Submitted URL: http://401trg.pw/large_scale_ircbot_infection_attempts
Effective URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Submission: On May 15 via manual from US

Summary

This website contacted 6 IPs in 1 countries across 6 domains to perform 28 HTTP transactions. The main IP is 190.93.244.35, located in San Jose, United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is 401trg.pw.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on April 14th 2018. Valid for: 6 months.
This is the only time 401trg.pw was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 190.93.245.35 13335 (CLOUDFLAR...)
18 190.93.244.35 13335 (CLOUDFLAR...)
1 172.217.16.202 15169 (GOOGLE)
1 172.217.21.200 15169 (GOOGLE)
4 172.217.21.195 15169 (GOOGLE)
1 141.101.114.35 13335 (CLOUDFLAR...)
3 172.217.21.238 15169 (GOOGLE)
28 6
Domain Requested by
19 401trg.pw 1 redirects 401trg.pw
4 fonts.gstatic.com 401trg.pw
3 www.google-analytics.com www.googletagmanager.com
1 protectwise-401trg.ghost.io 401trg.pw
1 www.googletagmanager.com 401trg.pw
1 fonts.googleapis.com 401trg.pw
28 6
Subject Issuer Validity Valid
sni37773.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-04-14 -
2018-10-21
6 months crt.sh

This page contains 1 frames:

Primary Page: https://401trg.pw/large_scale_ircbot_infection_attempts/
Frame ID: 2C7DFC865D71C2A84EAF3D748C322EEC
Requests: 28 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://401trg.pw/large_scale_ircbot_infection_attempts HTTP 301
    https://401trg.pw/large_scale_ircbot_infection_attempts/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • meta generator /Ghost(?:\s([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • meta generator /Ghost(?:\s([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Overall confidence: 100%
Detected patterns
  • env /^google_tag_manager$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

28
Requests

64 %
HTTPS

0 %
IPv6

6
Domains

6
Subdomains

6
IPs

1
Countries

2252 kB
Transfer

2903 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://401trg.pw/large_scale_ircbot_infection_attempts HTTP 301
    https://401trg.pw/large_scale_ircbot_infection_attempts/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

28 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
401trg.pw/large_scale_ircbot_infection_attempts/
Redirect Chain
  • http://401trg.pw/large_scale_ircbot_infection_attempts
  • https://401trg.pw/large_scale_ircbot_infection_attempts/
28 KB
8 KB
Document
General
Full URL
https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
c3e3a05174610b0b2f0dd37205496a4a9b37d3423516fe2cb1d4e6699526cfbe

Request headers

:method
GET
:authority
401trg.pw
:scheme
https
:path
/large_scale_ircbot_infection_attempts/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
2C7DFC865D71C2A84EAF3D748C322EEC

Response headers

status
200 200 OK
date
Tue, 15 May 2018 13:58:31 GMT
content-type
text/html; charset=utf-8
cache-control
public, max-age=0
cf-railgun
bcc876e1d6 stream 0.000000 0210 e6be
last-modified
Tue, 15 May 2018 14:47:48 GMT
vary
Accept-Encoding
x-ghost-cache-status
From Cache
x-powered-by
Express,Phusion Passenger 5.2.3
x-request-id
9e03e6edf2a6e7b6003ae07acacb596a
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
41b61eb089f364cf-FRA
content-encoding
gzip

Redirect headers

Date
Tue, 15 May 2018 13:58:31 GMT
Content-Type
text/html; charset=utf-8
Content-Length
168
Connection
keep-alive
Set-Cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711; expires=Wed, 15-May-19 13:58:31 GMT; path=/; domain=.401trg.pw; HttpOnly
Cache-Control
public, max-age=31536000
Cf-Railgun
8fe73f3ea7 stream 0.000000 0200 e6be
Last-Modified
Tue, 15 May 2018 14:58:31 GMT
Location
https://401trg.pw/large_scale_ircbot_infection_attempts/
Status
301 Moved Permanently
Vary
Accept, Accept-Encoding
X-Ghost-Cache-Status
From Backend - Cached
X-Powered-By
Express,Phusion Passenger 5.2.3
X-Request-Id
8654d1e96c84c13b981a25b39d619325
Server
cloudflare
CF-RAY
41b61eaff7e796dc-FRA
styles.min.css
401trg.pw/assets/css/
118 KB
22 KB
Stylesheet
General
Full URL
https://401trg.pw/assets/css/styles.min.css?v=7adbb0325d
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
fb0d0cc4c156ac9be2b02558b83d1cc1c3b2ff898135a81f4c82de627fc95147

