 01 Jan 2000 00:00:00 GMT
p3p
CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
pragma
no-cache
server
Apache-Coyote/1.1
set-cookie
ab=0001%3AQavLnwlQj%2FZ%2BYbQWDdVllphL4YJ5vdxG;Max-Age=31536000;domain=agkn.com;path=/ u=C|0AEAleRsTJXkbEwAAAAAAAg1RAQCADVIBAIA;Max-Age=31536000;domain=agkn.com;path=/
x-cache
Miss from cloudfront
via
1.1 2fcedcc055e24d7ac99fbc19ed8fc8ec.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
b31QYUwz72MClgKgKX8noa1RjTfUs6W_clDg5InvkeNh0Bp3jkw__w==
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035310&c3=&c4=&c5=&c6=&c15=&ns__t=1575378579617&ns_c=UTF-8&cv=3.1&c8=Disney%3A%20Hackers%20may%20have%20stolen%20your%20Disney%2B%20login%2C%20but%20don%...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035310&c3=&c4=&c5=&c6=&c15=&ns__t=1575378579617&ns_c=UTF-8&cv=3.1&c8=Disney%3A%20Hackers%20may%20have%20stolen%20your%20Disney%2B%20login%2C%20but%20don...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035310&c3=&c4=&c5=&c6=&c15=&ns__t=1575378579617&ns_c=UTF-8&cv=3.1&c8=Disney%3A%20Hackers%20may%20have%20stolen%20your%20Disney%2B%20login%2C%20but%20don%E2%80%99t%20blame%20us%20%E2%80%93%20BGR&c7=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&c9=
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.5.97.37 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-5-97-37.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:39 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035310&c3=&c4=&c5=&c6=&c15=&ns__t=1575378579617&ns_c=UTF-8&cv=3.1&c8=Disney%3A%20Hackers%20may%20have%20stolen%20your%20Disney%2B%20login%2C%20but%20don%E2%80%99t%20blame%20us%20%E2%80%93%20BGR&c7=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&c9=
Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:39 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
2048158068807929
connect.facebook.net/signals/config/
349 KB
85 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/2048158068807929?v=2.9.14&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
7a610b523d219205d58f89bfb284910669eafd69242349759671df7e229313cf
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';report-uri https://www.facebook.com/csp/reporting/
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
86934
x-xss-protection
0
pragma
public
x-fb-debug
+OiHDO5UmSm9NbFWrUU8u3SUWLbMI7D5XDSN7QxbqNvlYGhPwG5bUzam1rAVmZC84/upCZGMpcif2JTQbomRwQ==
x-fb-trip-id
420120009
date
Tue, 03 Dec 2019 13:09:39 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';report-uri https://www.facebook.com/csp/reporting/
expires
Sat, 01 Jan 2000 00:00:00 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
631 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1575378579642
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/87443X1540249.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://bgr.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
pixel
q.quora.com/_/ad/1013bc3efebd417594984a1c0f0298eb/
43 B
456 B
Image
General
Full URL
https://q.quora.com/_/ad/1013bc3efebd417594984a1c0f0298eb/pixel?j=1&u=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&tag=ViewContent&ts=1575378579650
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.234.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-234-232.compute-1.amazonaws.com
Software
nginx /
Resource Hash
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
X-Q-Stat
81,14f2688a052a88656b570e0d6b034669,10.0.4.225,8824,144.76.109.30,,13624426599,1,1575378579.958,0.001,,.,0,0,0.000,0.000,-,0,0,304,352,176,10,26847,,,,,,,
Content-Type
image/gif
theinternetworksltd-technology_tag.js
d3ezl4ajpp2zy8.cloudfront.net/
0
0

0b838751257a4dbd8dc653bd01aadcc2
polarcdn-terrax.com/mrm/v1.0.0/json/site/
735 B
915 B
XHR
General
Full URL
https://polarcdn-terrax.com/mrm/v1.0.0/json/site/0b838751257a4dbd8dc653bd01aadcc2
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/mediaconductor/mc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2e8609db081422b3a24af7636a764ec82b02015be112f05d2931853c1add6314

Request headers

Accept
application/json
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
via
1.1 varnish
cf-cache-status
HIT
age
397
status
200
cf-ipcountry
DE
content-encoding
gzip
content-type
application/json; charset=utf-8
timing-allow-origin
*
access-control-allow-origin
*
server
cloudflare
etag
W/"602241add86773dac4940293e1b92090"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1021379957 1021376242
x-country
DE
access-control-expose-headers
CF-IPCountry, Date, X-Country
cache-control
max-age=900
cf-ray
53f5c6bb29ebcbc0-VIE
access-control-allow-headers
Authorization
YmdyLmNvbQ==
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YmdyLmNvbQ==
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?ver=5.3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.226.107 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-226-107.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=27971
Date
Tue, 03 Dec 2019 13:09:39 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Tue, 03 Dec 2019 20:55:50 GMT
pub
pixel.adsafeprotected.com/services/
1 KB
1 KB
XHR
General
Full URL
https://pixel.adsafeprotected.com/services/pub?anId=930203&slot=%7Bid:div-gpt-top-single-to-header-728x90-uid3,ss:%5B1.1,728.90,970.90,970.250,1000.150%5D,p:8352/bgr/ros/leaderboard,t:display%7D&slot=%7Bid:gpt-dsk-ros-mid-article-uid0,ss:%5B300.250,2.2,2.4,4.2%5D,p:8352/bgr/ros/mid-article,t:display%7D&slot=%7Bid:div-gpt-top-single-right-col-300x250-uid4,ss:%5B300.250,300.600,300.1050%5D,p:8352/bgr/ros/right-rail-top,t:display%7D&slot=%7Bid:div-gpt-mid-single-right-col-2-300x250-uid5,ss:%5B300.250,300.251%5D,p:8352/bgr/ros/right-rail-bottom,t:display%7D&wr=1600.1200&sr=1600.1200&sessionId=dd613d66-af81-f3f6-d60b-933ea4bd5f48&url=https%253A%252F%252Fbgr.com%252F2019%252F11%252F20%252Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%252F
Requested by
Host: cdn.adsafeprotected.com
URL: https://cdn.adsafeprotected.com/iasPET.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.166.0.26 , United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
anycast.pixel.adsafeprotected.com
Software
nginx /
Resource Hash
da64cf79026746730e27f53b10afa512db57348111547a6ebc7ecf5a344544ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
X-Server-Name
app54ami.ami.303net.pvt
Transfer-Encoding
chunked
Content-Type
application/json;charset=UTF-8
Access-Control-Allow-Origin
https://bgr.com
Access-Control-Expose-Headers
X-Server-Name
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Server
nginx
cb=gapi.loaded_0
apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.2O_3XQTFIPY.O/m=plusone/rt=j/sv=1/d=1/ed=1/am=wQE/rs=AGLTcCM0JjSA0I0wvcxN0q5y4p-sc5Yxiw/
139 KB
49 KB
Script
General
Full URL
https://apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.2O_3XQTFIPY.O/m=plusone/rt=j/sv=1/d=1/ed=1/am=wQE/rs=AGLTcCM0JjSA0I0wvcxN0q5y4p-sc5Yxiw/cb=gapi.loaded_0
Requested by
Host: apis.google.com
URL: https://apis.google.com/js/plusone.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
7b5bbcbf15b2ae7c554c86986bd4412a26c9c11058c19142a8892614bd41ff7c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 22 Nov 2019 01:53:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 06 Nov 2019 22:31:30 GMT
server
sffe
age
990989
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
49979
x-xss-protection
0
expires
Sat, 21 Nov 2020 01:53:10 GMT
rules-p-31f3D02tYU8zY.js
rules.quantcount.com/
2 KB
1 KB
Script
General
Full URL
https://rules.quantcount.com/rules-p-31f3D02tYU8zY.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:7e00:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e10bc1a40f841f371c35a63210db07484bffc8cf0c4d72f2a14fa0d8f5ae0c22

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 12:31:49 GMT
content-encoding
gzip
last-modified
Mon, 19 Mar 2018 22:30:11 GMT
server
AmazonS3
age
2271
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=3600
x-amz-cf-pop
FRA2-C2
x-amz-cf-id
_Yceh4Wi33lEW1gbVwEzb6uk_XPJwM4pTi0XswLWCLGnU2UJl8SoHg==
via
1.1 d6b9c7bad28b271f1e800a50d49ab8a4.cloudfront.net (CloudFront)
cmp-3pc-check.html
static.quantcast.mgr.consensu.org/v27/ Frame EEFE
0
0
Document
General
Full URL
https://static.quantcast.mgr.consensu.org/v27/cmp-3pc-check.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
static.quantcast.mgr.consensu.org
:scheme
https
:path
/v27/cmp-3pc-check.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/

Response headers

status
200
content-type
text/html
content-length
583
last-modified
Mon, 18 Nov 2019 19:20:05 GMT
x-amz-server-side-encryption
AES256
accept-ranges
bytes
server
AmazonS3
date
Tue, 03 Dec 2019 12:55:15 GMT
etag
"2382c3f01978a379e8fa8bc1a3bec605"
x-cache
Hit from cloudfront
via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA2-C1
x-amz-cf-id
zUs227fs7f3AGLK_tDI2gbTCuHVj9SBj1cWXEw8CWkz4bhblXDtRRA==
age
968
moment~timeline~tweet.cb38d07468ec6018c11772ae620672f0.js
platform.twitter.com/js/
24 KB
8 KB
Script
General
Full URL
https://platform.twitter.com/js/moment~timeline~tweet.cb38d07468ec6018c11772ae620672f0.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FB) /
Resource Hash
4de25df65f4de4eb52e1923e68d20a25e08860d5329e874150bfce7adaca3b9d

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 18:11:50 GMT
Server
ECS (fcn/40FB)
Etag
"98ee346d9c98fe236fb8791a7595ce95+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
7910
tweet.32281c46d4a685a1acbfbae8deacde45.js
platform.twitter.com/js/
18 KB
6 KB
Script
General
Full URL
https://platform.twitter.com/js/tweet.32281c46d4a685a1acbfbae8deacde45.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FC) /
Resource Hash
cf017a3b704f2407c5f2c17303acaed0176f8e83e199fc9a37865b420a3b7983

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:39 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 18:11:50 GMT
Server
ECS (fcn/40FC)
Etag
"7421519caa43e0fa735e49b7549a1973+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
6068
box-b736908ce6b0e933fad3a2e45df61b38.html
vars.hotjar.com/ Frame C2E7
0
0
Document
General
Full URL
https://vars.hotjar.com/box-b736908ce6b0e933fad3a2e45df61b38.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.25 Parsippany, United States, ASN54825 (PACKET - Packet Host, Inc., US),
Reverse DNS
pkt-ams-k1-9
Software
/
Resource Hash

Request headers

:method
GET
:authority
vars.hotjar.com
:scheme
https
:path
/box-b736908ce6b0e933fad3a2e45df61b38.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/

Response headers

status
200
date
Tue, 03 Dec 2019 13:09:39 GMT
content-type
text/html
content-length
808
cache-control
max-age=31536000
content-encoding
br
last-modified
Mon, 25 Nov 2019 17:40:38 GMT
etag
"ed7551919779fd07dbfe6d776c643379"
section-io-origin-status
200
section-io-origin-time-seconds
0.029
vary
Accept-Encoding
accept-ranges
bytes
section-io-id
a2f23fcca599acbe4612114d49e97d46
/
p.skimresources.com/ Frame BD96
Redirect Chain
  • https://x.skimresources.com/?provider=exelate
  • https://loadeu.exelator.com/load/?p=787&g=001&j=0&
  • https://loadeu.exelator.com/load/?p=787&g=001&j=0&&xl8blockcheck=1
  • https://x.skimresources.com/?provider=exelate&skim_mapping=true&provider_id=a93dd9cdd39672ef12f3cacd9c0af69d
  • https://p.skimresources.com/?provider_id=a93dd9cdd39672ef12f3cacd9c0af69d&skim_mapping=true
43 B
270 B
Image
General
Full URL
https://p.skimresources.com/?provider_id=a93dd9cdd39672ef12f3cacd9c0af69d&skim_mapping=true
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
age
1
status
200
x-guploader-uploadid
AEnB2UrIGRtCIMpamPxE3rGDVDFFVE3WNJbcuep2yMmF5wXrTIvkFNpzY-rEp8xGfqtmkXoYB_Bi0y73cATcAegOlsBIRCKBiA
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1575378580.cds105.fr8.hn,1575378580.cds135.fr8.sc,1575378580.cds135.fr8.pr
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif

Redirect headers

Location
https://p.skimresources.com?provider_id=a93dd9cdd39672ef12f3cacd9c0af69d&skim_mapping=true
Date
Tue, 03 Dec 2019 13:09:40 GMT
Server
TornadoServer/2.4.1
Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Content-Length
0
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1575378579790&sessionId=45fc7797-b5ea-1803-87cb-1e767186b81c&url=bgr.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?ver=5.3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:40 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
f69efc2373a14caec2775b27d2ddf680
Content-Length
4
Expires
0
sfp.js
native.sharethrough.com/assets/
398 KB
116 KB
Script
General
Full URL
https://native.sharethrough.com/assets/sfp.js
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/mediaconductor/mc.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.58 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-58.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
45ee8c6b98a9cec244597fdb1e772170d4d61fd59cee83fc4b14fd02b7740f66

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
last-modified
Wed, 27 Nov 2019 19:57:55 GMT
server
AmazonS3
x-amz-cf-pop
FRA50-C1
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=3600
x-amz-cf-id
OuXqnQTEdTY_jEE1JCCVwLmiNKH5vTzlXwuZVKOzanrtS8QMsur7lQ==
via
1.1 24475cc722041223cf99f56b55432566.cloudfront.net (CloudFront)
expires
Wed, 27 Nov 2019 20:57:53 GMT
/
www.facebook.com/tr/
44 B
229 B
Image
General
Full URL
https://www.facebook.com/tr/?id=2048158068807929&ev=ViewContent&dl=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&rl=&if=false&ts=1575378579833&sw=1600&sh=1200&v=2.9.14&r=stable&ec=0&o=30&fbp=fb.1.1575378579832.19536795&it=1575378579623&coo=false&rqm=GET
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Tue, 03 Dec 2019 13:09:39 GMT
cmpui-popup.js
static.quantcast.mgr.consensu.org/v27/
222 KB
60 KB
Script
General
Full URL
https://static.quantcast.mgr.consensu.org/v27/cmpui-popup.js
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:2800:9:46dc:4700:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
2363cbdace3d4db7b0ee2f0fcf42a722658814affea6c100f3679f7c21ff9e11

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 12:56:29 GMT
content-encoding
gzip
last-modified
Mon, 18 Nov 2019 19:20:04 GMT
server
AmazonS3
age
1134
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript;charset=UTF-8
status
200
x-amz-cf-pop
FRA2-C1
x-amz-cf-id
eYpKQNNOTR8qwmB2PmZQzqklbUTiKXHq-NORaAdn7nUte9MHS3TiRA==
via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
syndication
syndication.twitter.com/i/jot/
43 B
123 B
Image
General
Full URL
https://syndication.twitter.com/i/jot/syndication?dnt=1&l=%7B%22_category_%22%3A%22syndicated_impression%22%2C%22triggered_on%22%3A1575378579880%2C%22dnt%22%3Atrue%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22action%22%3A%22impression%22%7D%7D
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
110
pragma
no-cache
last-modified
Tue, 03 Dec 2019 13:09:39 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
6b254be1af95191670408b62a969d49b
x-transaction
00daf4ba002960f3
expires
Tue, 31 Mar 1981 05:00:00 GMT
tweets.json
cdn.syndication.twimg.com/
16 KB
3 KB
Script
General
Full URL
https://cdn.syndication.twimg.com/tweets.json?callback=__twttr.callbacks.cb0&ids=1196118228944248833%2C1196173447992430592&lang=en&suppress_response_codes=true&theme=light&tz=GMT%2B0100
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
tsa_f /
Resource Hash
69d696ae3aa97d55119f81bec3c0f92f5f037bdd096928924461da8f7dd6b132
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
content-disposition
attachment; filename=jsonp.jsonp
strict-transport-security
max-age=631138519
content-length
3167
x-xss-protection
0
x-response-time
118
last-modified
Tue, 03 Dec 2019 13:09:40 GMT
server
tsa_f
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
must-revalidate, max-age=60
x-connection-hash
bb582044ac13476691aa1027718ef636
timing-allow-origin
*
x-transaction
00d6258d00d98b1b
expires
Tue, 03 Dec 2019 13:10:40 GMT
/
aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/
43 B
245 B
Image
General
Full URL
https://aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/?assoc_payload=%7B%22totalDocWidth%22%3A1585%2C%22totalDocHeight%22%3A3231%2C%22logType%22%3A%22onetag_pageload%22%2C%22pageTitle%22%3A%22Disney%3A%20Hackers%20may%20have%20stolen%20your%20Disney%2B%20login%2C%20but%20don%E2%80%99t%20blame%20us%20%E2%80%93%20BGR%22%2C%22numLinks%22%3A2%2C%22numAutoTaggedLinks%22%3A0%2C%22autoTaggingEnabled%22%3Afalse%2C%22geoRedirectEnabled%22%3Atrue%2C%22disableTransitTracking%22%3Afalse%2C%22numLinksATF%22%3A1%2C%22numLinksBTF%22%3A1%2C%22shortLinksInLivePool%22%3A%22%22%2C%22shortLinksInPage%22%3A%22%22%2C%22shortLinksInLivePoolCount%22%3A0%2C%22shortLinksInPageCount%22%3A0%2C%22shortLinksMatchCount%22%3A0%2C%22assocPayloadId%22%3A%22QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw%22%2C%22linkCode%22%3A%22w49%22%2C%22trackingId%22%3A%22b0c55-20%22%2C%22refUrl%22%3A%22https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F%22%7D
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
72.21.206.141 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
206-141.amazon.com
Software
Server /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:40 GMT
Server
Server
Vary
User-Agent
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
ir
ir-na.amazon-adsystem.com/e/
42 B
159 B
Image
General
Full URL
https://ir-na.amazon-adsystem.com/e/ir?l=w49&t=b0c55-20&o=1&cb=1575378579889
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.46.128.194 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
/
Resource Hash
47043e4823a6c21a8881de789b4185355330b5804629d23f6b43dd93f5265292

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Cache-Control
no-cache
Connection
close
Content-Length
42
Content-Type
image/gif
cm_:onejs_load_evt@v=1167,onejs_exec_time@v=2,aax_load_time@v=391,aax_load_time_one_tag@v=391,wdgt_load_time@v=1565,wdgt_load_time_DE@v=1565,wdgt_load_time_one_tag@v=1565,wdgt_load_time_invoke@v=39...
fls-na.amazon-adsystem.com/1/action-impressions/1/OE/associates-adsystems/action/
0
146 B
Image
General
Full URL
https://fls-na.amazon-adsystem.com/1/action-impressions/1/OE/associates-adsystems/action/cm_:onejs_load_evt@v=1167,onejs_exec_time@v=2,aax_load_time@v=391,aax_load_time_one_tag@v=391,wdgt_load_time@v=1565,wdgt_load_time_DE@v=1565,wdgt_load_time_one_tag@v=1565,wdgt_load_time_invoke@v=398,wdgt_load_time_invoke_one_tag@v=397,wdgt_load_time_invoke_one_tag_DE@v=397?marketplace=US&service=AmazonWidgets&method=Widgets_Render_Time&marketplaceId=ATVPDKIKX0DER&requestId=8ac3c0c3-2bb2-452f-888a-d8db7fa573ca&session=03c6046d-4622-456c-8293-3fe5ab5c5e9a
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_CBC
Server
52.94.237.66 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
x-amzn-RequestId
dda1cbd5-f0ec-4e96-9c7f-0b12a8e0cc2c
Content-Type
text/plain
vendorlist.json
vendorlist.consensu.org/
92 KB
17 KB
XHR
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:6200:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
87cbeab00a06ecdea6d059473f8223197b3e2e70c7023e50279a210de90815aa