Request headers

:path
/assets/css/styles.min.css?v=7adbb0325d
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 09 May 2018 16:43:45 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=UTF-8
status
200 200 OK
x-ghost-cache-status
From Cache
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea4d64cf-FRA
x-request-id
5fd9039fb1c58ad4728f8b956c1ed2fc
expires
Wed, 15 May 2019 13:58:31 GMT
vendors.min.css
401trg.pw/assets/css/
15 KB
3 KB
Stylesheet
General
Full URL
https://401trg.pw/assets/css/vendors.min.css?v=7adbb0325d
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
18ab41f7bec11dcbec81224e3892c94bf5254e4f8d552ccace0b047fef3a6875

Request headers

:path
/assets/css/vendors.min.css?v=7adbb0325d
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 09 May 2018 16:43:45 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css; charset=UTF-8
status
200 200 OK
x-ghost-cache-status
From Cache
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea4f64cf-FRA
x-request-id
6954c9f33e223874fcc44d1f39f4cf32
expires
Wed, 15 May 2019 13:58:31 GMT
css
fonts.googleapis.com/
1 KB
418 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Montserrat:400,400i,500,700,700i
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
SPDY
Server
172.217.16.202 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s08-in-f202.1e100.net
Software
ESF /
Resource Hash
5cd41d18ec8d397ae94ebd370db9b5157cc2987fcd4a3e0f518eb23255ffac43
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
content-encoding
gzip
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
x-xss-protection
1; mode=block
expires
Tue, 15 May 2018 13:58:31 GMT
ghost-sdk.min.js
401trg.pw/public/
763 B
574 B
Script
General
Full URL
https://401trg.pw/public/ghost-sdk.min.js?v=7adbb0325d
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
549c3c8332e8441a42d28a390c84d7d58743fb2c76698c6c7b2adce4b7e1f292

Request headers

:path
/public/ghost-sdk.min.js?v=7adbb0325d
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 09 May 2018 16:43:45 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200 200 OK
x-ghost-cache-status
From Cache
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5064cf-FRA
x-request-id
facd71a314a7f3af0d8d81dcf9fae3e0
expires
Wed, 15 May 2019 13:58:31 GMT
js
www.googletagmanager.com/gtag/
64 KB
22 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-106829284-1
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
SPDY
Server
172.217.21.200 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s12-in-f8.1e100.net
Software
Google Tag Manager (scaffolding) /
Resource Hash
9934bdc4b0d4bb98887d7f8f2f7d0fcbc484f768de1f8f631911f1a059fc592a
Security Headers
Name Value
X-Xss-Protection 1; mode=block

Request headers

Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
content-encoding
gzip
server
Google Tag Manager (scaffolding)
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
22863
x-xss-protection
1; mode=block
expires
Tue, 15 May 2018 13:58:31 GMT
401trg_large_dark.png
401trg.pw/content/images/2017/10/
57 KB
57 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/401trg_large_dark.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.1.12
Resource Hash
bc3b708d034e0b2175cef2de23b7224c13128b8d0b38c3522c2f5edfca41507d

Request headers

:path
/content/images/2017/10/401trg_large_dark.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Fri, 30 Mar 2018 20:55:26 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.1.12
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Cache
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5164cf-FRA
x-request-id
9c078028151c192a0aeb01571aa7aa15
expires
Wed, 15 May 2019 13:58:31 GMT
1.png
401trg.pw/content/images/2017/10/
191 KB
192 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/1.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
d16f7620a32eece9b59413d82c0ca8d2881f187390981b53115e273639518c57

Request headers

:path
/content/images/2017/10/1.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5264cf-FRA
x-request-id
6b2551c9db00cb6da6c884ba698ea581
expires
Wed, 15 May 2019 13:58:31 GMT
2-2.png
401trg.pw/content/images/2017/10/
81 KB
81 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/2-2.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
61d2481315fe084a2b63db34611b0531bcf37d0f51cddc5a1504f0b76782b401

Request headers

:path
/content/images/2017/10/2-2.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5364cf-FRA
x-request-id
875fa38fa39c382b43ed388e1f7b329f
expires
Wed, 15 May 2019 13:58:31 GMT
3-1.png
401trg.pw/content/images/2017/10/
102 KB
102 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/3-1.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
37e8f50f809595fe50bfbd1a69cedb83b72f5dee6d5bb01f94b1b6e8bea19220

Request headers

:path
/content/images/2017/10/3-1.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5864cf-FRA
x-request-id
644305c36cb531ca5b8cfb1700707c4a
expires
Wed, 15 May 2019 13:58:31 GMT
4-1.png
401trg.pw/content/images/2017/10/
171 KB
171 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/4-1.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
bb26c368923bcf3175af27963a4e5cf3995c9270b1efda60bb0c1e8e6b7b9003

Request headers

:path
/content/images/2017/10/4-1.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5964cf-FRA
x-request-id
c7d1d9e235c3a8518217e273fa4f3164
expires
Wed, 15 May 2019 13:58:31 GMT
5-1.png
401trg.pw/content/images/2017/10/
206 KB
207 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/5-1.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
dcbc64695667bdcb4d14f238407138ef33d6ad13bac426d33424737f3b703b1c

Request headers

:path
/content/images/2017/10/5-1.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5a64cf-FRA
x-request-id
625da9e9a98f7c7084e2756bd525bc2c
expires
Wed, 15 May 2019 13:58:31 GMT
6-2.png
401trg.pw/content/images/2017/10/
176 KB
176 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/6-2.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
54ead44b6ba375de95b097db822095ee956cdeb94ab811343c86fe4e7de23b55

Request headers

:path
/content/images/2017/10/6-2.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5b64cf-FRA
x-request-id
fb236084db14f543e5c0c3512bee5077
expires
Wed, 15 May 2019 13:58:31 GMT
7-1.png
401trg.pw/content/images/2017/10/
352 KB
352 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/7-1.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
f4bbdf59b4a89b1516e76312df316749a70ca14aed0942d1932cbf6a8e90e440

Request headers

:path
/content/images/2017/10/7-1.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5c64cf-FRA
x-request-id
e694b0f8eb6dd7463b86d7bedccde203
expires
Wed, 15 May 2019 13:58:31 GMT
8.png
401trg.pw/content/images/2017/10/
173 KB
173 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/8.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
97322208e6494e95c1d7aa276f5acf135aecaa7df4e18430c07620c7b4c9e634

Request headers

:path
/content/images/2017/10/8.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5e64cf-FRA
x-request-id
d6ee26a9ddd2e07e4529f8d24a658b02
expires
Wed, 15 May 2019 13:58:31 GMT
9.png
401trg.pw/content/images/2017/10/
350 KB
350 KB
Image
General
Full URL
https://401trg.pw/content/images/2017/10/9.png
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
d48de89b26c62fe07ddb19e30b2b7438f0adf129393ee1d2b1b0b1b165765960

Request headers

:path
/content/images/2017/10/9.png
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Sun, 13 May 2018 06:12:29 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea6364cf-FRA
x-request-id
6975d3ac2cf376023a4b438f34383913
expires
Wed, 15 May 2019 13:58:31 GMT
vendors.min.js
401trg.pw/assets/js/
332 KB
90 KB
Script
General
Full URL
https://401trg.pw/assets/js/vendors.min.js?v=7adbb0325d
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
824abdffc4d69f4154d48489f39c32fef7e8109d622a07d975450e0200bff72c

Request headers

:path
/assets/js/vendors.min.js?v=7adbb0325d
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 09 May 2018 16:43:45 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200 200 OK
x-ghost-cache-status
From Cache
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5664cf-FRA
x-request-id
eb127ad087be22218c103c0bb250e23e
expires
Wed, 15 May 2019 13:58:31 GMT
main.min.js
401trg.pw/assets/js/
2 KB
1 KB
Script
General
Full URL
https://401trg.pw/assets/js/main.min.js?v=7adbb0325d
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
2b5a4399e1f0b331e31017bcfbe5c8b5e09861402ea233273e5bddcec0eb976d