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

date
Sun, 01 Dec 2019 02:47:45 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
210115
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 28 Nov 2019 16:00:26 GMT
server
AmazonS3
access-control-max-age
604800
access-control-allow-methods
GET
x-amz-version-id
s.mE4yKhUZITOXBYWuTuGEw4Fxd4sD4L
via
1.1 71dbd5706c5b0c7b733248e1171f2d4f.cloudfront.net (CloudFront)
cache-control
max-age=604800
x-amz-cf-pop
FRA2-C2
content-type
application/json; charset=utf-8
x-amz-cf-id
c-oIfLxBA9b8Nou2Dl_xAj8JaV2J-BVPuewK1JxFw1lTKwXToJ0dsw==
CookieAccess
api.quantcast.mgr.consensu.org/
30 B
584 B
XHR
General
Full URL
https://api.quantcast.mgr.consensu.org/CookieAccess
Requested by
Host: quantcast.mgr.consensu.org
URL: https://quantcast.mgr.consensu.org/cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.95 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-95.fra50.r.cloudfront.net
Software
/
Resource Hash
5a4061ff8312e2ad494bd984b7df966438232be64a3b284ab69f66c6705009a6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

date
Tue, 03 Dec 2019 13:09:39 GMT
content-encoding
gzip
x-amz-cf-pop
FRA50-C1
x-amzn-requestid
5a8c12a8-18b2-4db2-aa52-1c30d2b69f28
x-cache
Error from cloudfront
status
404
x-amz-apigw-id
EIO3IFfroAMF7Kw=
content-length
50
access-control-allow-origin
https://bgr.com
x-amzn-trace-id
Root=1-5de65e93-e229401046e6009002776a90;Sampled=0
vary
Origin
access-control-allow-methods
GET, POST
content-type
application/json
via
1.1 c6702f5f3b6e77da6f394e67ef1a6aab.cloudfront.net (CloudFront)
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
access-control-allow-headers
Content-Type
x-amz-cf-id
cfevoyHAOrC9Xu45DXFHlp3ykWMajFSQ0PQJpEj02qDxUFnmXyNiZg==
page
t.skimresources.com/api/v2/
22 B
378 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/87443X1540249.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Tue, 03 Dec 2019 13:09:40 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://bgr.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
pmc_color.png
pmccorp2.files.wordpress.com/2018/05/
4 KB
4 KB
Image
General
Full URL
https://pmccorp2.files.wordpress.com/2018/05/pmc_color.png
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.24 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
06d41f060679f773be2b7d0e9945979d15dbfee5c5b024e0dd4bbf3fd2a8edfb

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT ams 24 np
date
Tue, 03 Dec 2019 13:09:40 GMT
last-modified
Fri, 25 May 2018 00:55:13 GMT
server
nginx
x-orig-src
01_mogdir
content-type
image/png
status
200
accept-ranges
bytes
content-length
4097
expires
Tue, 10 Dec 2019 22:39:53 GMT
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
87562d3773ffab3d0716a70faa73c38b322fde3b8f265c3d646a3cea976ef67e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
/
p.skimresources.com/ Frame BD96
Redirect Chain
  • https://sync.crwdcntrl.net/map/c=7505/tp=SKIM/?https%3A%2F%2Fx.skimresources.com%2F%3Fprovider%3Dlotame%26skim_mapping%3Dtrue%26provider_id%3D%24%7Bprofile_id%7D
  • https://sync.crwdcntrl.net/map/ct=y/c=7505/tp=SKIM/?https%3A%2F%2Fx.skimresources.com%2F%3Fprovider%3Dlotame%26skim_mapping%3Dtrue%26provider_id%3D%24%7Bprofile_id%7D
  • https://x.skimresources.com/?provider=lotame&skim_mapping=true&provider_id=19d8a061c7fd1aaaea65d8fcd60b439a
  • https://p.skimresources.com/?provider_id=19d8a061c7fd1aaaea65d8fcd60b439a&skim_mapping=true
43 B
189 B
Image
General
Full URL
https://p.skimresources.com/?provider_id=19d8a061c7fd1aaaea65d8fcd60b439a&skim_mapping=true
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
age
1
status
200
x-guploader-uploadid
AEnB2Ur9Kqtt2lFI-22UmHnNGzE2FrZ8hbWeQpTAZOjN-MyINB2PRf6nvShxeuGPCvkXRNsatMBW6VAC6yahKYQ-doIxDT99Bg
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1575378580.cds105.fr8.hn,1575378580.cds135.fr8.sc,1575378580.cds135.fr8.pr
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif

Redirect headers

Location
https://p.skimresources.com?provider_id=19d8a061c7fd1aaaea65d8fcd60b439a&skim_mapping=true
Date
Tue, 03 Dec 2019 13:09:40 GMT
Server
TornadoServer/2.4.1
Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Content-Length
0
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
camera-black.png
s0.wp.com/wp-content/themes/vip/bgr/assets/images/icons/
20 KB
20 KB
Image
General
Full URL
https://s0.wp.com/wp-content/themes/vip/bgr/assets/images/icons/camera-black.png
Requested by
Host: s0.wp.com
URL: https://s0.wp.com/_static/??-eJyVkttOwzAMhl+INEOCAReIZ3EzN3WbE7HbwZ6erFqlFaqtSJESO59/HxJ9TIqCccMBWXdlfQ6Yvy9b1fGDvgUoTzaDYOUpzLCJQTDImU2RxSMzWFy59bEmh2pgzAUIUtI0cYVblkRhJDzexTqUBKZXGZlOf7JLi6UuPVLSyRuV3GAp8HS2LtbgVDMEIxTD1PPZ38bY8z90wMMpBgWJBawGZpRJa+Ffm9sNzSYT14hXahfPHZ3a5qsYRsim3YxvaX4ZUWaeyuRoREVNhgJtC3VUz/+qoS+J81tOxnaJ8o0okKBik6Nzv+0q9fZQ1D78++Pzy27/tHt923c//jEjgQ==
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.32 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
4165548dc8256016bb8aea7a17c3ad0a888e46f1a796acd692fd71c2f5c23e89

Request headers

Referer
https://s0.wp.com/_static/??-eJyNj9EKwjAMRX/IGtTN4YP4LV2XddW2KUs28e+tUyYiDt/OhXsPCVyTMhQFo4B0GJBhdAlq24NmRmEwzNDmBq8zreCvfoN8EUpLixSMSn6wLvLEugnT9MWK5ebxKXAQSVx28Axf5jDMNoukPBktjuJHUK3Xrl+a9lh7shntdMs7/vqkK8B6qrV/FE7huCmrYn8oq932fAcm2oA2?cssminify=yes
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Tue, 03 Dec 2019 13:09:40 GMT
x-ac
4.fra _dfw
last-modified
Sat, 18 Aug 2018 11:10:41 GMT
server
nginx
etag
"5b77feb1-5035"
content-type
image/png
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-length
20533
expires
Sat, 21 Nov 2020 08:31:04 GMT
oneplus-7t-5.jpg
boygeniusreport.files.wordpress.com/2019/09/
168 KB
168 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2019/09/oneplus-7t-5.jpg?quality=98&strip=all&w=782
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
dfb68e2a1405baa4a0006a021b7653a470f8e291445ddd7b74ee3abaffcc21ac

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:40 GMT
last-modified
Wed, 25 Sep 2019 18:23:46 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
172096
expires
Mon, 09 Dec 2019 16:33:42 GMT
oneplus-8-pro-design-schematics-leak.jpg
boygeniusreport.files.wordpress.com/2019/11/
19 KB
19 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2019/11/oneplus-8-pro-design-schematics-leak.jpg?quality=98&strip=all&w=834
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
c5b492d2fc78853ec943de4c9d9a0074dcdbcbd23caa75cc5c951ba189625895

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:40 GMT
last-modified
Wed, 20 Nov 2019 12:12:52 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
19508
expires
Thu, 12 Dec 2019 05:07:51 GMT
best-buy-sign-store.jpg
boygeniusreport.files.wordpress.com/2016/11/
24 KB
24 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2016/11/best-buy-sign-store.jpg?quality=98&strip=all&w=400&h=234&crop=1
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
2c8a238dde349f39bee88aac82c2d507079dc88ede08d259fe8a5760c20b92eb

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:40 GMT
last-modified
Tue, 22 Nov 2016 12:44:24 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
24952
expires
Tue, 07 Jan 2020 09:44:21 GMT
amazon.jpg
boygeniusreport.files.wordpress.com/2017/10/
24 KB
24 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2017/10/amazon.jpg?quality=98&strip=all&w=400&h=234&crop=1
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
7ab0fdad5ecf451fd61012b3ab4ad7d189e35a20161dcbcb2f6e7925ff3c80b4

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:40 GMT
last-modified
Wed, 18 Oct 2017 17:03:29 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
24350
expires
Tue, 17 Dec 2019 19:20:10 GMT
target-black-friday-2018-shipt.jpg
boygeniusreport.files.wordpress.com/2018/10/
43 KB
43 KB
Image
General
Full URL
https://boygeniusreport.files.wordpress.com/2018/10/target-black-friday-2018-shipt.jpg?quality=98&strip=all&w=400&h=234&crop=1
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.72.19 San Francisco, United States, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
0326f20d1a08bafe8e1fa630ed2ffb18af116dfc961f033b8d4fa14c33d63da8

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT fra 19 np
date
Tue, 03 Dec 2019 13:09:40 GMT
last-modified
Wed, 24 Oct 2018 10:13:21 GMT
server
nginx
vary
Accept
content-type
image/webp
status
200
x-orig-src
0_imageresize
accept-ranges
bytes
content-length
44342
expires
Sun, 22 Dec 2019 23:38:11 GMT
get
odb.outbrain.com/utils/
34 KB
13 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&srcUrl=https%3A%2F%2Fbgr.com%2Ffeed%2F&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&idx=0&version=104087&apv=false&sig=eP8TAoGJ&format=html&va=true&rand=44905&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&contxtKV=light-mode&cmpStat=1&ref=
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
029d406d8c71bb2e01398bda31edc8d9cef261638109aa02e6d4f77be20ad397
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, FRA, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
c8fb68474444d4ea598947f28c798ebc
content-length
12353
x-served-by
cache-jfk8121-JFK, cache-fra19123-FRA
pragma
no-cache
x-timer
S1575378580.279589,VS0,VE164
date
Tue, 03 Dec 2019 13:09:40 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.21
accept-ranges
bytes, bytes
x-cache-hits
0, 0
/
audit.quantcast.mgr.consensu.org/
80 B
486 B
XHR
General
Full URL
https://audit.quantcast.mgr.consensu.org/?log=;1575378580293;BGR;https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F;;;;;p,off,true,,1,en,27,177,true,false,false;displayConsentUi:mandatory,
Requested by
Host: static.quantcast.mgr.consensu.org
URL: https://static.quantcast.mgr.consensu.org/v27/cmpui-popup.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.58 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-58.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2d0f6b590917e7d27ddeb026b280d62dde9d03bb92f47f56342fc5f68f0c24eb

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

date
Mon, 02 Dec 2019 15:28:44 GMT
via
1.1 1b73451818d2dd47a574604c0b84f692.cloudfront.net (CloudFront)
vary
Origin
age
78057
x-cache
Hit from cloudfront
status
200
content-length
80
last-modified
Mon, 11 Jun 2018 22:07:34 GMT
server
AmazonS3
etag
"0614149d8033903db5de46d6c184bbfd"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
text/html
access-control-allow-origin
*
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
x-amz-cf-id
KShw8SRVKKe0G5ELMRKfdA1Q_A59fVEdsnA617Wu7wMut3R7w9276g==
/
www.facebook.com/tr/
0
70 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundary5v5KAhBtLR5IlS3y

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
access-control-allow-origin
https://bgr.com
date
Tue, 03 Dec 2019 13:09:40 GMT
content-type
text/plain
status
200
access-control-allow-credentials
true
alt-svc
h3-23=":443"; ma=3600
content-length
0
BAb50Tgg
pbs.twimg.com/card_img/1200686333984935937/
9 KB
9 KB
Image
General
Full URL
https://pbs.twimg.com/card_img/1200686333984935937/BAb50Tgg?format=jpg&name=600x314
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FE) /
Resource Hash
f9d3b955a89b264e5a718f041d6b10333c57204a357397f7f6292639aed21e27
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
8756
x-response-time
129
surrogate-key
card_img card_img/bucket/1 card_img/1200686333984935937
last-modified
Sat, 30 Nov 2019 07:59:44 GMT
server
ECS (fcn/40FE)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
3149226bc1a94e4db109645b8b465885
accept-ranges
bytes
tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
platform.twitter.com/css/
51 KB
12 KB
Stylesheet
General
Full URL
https://platform.twitter.com/css/tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FC) /
Resource Hash
458031c1beb286b351738608cbd8513550fb9f1330a80c9b3a31ef43edde2028

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 18:11:47 GMT
Server
ECS (fcn/40FC)
Etag
"280518989f85e11c9f154ac8f0c806ff+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11430
tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
platform.twitter.com/css/
51 KB
51 KB
Image
General
Full URL
https://platform.twitter.com/css/tweet.a4ac5782325ad1b5e51c8b06daf47853.light.ltr.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?ver=20111117
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FC) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 18:11:47 GMT
Server
ECS (fcn/40FC)
Etag
"280518989f85e11c9f154ac8f0c806ff+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
text/css; charset=utf-8
Content-Length
11430
e9K1pbi7_normal.jpg
pbs.twimg.com/profile_images/1154053377405390849/
2 KB
2 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1154053377405390849/e9K1pbi7_normal.jpg
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/4184) /
Resource Hash
9dc1ddac58aaa5b93d0f83d582665724d8a106f7465413b34f5344d8cfc15b7b
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
2035
x-response-time
109
surrogate-key
profile_images profile_images/bucket/4 profile_images/1154053377405390849
last-modified
Wed, 24 Jul 2019 15:37:01 GMT
server
ECS (fcn/4184)
strict-transport-security
max-age=631138519
content-type
image/jpeg
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
758dd851c64c5ac5010cf67346247303
accept-ranges
bytes
PXuZOKks_normal.png
pbs.twimg.com/profile_images/1114201669825384448/
5 KB
5 KB
Image
General
Full URL
https://pbs.twimg.com/profile_images/1114201669825384448/PXuZOKks_normal.png
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:fa2:1627:1fe:edb:1665 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash
8839d608118ff52c09f818d344c86b8e38c7ac85e1f3494816666349d2434a01
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
x-content-type-options
nosniff
x-cache
HIT
status
200
content-length
5151
x-response-time
135
surrogate-key
profile_images profile_images/bucket/3 profile_images/1114201669825384448
last-modified
Fri, 05 Apr 2019 16:20:33 GMT
server
ECS (fcn/40D2)
strict-transport-security
max-age=631138519
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Content-Length
cache-control
max-age=604800, must-revalidate
x-connection-hash
c6693c45ada03f896c46e2f1dee5e672
accept-ranges
bytes
Cookie set obPixelFrame.htm
widgets.outbrain.com/nanoWidget/externals/obPixelFrame/ Frame B730
0
0
Document
General
Full URL
https://widgets.outbrain.com/nanoWidget/externals/obPixelFrame/obPixelFrame.htm
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Accept-Encoding
gzip, deflate, br
Cookie
recs_9461f18da6dc280bd2574b66c166944c=0B2452185080A2466373904A2506454839A2410479620A2468240914A2192247209ACD1; obuid=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/

Response headers

Server
Apache
ETag
"06266b158cc1a0b89268d5a7103a27c4:1503211501"
Last-Modified
Sun, 20 Aug 2017 06:45:01 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
271
Cache-Control
max-age=604800
Date
Tue, 03 Dec 2019 13:09:40 GMT
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
Set-Cookie
akacd_widgets_routing=3752831379~rv=66~id=e23ad96c4550d0ff94503c97ecba8c34; path=/;
ob_logo_67x12.png
widgets.outbrain.com/images/widgetIcons/
2 KB
3 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/ob_logo_67x12.png
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?ver=5.3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
487aec7746a83542b3573383df65747e31c494d8412103b5675329f3d4befaeb

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Last-Modified
Mon, 25 Nov 2019 12:25:03 GMT
Server
Apache
ETag
"c52b07e749f7a09fa7b97b7e195e06ce:1574685753"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
2326
achoice.svg
widgets.outbrain.com/images/widgetIcons/
3 KB
2 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/achoice.svg
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?ver=5.3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2c87952cc1c23627496c7874271042bdb6af21efdf7cbf36ec4d98e6cec34d04

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Nov 2019 12:25:03 GMT
Server
Apache
ETag
"9d26fa4e7238ed94f1d0d92afb453b3e:1574685737"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
1368
l
mcdp-nydc1.outbrain.com/
4 B
376 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=3a524b8cc66ab3f47f8a2118415dce47_7486_1575378580386&tm=780&eT=0&widgetWidth=834&widgetHeight=536&widgetX=200&widgetY=2353&wRV=104087&pVis=1&lsd=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?ver=5.3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.63 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
37da4e14bfae010bcc08f0983c6b44d
Content-Length
30
proxy.js
widgets.outbrain.com/nanoWidget/104087/module/
823 B
949 B
Script
General
Full URL
https://widgets.outbrain.com/nanoWidget/104087/module/proxy.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
80e703f8ec739b4b8e07b4874f3161c2f1fc903eab72d938257e6193815ed9ab

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Nov 2019 12:25:03 GMT
Server
Apache
ETag
"535e8e4ea45adec08f9c18c34d8e46e1:1574685789"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
359
Cookie set obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame C01A
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Accept-Encoding
gzip, deflate, br
Cookie
recs_9461f18da6dc280bd2574b66c166944c=0B2452185080A2466373904A2506454839A2410479620A2468240914A2192247209ACD1; obuid=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/

Response headers

Server
Apache
ETag
"9efa49e5c09e6decfbe492cf34cfda39:1575285131"
Last-Modified
Mon, 02 Dec 2019 11:12:05 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Length
3486
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
Set-Cookie
akacd_widgets_routing=3752831379~rv=48~id=1abad54829ffedc01df586f9e9983a5a; path=/;
streamFeed.js
widgets.outbrain.com/nanoWidget/104087/module/
39 KB
13 KB
Script
General
Full URL
https://widgets.outbrain.com/nanoWidget/104087/module/streamFeed.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
776cc1c44179bc357b7871bfb9f534205d9be0b98476ff4a2de65e2723a07954

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Nov 2019 12:25:03 GMT
Server
Apache
ETag
"52205e1385352482abaeee92e531aec0:1574685800"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
13028
get
odb.outbrain.com/utils/
2 KB
1 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&srcUrl=https%3A%2F%2Fbgr.com%2Ffeed%2F&settings=true&recs=true&widgetJSId=AR_2&key=NANOWDGT01&idx=1&version=104087&apv=true&sig=eP8TAoGJ&format=html&va=true&rand=38718&lsd=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2&lsdt=1575378580446&pdobuid=0&osLang=en-US&t=M2E1MjRiOGNjNjZhYjNmNDdmOGEyMTE4NDE1ZGNlNDc=&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&contxtKV=light-mode&cmpStat=1&ref=
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
07717446615c57a9a30f2b2f0c64062affffc50d13a22a98e1cbab00ed36f9b7
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, FRA, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
ec31da5654665653ac2687487d49977
content-length
1051
x-served-by
cache-jfk8124-JFK, cache-fra19123-FRA
pragma
no-cache
x-timer
S1575378580.465321,VS0,VE102
date
Tue, 03 Dec 2019 13:09:40 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.24
accept-ranges
bytes, bytes
x-cache-hits
0, 0
eyJpdSI6IjY3ZmNmZjg3ZGY0YmVlYzdiOTA2ZTRmNjgyZThhOWQ2NTc4NmQ0YzJiODViY2RlZGUyZDNjOTc0MjRhYWUyNmEiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
7 KB
7 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjY3ZmNmZjg3ZGY0YmVlYzdiOTA2ZTRmNjgyZThhOWQ2NTc4NmQ0YzJiODViY2RlZGUyZDNjOTc0MjRhYWUyNmEiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.58.216.21 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
de97d3c94b06a36114ae74b77af8d479cac162dd3b4f3dcaac8c1259dbcd71e4
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 24 Oct 2019 08:45:09 GMT
Date
Tue, 03 Dec 2019 13:09:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=694258
Connection
keep-alive
X-TraceId
af985a2a43dc4a50c866cd37bd21d69d
Timing-Allow-Origin
*
Content-Length
6881
eyJpdSI6ImQ0NTRkZjg4MTJhMTIwOTc3ZDI4MzYwYjA4MTkwOGNhMjJhNTFhOTQ2MDZjY2RhMzE2NDcwOTBhYTg2NTU3ODEiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
27 KB
27 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQ0NTRkZjg4MTJhMTIwOTc3ZDI4MzYwYjA4MTkwOGNhMjJhNTFhOTQ2MDZjY2RhMzE2NDcwOTBhYTg2NTU3ODEiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.58.216.21 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c57d35c14692b874008d253523818aa30e0d2faefcc7102584737fc1bb447614