Request headers

:path
/assets/js/main.min.js?v=7adbb0325d
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 09 May 2018 16:43:45 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200 200 OK
x-ghost-cache-status
From Cache
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea5764cf-FRA
x-request-id
217b3ba7f8534d43aefc890d0c1d8f59
expires
Wed, 15 May 2019 13:58:31 GMT
prism.min.js
401trg.pw/assets/js/
17 KB
7 KB
Script
General
Full URL
https://401trg.pw/assets/js/prism.min.js?v=7adbb0325d
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
b5cb184c3e8093cf7825531764e7a9eabb0ca69065f785578e1202387baf2530

Request headers

:path
/assets/js/prism.min.js?v=7adbb0325d
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
:scheme
https
:method
GET
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Wed, 09 May 2018 16:43:45 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200 200 OK
x-ghost-cache-status
From Cache
cache-control
public, max-age=31536000
cf-ray
41b61eb0ea6464cf-FRA
x-request-id
bdc4229db7c2777e2de80f65d49c0475
expires
Wed, 15 May 2019 13:58:31 GMT
fontawesome-webfont.woff2
401trg.pw/assets/fonts/
75 KB
76 KB
Font
General
Full URL
https://401trg.pw/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
190.93.244.35 San Jose, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
cf-190-93-244-35.cloudflare.com
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe

Request headers

:path
/assets/fonts/fontawesome-webfont.woff2?v=4.7.0
pragma
no-cache
cookie
__cfduid=dbe14e69109d209f401502bba9a44ed2f1526392711
origin
https://401trg.pw
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
401trg.pw
referer
https://401trg.pw/assets/css/styles.min.css?v=7adbb0325d
:scheme
https
:method
GET
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://401trg.pw/assets/css/styles.min.css?v=7adbb0325d
Origin
https://401trg.pw

Response headers

date
Tue, 15 May 2018 13:58:31 GMT
cf-cache-status
HIT
last-modified
Tue, 01 May 2018 23:54:19 GMT
server
cloudflare
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/font-woff2
status
200 200 OK
x-ghost-cache-status
From Backend - Cached
cache-control
public, max-age=31536000
cf-ray
41b61eb1cb3664cf-FRA
x-request-id
52e005840e1bb8b72bc50d07b0484684
expires
Wed, 15 May 2019 13:58:31 GMT
JTUSjIg1_i6t8kCHKm459Wlhzg.ttf
fonts.gstatic.com/s/montserrat/v12/
44 KB
23 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v12/JTUSjIg1_i6t8kCHKm459Wlhzg.ttf
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
SPDY
Server
172.217.21.195 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s12-in-f195.1e100.net
Software
sffe /
Resource Hash
66dc995d8af6f17d9e3931e5de51ef935684a6cbf609a2284d723292676802c0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Montserrat:400,400i,500,700,700i
Origin
https://401trg.pw

Response headers

date
Thu, 08 Feb 2018 19:13:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
8275523
status
200
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
23546
x-xss-protection
1; mode=block
last-modified
Tue, 07 Nov 2017 15:24:32 GMT
server
sffe
vary
Accept-Encoding
content-type
font/ttf
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 08 Feb 2019 19:13:08 GMT
JTURjIg1_i6t8kCHKm45_dJE3gnD-w.ttf
fonts.gstatic.com/s/montserrat/v12/
45 KB
23 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v12/JTURjIg1_i6t8kCHKm45_dJE3gnD-w.ttf
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
SPDY
Server
172.217.21.195 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s12-in-f195.1e100.net
Software
sffe /
Resource Hash
7efbd86cc7b38ff4073967d7ec290934fc421eb2ed25ed3ec1592d79826e610c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Montserrat:400,400i,500,700,700i
Origin
https://401trg.pw