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Last-Modified
Tue, 12 Nov 2019 01:19:03 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=718987
Connection
keep-alive
X-TraceId
2b41ae0ffc083238be1357d0e9ff3409
Timing-Allow-Origin
*
Content-Length
27501
eyJpdSI6ImJiODNhNzdkYjFjODJlMTQ2MjI1M2I1NDg1M2VkYmYyNDQ0YjI5ZTA0MDc1OWY2MTFhZTk2MGNjMGQ1YTdjZmEiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
39 KB
40 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImJiODNhNzdkYjFjODJlMTQ2MjI1M2I1NDg1M2VkYmYyNDQ0YjI5ZTA0MDc1OWY2MTFhZTk2MGNjMGQ1YTdjZmEiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.58.216.21 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0cdb2e07061eed3d8f0c3b11b51cb7be19fa7d737479d5482c3a81d8ca59316e
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 13 Nov 2019 21:38:21 GMT
Date
Tue, 03 Dec 2019 13:09:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2410653
Connection
keep-alive
X-TraceId
965bec4feb290139927329e52c910d2
Timing-Allow-Origin
*
Content-Length
40366
eyJpdSI6ImNiNGNjNzczNmJjNTA1YTYzYjAzZTc4MmM2N2ZkMzZmY2RkZjk1ZWMyNmMwMjJmN2I2YTRmMGY3ZjM0NDNiN2UiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
39 KB
39 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImNiNGNjNzczNmJjNTA1YTYzYjAzZTc4MmM2N2ZkMzZmY2RkZjk1ZWMyNmMwMjJmN2I2YTRmMGY3ZjM0NDNiN2UiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.58.216.21 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
cbb2e7e9d41fa743050b92196cfe88112075fa416226264d113134edfe53d122
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 10:08:22 GMT
Date
Tue, 03 Dec 2019 13:09:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1851619
Connection
keep-alive
X-TraceId
29382cf807a588b23d6014a938c082ce
Timing-Allow-Origin
*
Content-Length
39508
eyJpdSI6ImNiN2NjNGI0MzQ4MjNhZGJhYTFmZDJjYjJkMTQzZDMxYTU1ZTZjMzZlNDZmZGQ4ZjYwYTg3OTlhZTg2YjUzNjYiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
18 KB
18 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImNiN2NjNGI0MzQ4MjNhZGJhYTFmZDJjYjJkMTQzZDMxYTU1ZTZjMzZlNDZmZGQ4ZjYwYTg3OTlhZTg2YjUzNjYiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.58.216.21 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6e5e87f6a88aadad8637a6fe1ef4c7cfa7f3f263d2f6d286fa9648729cee7ceb
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 26 Nov 2019 07:03:04 GMT
Date
Tue, 03 Dec 2019 13:09:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1931725
Connection
keep-alive
X-TraceId
7d2d321e6707916b41f4ad60c0bec9cb
Timing-Allow-Origin
*
Content-Length
18001
eyJpdSI6Ijc1NjUyOGQ1YmI5ODgzMjk2YzY2NGViMjAyZTliNGQzMjU3MDBhNzhlM2FiYjIwZDM5ZTZlYWFlZmI4NTdiNjgiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
60 KB
61 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6Ijc1NjUyOGQ1YmI5ODgzMjk2YzY2NGViMjAyZTliNGQzMjU3MDBhNzhlM2FiYjIwZDM5ZTZlYWFlZmI4NTdiNjgiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.58.216.21 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
8081d0fe6c361f58e37ad68119997060f47b5a02a6900a96ba931c46f2a4c75b
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 02 Nov 2019 03:27:06 GMT
Date
Tue, 03 Dec 2019 13:09:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1742217
Connection
keep-alive
X-TraceId
3ff96c4fde5c9d96056024dc77f1924a
Timing-Allow-Origin
*
Content-Length
61857
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/
44 KB
7 KB
Stylesheet
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?ver=20111117
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
a549034009f79ead18a2154a8b730d8acb61e2f36c0434c0f9cff0f73df5d8cf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
45170
x-cache
HIT
status
200
strict-transport-security
max-age=631138519
content-length
6839
x-response-time
22
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-connection-hash
2c6372f9e073b6f452e5319424501d3f
accept-ranges
bytes
expires
Tue, 10 Dec 2019 13:09:40 GMT
syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
ton.twimg.com/tfw/css/
44 KB
44 KB
Image
General
Full URL
https://ton.twimg.com/tfw/css/syndication_bundle_v1_73385286cca9d2256f6bf3993470820d4827b058.css
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?ver=20111117
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:134:1a0d:1429:742:782:b6 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/418C) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-ton-expected-size
45170
x-cache
HIT
status
200
strict-transport-security
max-age=631138519
content-length
6839
x-response-time
22
surrogate-key
tfw
last-modified
Tue, 14 May 2019 18:53:54 GMT
server
ECS (fcn/418C)
etag
"4mhImCFS9rptiUICNnLD1g=="
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-connection-hash
2c6372f9e073b6f452e5319424501d3f
accept-ranges
bytes
expires
Tue, 10 Dec 2019 13:09:40 GMT
truncated
/
825 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4468e35646c229b518e5f398c5a3d6b15ba1351a71ef22692129bb32f5030ac0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
572 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0341a4478ce861ef85c819b913fa0a2501836a6a2ffda8643e95e39f4a2a7de0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
512 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49c2a3cf0f363bf387c06a35a4a4e6c7255799b3776bed55914862136d783028

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
600 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c50a17e8272b9359e4b62e0f305e201f359cb5bd2245671c115d031f2b7f68d0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
323 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c3531ed2c934e5daee80955db42a0245d666131e6322c6ec6985992922520ab4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
jot.html
platform.twitter.com/ Frame B8EB
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?ver=20111117
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40FD) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
https://bgr.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 03 Dec 2019 13:09:40 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Tue, 26 Nov 2019 18:14:56 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40FD)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Tue, 03 Dec 2019 13:09:40 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Tue, 03 Dec 2019 13:09:40 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
6b254be1af95191670408b62a969d49b
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
104
x-transaction
005e6e99004d6004
x-tsa-request-body-time
0
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
vidget.js
libs.outbrain.com/vidget/
118 KB
29 KB
Script
General
Full URL
https://libs.outbrain.com/vidget/vidget.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.21.37.220 , France, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-21-37-220.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
961f74ce1068dbdb2726ee855ae0e9f397cccee3959f4bd28d8600690c6e883b

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
29324
Pragma
no-cache
Last-Modified
Tue, 03 Dec 2019 12:21:29 GMT
Server
Apache
ETag
"9168aa5bc1f436e3b482e5bc3e7df283:1575375689"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Tue, 03 Dec 2019 13:09:40 GMT
obPixelFrame.htm
widgets.outbrain.com/nanoWidget/externals/obPixelFrame/ Frame A1E4
0
0
Document
General
Full URL
https://widgets.outbrain.com/nanoWidget/externals/obPixelFrame/obPixelFrame.htm
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nanoWidget/104087/module/streamFeed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Accept-Encoding
gzip, deflate, br
Cookie
recs_9461f18da6dc280bd2574b66c166944c=0B2452185080A2466373904A2506454839A2410479620A2468240914A2192247209ACD1; obuid=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2; akacd_widgets_routing=3752831379~rv=52~id=f8844fece4686d218a73362e687bf539
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/

Response headers

Server
Apache
ETag
"06266b158cc1a0b89268d5a7103a27c4:1503211501"
Last-Modified
Sun, 20 Aug 2017 06:45:01 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
271
Cache-Control
max-age=604800
Date
Tue, 03 Dec 2019 13:09:40 GMT
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
get
mv.outbrain.com/Multivac/api/
20 KB
7 KB
Script
General
Full URL
https://mv.outbrain.com/Multivac/api/get?url=https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&version=104087&apv=true&sig=eP8TAoGJ&format=html&rand=29717&lsd=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2&lsdt=1575378580446&pdobuid=0&osLang=en-US&va=true&contxtKV=light-mode&cmpStat=1&srcUrl=https%3A%2F%2Fbgr.com%2Ffeed%2F&scrW=1600&scrH=1200&t=M2E1MjRiOGNjNjZhYjNmNDdmOGEyMTE4NDE1ZGNlNDc=&winW=1600&winH=1200&adblck=false&secured=true&feedIdx=0&lastIdx=1&lastCardIdx=0&fAB=9129-30825
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
52fcf05dffb280fe7db14d1c1eca207e61198078404ec9fce95b9edb872cec6c

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
traffic-path
NYDC1, JFK, FRA, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
7f2862e14184e307844ec1c13aa2a1b3
content-length
6638
x-served-by
cache-jfk8120-JFK, cache-fra19123-FRA
pragma
no-cache
x-timer
S1575378581.518397,VS0,VE174
vary
Accept-Encoding, User-Agent
content-type
application/json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.20
accept-ranges
bytes, bytes
x-cache-hits
0, 0
getDocFeatures
videoclientsservicescalls.outbrain.com/
265 B
504 B
Script
General
Full URL
https://videoclientsservicescalls.outbrain.com/getDocFeatures?docId=2523635548&pubId=7486&callback=OB_VidgetServiceCallBack0
Requested by
Host: libs.outbrain.com
URL: https://libs.outbrain.com/vidget/vidget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.63 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
4e5d587bc7595759277d2d66d775cad0ea1684d66a8e603f976b86b2c22d9c59

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Connection
close
ETag
W/"109-NPUAQAUpsKBvlUHazMJL51K/NPA"
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=6c5700f064af9e55574c5728fb3209f0_7486_1575378580521&tm=900&eT=6&wRV=104087&pVis=0&lsd=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?ver=5.3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.63 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
f0136a837bbec62c321ea318a8ff3bc6
Content-Length
30
jot
syndication.twitter.com/i/
43 B
121 B
Image
General
Full URL
https://syndication.twitter.com/i/jot?dnt=1&l=%7B%22widget_origin%22%3A%22https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F%22%2C%22widget_frame%22%3Afalse%2C%22widget_site_screen_name%22%3A%22BGR%22%2C%22widget_site_user_id%22%3A%2218131006%22%2C%22widget_creator_screen_name%22%3A%22chris_writes%22%2C%22items%22%3A%5B%7B%22card_name%22%3A%22summary_large_image%22%7D%5D%2C%22unbucketed%22%3Atrue%2C%22_category_%22%3A%22tfw_client_event%22%2C%22triggered_on%22%3A1575378580672%2C%22dnt%22%3Atrue%2C%22client_version%22%3A%22e286c10%3A1574786315929%22%2C%22format_version%22%3A2%2C%22event_namespace%22%3A%7B%22client%22%3A%22tfw%22%2C%22page%22%3A%22tweet%22%2C%22component%22%3A%22card%22%2C%22action%22%3A%22shown%22%7D%7D
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.136 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 13:09:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
65
x-xss-protection
0
x-response-time
110
pragma
no-cache
last-modified
Tue, 03 Dec 2019 13:09:40 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
6b254be1af95191670408b62a969d49b
x-transaction
005444d5002d3dbd
expires
Tue, 31 Mar 1981 05:00:00 GMT
NVPInjector.min.js
widgets.outbrain.com/nativeVideoPlayer/
13 KB
5 KB
Script
General
Full URL
https://widgets.outbrain.com/nativeVideoPlayer/NVPInjector.min.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
5579fa97c4852ac170b57f84f084571aee2968c4d69bbda5b23e7d657b52d032

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Last-Modified
Thu, 21 Nov 2019 10:04:36 GMT
Server
Apache
ETag
"0ac6f290999752f5346232aafe8d1c1a:1574333995"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
4741
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=ae2eb33e489beb5d79117c60c1673f23_7486_1575378580629&tm=1025&eT=0&widgetWidth=834&widgetHeight=319&widgetX=200&widgetY=3519&wRV=104087&pVis=1&lsd=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?ver=5.3
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.63 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

Date
Tue, 03 Dec 2019 13:09:41 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
ba969cb10fe309fa1bdd9a6bd69c4d99
Content-Length
30
eyJpdSI6ImEyYzAxNGViOGU2MTQ5MjJiNjQ5MjEwMDVlOWQzNTJjMWQyNmM3MzY3YzIyNTRiYzFjNmQyMzgwOTcxODYwZTkiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
34 KB
35 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImEyYzAxNGViOGU2MTQ5MjJiNjQ5MjEwMDVlOWQzNTJjMWQyNmM3MzY3YzIyNTRiYzFjNmQyMzgwOTcxODYwZTkiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.58.216.21 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
78e3a1739d1d69e251bbab9d68fd2211561e517621c5519c3710e5a4b2dae727
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 04:38:40 GMT
Date
Tue, 03 Dec 2019 13:09:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=556062
Connection
keep-alive
X-TraceId
29d30aa709d3d72be9ed94357090da44
Timing-Allow-Origin
*
Content-Length
35190
play_100x100.png
widgets.outbrain.com/images/widgetIcons/
9 KB
10 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/play_100x100.png
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Last-Modified
Mon, 25 Nov 2019 12:25:03 GMT
Server
Apache
ETag
"25a69b3019e3b959aef033482762080f:1574685768"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
9422
eyJpdSI6ImQwMTg1OTM5NDQ2ZmZjNzhkYThkYTJhZWM0ZmM2YmNiYTJkOTdjZmE4YTZkOGUzOGFhZTJkZjdkNGYxNjY1MDAiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
19 KB
19 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImQwMTg1OTM5NDQ2ZmZjNzhkYThkYTJhZWM0ZmM2YmNiYTJkOTdjZmE4YTZkOGUzOGFhZTJkZjdkNGYxNjY1MDAiLCJ3IjozMDAsImgiOjIwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: bgr.com
URL: https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.58.216.21 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
48de5c78c9165ec000e65dacd69aa5bbf6549910afa2cca201b3b9deea85ab7d
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 14 Nov 2019 13:50:33 GMT
Date
Tue, 03 Dec 2019 13:09:40 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=912099
Connection
keep-alive
X-TraceId
fc75538e01c2839907f87467b984c83f
Timing-Allow-Origin
*
Content-Length
19383
obp.min.js
libs.sphere.com/video/outbrain-player/current/
97 KB
21 KB
Script
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
fdc1eec8b56ab74403955adbde37c677b3b2320ff72aea0e4f182a048f76025e

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
20704
Pragma
no-cache
Last-Modified
Mon, 02 Dec 2019 11:28:43 GMT
Server
Apache
ETag
"9528243a072da72e1e6f6b6d798cd881:1575286123"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Tue, 03 Dec 2019 13:09:40 GMT
obp.min.css
libs.sphere.com/video/outbrain-player/current/
1 KB
1 KB
Stylesheet
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp.min.css
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1185ac7ee0922936a46115cf79bf1d9d704792bef6dc6dccf96215d874e9f706

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:40 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
470
Pragma
no-cache
Last-Modified
Mon, 02 Dec 2019 11:29:03 GMT
Server
Apache
ETag
"6990dba1bfaa593cddc30001b4d27ad4:1575286143"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Tue, 03 Dec 2019 13:09:40 GMT
/
aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/
43 B
245 B
Image
General
Full URL
https://aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/?assoc_payload=%7B%22destinationURL%22%3A%22https%3A%2F%2Fwww.amazon.com%2FCyber-Monday%2Fb%2F%3Fie%3DUTF8%26node%3D5550342011%26ref_%3Dnav_cs_cm%26tag%3Db0c55bfnav-20%22%2C%22slotNum%22%3A0%2C%22atfInFirstLoad%22%3Atrue%2C%22posX%22%3A192.5%2C%22posY%22%3A136%2C%22logType%22%3A%22onetag_textlink%22%2C%22assocPayloadId%22%3A%22QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw%22%2C%22linkCode%22%3A%22w61%22%2C%22trackingId%22%3A%22%22%2C%22refUrl%22%3A%22https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F%22%7D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
72.21.206.141 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
206-141.amazon.com
Software
Server /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:41 GMT
Server
Server
Vary
User-Agent
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
ir
ir-na.amazon-adsystem.com/e/
42 B
159 B
Image
General
Full URL
https://ir-na.amazon-adsystem.com/e/ir?l=w61&t=&o=1&cb=15753785809660
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.46.128.194 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
/
Resource Hash
47043e4823a6c21a8881de789b4185355330b5804629d23f6b43dd93f5265292

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Cache-Control
no-cache
Connection
close
Content-Length
42
Content-Type
image/gif
%7B%22adViewability%22:[%7B%22above_the_fold%22:true,%22topPos%22:192.5,%22leftPos%22:136,%22slotNum%22:0%7D]%7D&cb=1575378580966
aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/
43 B
245 B
Image
General
Full URL
https://aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/%7B%22adViewability%22:[%7B%22above_the_fold%22:true,%22topPos%22:192.5,%22leftPos%22:136,%22slotNum%22:0%7D]%7D&cb=1575378580966
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
72.21.206.141 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
206-141.amazon.com
Software
Server /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:41 GMT
Server
Server
Vary
User-Agent
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
/
aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/
43 B
245 B
Image
General
Full URL
https://aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/?assoc_payload=%7B%22destinationURL%22%3A%22https%3A%2F%2Fwww.amazon.com%2Fb%3Fie%3DUTF8%26node%3D384082011%26linkCode%3Dw61%26imprToken%3DGaHItRS9SP3ks8A8aSqL9g%26slotNum%3D2%26tag%3Db0c55-20%26tag%3Db0c55dntmss-20%22%2C%22slotNum%22%3A1%2C%22atfInFirstLoad%22%3Afalse%2C%22posX%22%3A192.5%2C%22posY%22%3A1140.203125%2C%22logType%22%3A%22onetag_textlink%22%2C%22oldLinkCode%22%3A%22w61%22%2C%22assocPayloadId%22%3A%22QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw%22%2C%22linkCode%22%3A%22w61%22%2C%22trackingId%22%3A%22%22%2C%22refUrl%22%3A%22https%3A%2F%2Fbgr.com%2F2019%2F11%2F20%2Fdisney-plus-login-hack-disney-security-breach-out-of-the-question%2F%22%7D
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
72.21.206.141 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
206-141.amazon.com
Software
Server /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:41 GMT
Server
Server
Vary
User-Agent
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
ir
ir-na.amazon-adsystem.com/e/
42 B
159 B
Image
General
Full URL
https://ir-na.amazon-adsystem.com/e/ir?l=w61&t=&o=1&cb=15753785809661
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.46.128.194 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
/
Resource Hash
47043e4823a6c21a8881de789b4185355330b5804629d23f6b43dd93f5265292

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Cache-Control
no-cache
Connection
close
Content-Length
42
Content-Type
image/gif
%7B%22adViewability%22:[%7B%22above_the_fold%22:false,%22topPos%22:192.5,%22leftPos%22:1140.203125,%22slotNum%22:1%7D]%7D&cb=1575378580966
aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/
43 B
245 B
Image
General
Full URL
https://aax-us-east.amazon-adsystem.com/x/px/QqtYgbS9C-L6513jPcHkcdcAAAFuy-FxJwEAAAFKAYJ23yw/%7B%22adViewability%22:[%7B%22above_the_fold%22:false,%22topPos%22:192.5,%22leftPos%22:1140.203125,%22slotNum%22:1%7D]%7D&cb=1575378580966
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
72.21.206.141 Ashburn, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
206-141.amazon.com
Software
Server /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:41 GMT
Server
Server
Vary
User-Agent
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Content-Length
43
jot.html
platform.twitter.com/ Frame F449
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js?ver=20111117
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:59:254c:406:2366:268c , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECS (fcn/40DC) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
Origin
https://bgr.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Tue, 03 Dec 2019 13:09:41 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Tue, 26 Nov 2019 18:14:56 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40DC)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Tue, 03 Dec 2019 13:09:41 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Tue, 03 Dec 2019 13:09:41 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
6b254be1af95191670408b62a969d49b
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
104
x-transaction
006292ce0005f54a
x-tsa-request-body-time
0
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
obp-slide-center.css
libs.sphere.com/video/outbrain-player/current/
717 B
836 B
XHR
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp-slide-center.css
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
76f037243db426f4e0d4e74c809969c610b4cab9555c2e14a4472a9f2c449366

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com

Response headers

Date
Tue, 03 Dec 2019 13:09:41 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
264
Pragma
no-cache
Last-Modified
Mon, 02 Dec 2019 11:30:05 GMT
Server
Apache
ETag
"73ca457e68e30047fdef6d92886f8b71:1575286205"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
text/css
Access-Control-Allow-Origin
https://bgr.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Tue, 03 Dec 2019 13:09:41 GMT
getCtwData
videoclientsservicescalls.outbrain.com/
974 B
731 B
Script
General
Full URL
https://videoclientsservicescalls.outbrain.com/getCtwData?adId=136172077&pubId=7486&ids={%22adId%22:136172077,%22sourceId%22:1580434,%22campaignId%22:1002331601,%22publisherId%22:7486,%22did%22:2523635548}&callback=OB_CtwClientCalls0
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.63 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
f3f1b23c2b4e91106cef7967155ee9b8647d3c0ae26371649f6ba46f5cf9f546

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Tue, 03 Dec 2019 13:09:41 GMT
Content-Encoding
gzip
Connection
close
ETag
W/"3ce-xeiPHuxLZ2Iuc+Tj9w9PIpLZcPk"
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
loader.gif
libs.sphere.com/video/outbrain-player/assets/
51 KB
51 KB
Image
General
Full URL
https://libs.sphere.com/video/outbrain-player/assets/loader.gif
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
d05d164843ec0e47ddf7fca61f0e4bed73c23280c7eeb0fd0e9dc0c618b8eb90

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:41 GMT
Last-Modified
Sun, 17 Dec 2017 09:28:08 GMT
Server
Apache
ETag
"c753233e9ae7214419baca2aedd1c4b9:1513502888"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
true
Connection
keep-alive
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Content-Length
52226
frame
vastcdn.outbrain.com/ Frame F779
0
0
Document
General
Full URL
https://vastcdn.outbrain.com/frame?h=https%3A%2F%2Fbgr.com&id=obe56331-e949-907e-df69-e15aebeca1c5&url=https%3A%2F%2Frtr.innovid.com%2Fr1.5d74ea88c29ad7.25687688%3FobOrigUrl%3Dtrue
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:10c:396::2a83 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Host
vastcdn.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Accept-Encoding
gzip, deflate, br
Cookie
obuid=72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2; recs_9461f18da6dc280bd2574b66c166944c=0B2452185080A2466373904A2506454839A2410479620A2468240914A2192247209AC2B2248449520A2363008964ACD1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/

Response headers

Content-Type
text/html; charset=utf-8
ETag
W/"1104-rZS0sng0PM08SFhRrVW5Q3wTzdo"
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Content-Length
1432
Vary
Accept-Encoding
Cache-Control
max-age=3600
Expires
Tue, 03 Dec 2019 14:09:41 GMT
Date
Tue, 03 Dec 2019 13:09:41 GMT
Connection
keep-alive
jsdiagnostic
pixel.adsafeprotected.com/
43 B
309 B
Image
General
Full URL
https://pixel.adsafeprotected.com/jsdiagnostic?code:pet_profile&anid:930203&sessionId:dd613d66-af81-f3f6-d60b-933ea4bd5f48&err:responsetime%3A116%26probability%3A10
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.166.0.26 , United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
anycast.pixel.adsafeprotected.com
Software
nginx /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 03 Dec 2019 13:09:41 GMT
X-Server-Name
app53ami.ami.303net.pvt
P3P
CP="COM NAV INT STA NID OUR IND NOI"
Cache-Control
no-cache
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Server
nginx
play_100x100.png
widgets.outbrain.com/images/widgetIcons/
9 KB
10 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/play_100x100.png
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
72.247.225.215 , United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a72-247-225-215.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:42 GMT
Last-Modified
Mon, 25 Nov 2019 12:25:03 GMT
Server
Apache
ETag
"25a69b3019e3b959aef033482762080f:1574685768"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
9422
vpt.js
static.vidazoo.com/basev/
39 KB
11 KB
Script
General
Full URL
https://static.vidazoo.com/basev/vpt.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
55cdfd50bae471e40c3cfc665c85a9a8d6df226240726bafa593c2b0e66453e2

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:46 GMT
Content-Encoding
gzip
Last-Modified
Thu, 28 Nov 2019 13:39:09 GMT
ETag
"1574948349"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=1769
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
10020
X-HW
1575378586.dop109.fr8.t,1575378586.cds010.fr8.shn,1575378586.cds010.fr8.c
json
server.vidazoo.com/campaigns/5a9ea5a0225f7d0004c70045/5ae0a5c0da5fdd00042f78f5/
0
411 B
XHR
General
Full URL
https://server.vidazoo.com/campaigns/5a9ea5a0225f7d0004c70045/5ae0a5c0da5fdd00042f78f5/json
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/vpt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.237.181.155 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-237-181-155.compute-1.amazonaws.com
Software
Cowboy /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://bgr.com
Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Access-Control-Request-Headers
content-type

Response headers

Date
Tue, 03 Dec 2019 13:09:47 GMT
Via
1.1 vegur
Server
Cowboy
Access-Control-Allow-Origin
https://bgr.com
Cache-Control
max-age=0, no-cache, must-revalidate, proxy-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
Origin, X-Requested-With, Content-Type, Accept, Authorization, Content-Range, Cache-Control
Content-Length
0
json
server.vidazoo.com/campaigns/5a9ea5a0225f7d0004c70045/5ae0a5c0da5fdd00042f78f5/
55 KB
29 KB
XHR
General
Full URL
https://server.vidazoo.com/campaigns/5a9ea5a0225f7d0004c70045/5ae0a5c0da5fdd00042f78f5/json
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.237.181.155 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-237-181-155.compute-1.amazonaws.com
Software
Cowboy /
Resource Hash
1f1f6b41ddf147c5bed4f4f5428b27639e3fdaf9a5a370dbd84b326e6eac59d8

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Origin
https://bgr.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-type
application/json; charset=UTF-8

Response headers

Date
Tue, 03 Dec 2019 13:09:47 GMT
Content-Encoding
gzip
Server
Cowboy
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://bgr.com
Cache-Control
max-age=0, no-cache, must-revalidate, proxy-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
Origin, X-Requested-With, Content-Type, Accept, Authorization, Content-Range, Cache-Control
Content-Length
29288
Via
1.1 vegur
sbt.js
static.vidazoo.com/basev/1.0.325/
522 KB
523 KB
Script
General
Full URL
https://static.vidazoo.com/basev/1.0.325/sbt.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
0393c885507221b7c36eadf639bf31e0f8718111e86d348077eef9c592757924

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:47 GMT
Last-Modified
Thu, 28 Nov 2019 13:29:15 GMT
ETag
"1574947755"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=1181
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
534531
X-HW
1575378586.dop109.fr8.t,1575378587.cds010.fr8.shn,1575378587.cds010.fr8.c
543394ea-8e7d-45cd-a3fc-f54106793030
https://bgr.com/
1 KB
0
Other
General
Full URL
blob:https://bgr.com/543394ea-8e7d-45cd-a3fc-f54106793030
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.325/sbt.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ee441245ef85f538030acf5e534d1cf2664c18289cec8cc0d84656ffb0e0a95d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
1205
6b47e08f-a412-40c1-8edd-62881cd8717c
https://bgr.com/
1 KB
0
Other
General
Full URL
blob:https://bgr.com/6b47e08f-a412-40c1-8edd-62881cd8717c
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.325/sbt.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8e920612ce29a3290fc2edbaab7647470f21dda35cc1a350f9b8b362fc4d3ebe

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
1515
outbrain.js
static.vidazoo.com/basev/skins/outbrain/
65 KB
20 KB
Script
General
Full URL
https://static.vidazoo.com/basev/skins/outbrain/outbrain.js
Requested by
Host: tagan.adlightning.com
URL: https://tagan.adlightning.com/penske/op.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
f2c6f9907e20169810b6f6261e56bdb6cd8aa71f65856ab1dec34c826f5169da

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:47 GMT
Content-Encoding
gzip
Last-Modified
Thu, 28 Nov 2019 12:49:01 GMT
ETag
"1574945341"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=3841
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
19041
X-HW
1575378587.dop135.fr8.shc,1575378587.dop135.fr8.t,1575378587.cds059.fr8.c
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
2 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c27b11a4844614f6d6e987fa8f18ff24e12f59abe2972869509f57f92bdac135

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Origin
https://bgr.com

Response headers

Content-Type
application/x-font-ttf;charset=utf-8
prebid.js
static.vidazoo.com/basev/prebid/ Frame 3385
251 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.325/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d17e3d8102a8180bed346a08cc4a7106c8c0e2788c95a2f8f4cd189e380a52a1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 13:09:48 GMT
Content-Encoding
gzip
Last-Modified
Thu, 14 Nov 2019 16:30:16 GMT
ETag
"1573749016"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=86400
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
81156
X-HW
1575378587.dop135.fr8.shc,1575378587.dop135.fr8.t,1575378588.cds059.fr8.c
5a9fcd5bfe8d0f00047aaceb.mp4
inventory.vidazoo.com/5a9ea5a0225f7d0004c70045/5a9fcd5bfe8d0f00047aaceb/
6 KB
7 KB
Media
General
Full URL
https://inventory.vidazoo.com/5a9ea5a0225f7d0004c70045/5a9fcd5bfe8d0f00047aaceb/5a9fcd5bfe8d0f00047aaceb.mp4
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
dbeb404d326e6051a0182a90d654ea370f8c1ed0684f523c1f722447787d56d6

Request headers

Referer
https://bgr.com/2019/11/20/disney-plus-login-hack-disney-security-breach-out-of-the-question/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Range
bytes=0-

Response headers

Date
Tue, 03 Dec 2019 13:09:48 GMT
Content-Range
bytes 0-5955/5956
Last-Modified
Wed, 07 Mar 2018 11:30:44 GMT
ETag
"1520422244"
X-HW
1575378588.dop129.fr8.t,1575378588.cds054.fr8.shn,1575378588.cds054.fr8.c
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
public, max-age=86400
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
video/mp4
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
5956

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
d3ezl4ajpp2zy8.cloudfront.net
URL
https://d3ezl4ajpp2zy8.cloudfront.net/theinternetworksltd-technology_tag.js

Verdicts & Comments Add Verdict or Comment

259 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| hj object| _hjSettings object| apstag object| googleImaVansAdapter object| _comscore function| qp function| fbq function| _fbq object| dataLayer object| pmc_meta object| d string| expires string| path string| domain object| pmc_cookies function| addLoadEvent object| _wpemojiSettings object| pmc boolean| pmc_do_analytics_pagecount object| pmc_common_urls function| loadGA string| GoogleAnalyticsObject function| ga object| pmc_apstag object| NO_JQUERY object| wpcom_mobile_user_agent_info object| fixto function| add_filter function| apply_filters undefined| $ function| jQuery function| pm object| jQuery1124009658349413281564 object| Jetpack function| Frisbee function| jQueryBridget function| EvEmitter function| matchesSelector object| fizzyUIUtils function| InfiniteScroll function| imagesLoaded object| diagPixSentCodes object| __iasPET object| jwDefaults object| webpackJsonpjwplayer function| jwplayer object| ajax object| pmc_adm_config object| pmc_header_bidder function| get_query_params function| pmc_adm_check_cmp object| pmc_adm_boomerang number| pmc_adm_cmp_interval number| pmc_adm_cmp_interval_tries object| pmc_adm_doubleclick object| googletag object| pmc_adm_gpt object| pmc_dfp_skin object| pmc_admanager object| pmc_dfp_prestitial object| pmc_floating_preroll_ads object| pmc_adm_ias function| pmcjwplayer object| BGR object| sbjs function| AdLoader function| rotateAd function| pmc_add_index_wrapper_script object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| pmc_site_config string| pmc_tracking_url object| pmc_tracking_image object| pmc_krux string| bgrOutbrainTemplate string| OB_ContextKeyValue function| mediaconductor object| pmc_video_player_event_tracking object| twttr function| global_urlhashchanged function| amazon_assoc_ir_f_call_associates_ads function| amazon_assoc_ir_f_call function| amazon_assoc_ir_call function| amzn_assoc_ad_spec_type object| amzn_assoc_ad_spec object| amzn_assoc_ad_async_spec object| adUnitDeliveryNetwork object| slotCounter function| cmManager object| amzn_assoc_cm boolean| amzn_assoc_enable_abs object| amzn_assoc_internal_params function| assocUtilsMaker object| amzn_assoc_utils object| amzn_assoc_ad function| amzn_assoc_jsonp_callback_adunit_0 function| amzn_assoc_client_cb_0 object| __SKIM_JS_GLOBAL__ object| skimlinksAPI function| setUpAgknTag object| _qevents function| hex_md5 function| b64_md5 function| str_md5 function| hex_hmac_md5 function| b64_hmac_md5 function| str_hmac_md5 function| md5_vm_test function| core_md5 function| md5_cmn function| md5_ff function| md5_gg function| md5_hh function| md5_ii function| core_hmac_md5 function| safe_add function| bit_rol function| str2binl function| binl2str function| binl2hex function| binl2b64 object| Gravatar object| GProfile number| hexcase string| b64pad number| chrsz object| WPGroHo object| jetpackLikesWidgetQueue object| jetpackLikesWidgetBatch boolean| jetpackLikesMasterReady function| JetpackLikespostMessage function| JetpackLikesBatchHandler function| JetpackLikesMessageListener function| JetpackLikesWidgetQueueHandler object| __twttrll object| __twttr object| krux_event_pixels object| pmc_ga_event_tracking object| pmc_video_player_ads object| wpcomVipAnalytics string| cmp_init_params object| pmc_krux_gallery_view_triggered object| pmc_contextual_player object| pmc_gdpr_elem object| pmc_gdpr_scpt function| _ function| __cmp function| st_vt object| _tkq object| _stq string| mobileStatsQueryString object| AC_0xc73c function| AC_0x52e5 object| xop function| 2pkv9xhkcg0 boolean| vjk7ey1xlog object| 69h0d6c17uo function| handle_apstag_video_bid function| build_apstag_video_tag function| apstag_refresh_bids object| ad_Iframe_div object| BGRPageAdSlots string| new_css object| pmc_video_ads boolean| apstagLOADED object| hjSiteSettings function| hjBootstrap object| hjBootstrapCalled function| st_go function| ex_go function| re_go function| linktracker_init object| wpcom object| twemoji object| wp function| agknTagBuilder object| _agknTag string| _agknTagName object| _agknEchoTag number| _isAgknTagSet function| udm_ object| ns_p object| COMSCORE object| google_tag_manager object| qevents object| _mag function| polartag object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater number| google_srt undefined| google_measure_js_timing object| filters string| key boolean| google_noFetch number| __google_ad_urls_id object| gapi object| ___jsl function| quantserve function| __qc object| ezt object| _qoptions object| gM_0xf849 function| gM_0x53ba function| xblacklist object| h8_0x55c8 function| h8_0x1e4e function| xblocker object| gadgets object| osapi object| shindig object| iframer function| ToolbarApi object| iframes function| IframeBase function| Iframe function| IframeProxy function| IframeWindow object| __gapi_jstiming__ function| trackingUtils function| elemTracker object| amznAutoTagger object| linkProperties function| __cmpui object| BGRAdSlots function| setImmediate function| clearImmediate function| UUIDv1 function| clamp object| STR undefined| UUID object| Audit object| OB_PROXY string| VIDGET_VERSION function| OB_VidgetServiceCallBack number| vidgetServiceInstance function| OB_VidgetServiceCallBack0 object| OB_VIDGET object| NVPInjector function| _extends function| _typeof function| _createClass function| _classCallCheck function| OB_VidgetAuditCallback number| ServiceCallbackInstance function| OB_CtwClientCalls0 object| vdz function| webpackJsonpbw1bdjqbdmg8 object| platform object| vidazoo object| Vidiazoo

5 Cookies

Domain/Path Name / Value
widgets.outbrain.com/ Name: akacd_widgets_routing
Value: 3752831379~rv=52~id=f8844fece4686d218a73362e687bf539
.outbrain.com/ Name: recs_9461f18da6dc280bd2574b66c166944c
Value: 0B2452185080A2466373904A2506454839A2410479620A2468240914A2192247209AC2B2248449520A2363008964ACD1
.outbrain.com/ Name: obuid
Value: 72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2
.bgr.com/ Name: OB-USER-TOKEN
Value: 72d7fe5b-b07b-47a9-a7fb-9efdb108e9a2
.bgr.com/ Name: _fbp
Value: fb.1.1575378580349.643587180

3 Console Messages

Source Level URL
Text
console-api log URL: https://s0.wp.com/_static/??-eJyVkttOwzAMhl+INEOCAReIZ3EzN3WbE7HbwZ6erFqlFaqtSJESO59/HxJ9TIqCccMBWXdlfQ6Yvy9b1fGDvgUoTzaDYOUpzLCJQTDImU2RxSMzWFy59bEmh2pgzAUIUtI0cYVblkRhJDzexTqUBKZXGZlOf7JLi6UuPVLSyRuV3GAp8HS2LtbgVDMEIxTD1PPZ38bY8z90wMMpBgWJBawGZpRJa+Ffm9sNzSYT14hXahfPHZ3a5qsYRsim3YxvaX4ZUWaeyuRoREVNhgJtC3VUz/+qoS+J81tOxnaJ8o0okKBik6Nzv+0q9fZQ1D78++Pzy27/tHt923c//jEjgQ==(Line 8)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1
console-api warning URL: https://static.quantcast.mgr.consensu.org/v27/cmpui-popup.js(Line 1)
Message:
Unable to get NonIab Vendor list.
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy upgrade-insecure-requests

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0.gravatar.com
a.quora.com
aax-us-east.amazon-adsystem.com
adservice.google.com
adservice.google.de
api.quantcast.mgr.consensu.org
api.skimlinks.mgr.consensu.org
apis.google.com
audit.quantcast.mgr.consensu.org
bgr.com
boygeniusreport.files.wordpress.com
c.amazon-adsystem.com
cdn.adsafeprotected.com
cdn.syndication.twimg.com
connect.facebook.net
content.jwplatform.com
d.agkn.com
d3ezl4ajpp2zy8.cloudfront.net
fls-na.amazon-adsystem.com
fonts.googleapis.com
images.outbrainimg.com
inventory.vidazoo.com
ir-na.amazon-adsystem.com
js.agkn.com
libs.outbrain.com
libs.sphere.com
loadeu.exelator.com
log.outbrainimg.com
mcdp-nydc1.outbrain.com
mv.outbrain.com
native.sharethrough.com
odb.outbrain.com
p.skimresources.com
pbs.twimg.com
pixel.adsafeprotected.com
pixel.wp.com
platform.twitter.com
plugin.mediavoice.com
pmccorp2.files.wordpress.com
polarcdn-terrax.com
q.quora.com
quantcast.mgr.consensu.org
r-login.wordpress.com
r.skimresources.com
rules.quantcount.com
s.skimresources.com
s0.wp.com
s1.wp.com
s2.wp.com
s3.amazonaws.com
sb.scorecardresearch.com
script.crazyegg.com
script.hotjar.com
secure-us.imrworldwide.com
secure.quantserve.com
securepubads.g.doubleclick.net
server.vidazoo.com
static.adsafeprotected.com
static.hotjar.com
static.quantcast.mgr.consensu.org
static.vidazoo.com
stats.wp.com
sync.crwdcntrl.net
syndication.twitter.com
t.skimresources.com
tagan.adlightning.com
tcheck.outbrainimg.com
ton.twimg.com
vars.hotjar.com
vastcdn.outbrain.com
vendorlist.consensu.org
videoclientsservicescalls.outbrain.com
widgets.outbrain.com
www.facebook.com
www.googletagmanager.com
x.skimresources.com
z-na.amazon-adsystem.com
d3ezl4ajpp2zy8.cloudfront.net
104.244.42.136
13.225.77.205
13.225.78.107
13.225.86.250
143.204.101.113
143.204.101.58
143.204.101.95
147.75.102.200
147.75.32.75
147.75.84.181
147.75.85.25
151.101.13.2
151.101.14.2
151.139.128.10
172.217.16.162
184.31.90.250
192.0.72.19
192.0.72.24
192.0.76.3
192.0.77.32
192.0.78.19
192.0.79.32
199.166.0.26
199.166.0.32
2.21.37.220
23.5.97.37
23.58.216.21
2600:9000:20eb:2800:9:46dc:4700:93a1
2600:9000:20eb:8a00:15:efbc:e300:93a1
2600:9000:2156:6800:1:a3fa:7cc0:93a1
2600:9000:21f3:4a00:19:fc2c:a140:93a1
2600:9000:21f3:6200:1:af78:4c0:93a1
2600:9000:21f3:6400:9:46dc:4700:93a1
2600:9000:21f3:7e00:6:44e3:f8c0:93a1
2606:2800:134:1a0d:1429:742:782:b6
2606:2800:134:fa2:1627:1fe:edb:1665
2606:2800:234:59:254c:406:2366:268c
2606:4700::6811:4132
2606:4700::6813:9408
2606:4700::6813:d983
2a00:1450:4001:800::2002
2a00:1450:4001:800::200e
2a00:1450:4001:81b::2002
2a00:1450:4001:820::200a
2a00:1450:4001:821::2008
2a02:26f0:10c:396::2a83
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a04:fa87:fffe::c000:4902
34.237.181.155
34.246.122.148
35.190.40.172
35.190.59.101
35.201.67.47
52.216.129.109
52.46.128.194
52.49.19.196
52.72.234.232
52.94.237.66
63.33.115.128
64.202.112.31
69.16.175.10
69.16.175.42
70.42.32.63
72.21.206.141
72.247.225.215
72.247.226.107
91.228.74.245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