Response headers

date
Mon, 09 Apr 2018 21:01:19 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
3085032
status
200
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
23885
x-xss-protection
1; mode=block
last-modified
Tue, 07 Nov 2017 15:27:06 GMT
server
sffe
vary
Accept-Encoding
content-type
font/ttf
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 09 Apr 2019 21:01:19 GMT
JTUQjIg1_i6t8kCHKm459WxRyS7j.ttf
fonts.gstatic.com/s/montserrat/v12/
44 KB
24 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v12/JTUQjIg1_i6t8kCHKm459WxRyS7j.ttf
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
SPDY
Server
172.217.21.195 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s12-in-f195.1e100.net
Software
sffe /
Resource Hash
fb969deb8ac696f3d20af0a65ce6c4c4e0b15287f4298f44f91b72b1f55a9b0b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Montserrat:400,400i,500,700,700i
Origin
https://401trg.pw

Response headers

date
Mon, 12 Feb 2018 21:03:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
7923299
status
200
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
24218
x-xss-protection
1; mode=block
last-modified
Tue, 07 Nov 2017 15:24:27 GMT
server
sffe
vary
Accept-Encoding
content-type
font/ttf
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 12 Feb 2019 21:03:32 GMT
JTURjIg1_i6t8kCHKm45_ZpC3gnD-w.ttf
fonts.gstatic.com/s/montserrat/v12/
44 KB
23 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v12/JTURjIg1_i6t8kCHKm45_ZpC3gnD-w.ttf
Requested by
Host: 401trg.pw
URL: https://401trg.pw/large_scale_ircbot_infection_attempts/
Protocol
SPDY
Server
172.217.21.195 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s12-in-f195.1e100.net
Software
sffe /
Resource Hash
b128faf2db3afc5cda64e3a00f54dd96e2ebf5b7155c77086cbaec430d08bf2c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Montserrat:400,400i,500,700,700i
Origin
https://401trg.pw

Response headers

date
Mon, 12 Feb 2018 17:30:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
7936099
status
200
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
23587
x-xss-protection
1; mode=block
last-modified
Tue, 07 Nov 2017 15:24:12 GMT
server
sffe
vary
Accept-Encoding
content-type
font/ttf
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 12 Feb 2019 17:30:12 GMT
/
protectwise-401trg.ghost.io/ghost/api/v0.1/posts/
180 KB
53 KB
XHR
General
Full URL
https://protectwise-401trg.ghost.io/ghost/api/v0.1/posts/?limit=all&include=tags&client_id=ghost-frontend&client_secret=33c00364a977
Requested by
Host: 401trg.pw
URL: https://401trg.pw/assets/js/vendors.min.js?v=7adbb0325d
Protocol
SPDY
Server
141.101.114.35 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare / Express,Phusion Passenger 5.2.3
Resource Hash
c15474de07dfe732b561d95bb06c467e5aadc14e59261d0e898dda486f9cc53f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
Origin
https://401trg.pw

Response headers

cf-railgun
direct (starting new WAN connection)
date
Tue, 15 May 2018 13:58:32 GMT
content-encoding
gzip
last-modified
Tue, 15 May 2018 14:58:32 GMT
server
cloudflare
status
200, 200 OK
x-powered-by
Express,Phusion Passenger 5.2.3
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Origin, Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
https://401trg.pw
x-ghost-cache-status
From Backend - Not Cached
cache-control
no-cache, private, no-store, must-revalidate, max-stale=0, post-check=0, pre-check=0
cf-ray
41b61eb2dfe763e5-FRA
x-request-id
cd04c51afdd1e842410da2096841d77d
analytics.js
www.google-analytics.com/
34 KB
14 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-106829284-1
Protocol
SPDY
Server
172.217.21.238 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s13-in-f238.1e100.net
Software
Golfe2 /
Resource Hash
2218bbf47b340278b7b696dbe3af4eed89edffa709c19abd6747b18147c3a675
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 12 Apr 2018 18:13:11 GMT
server
Golfe2
age
4540
date
Tue, 15 May 2018 12:42:52 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
14353
expires
Tue, 15 May 2018 14:42:52 GMT
collect
www.google-analytics.com/r/
35 B
101 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j67&a=1033922937&t=pageview&_s=1&dl=https%3A%2F%2F401trg.pw%2Flarge_scale_ircbot_infection_attempts%2F&ul=en-us&de=UTF-8&dt=Large%20Scale%20IRCbot%20Infection%20Attempts&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAUAB~&jid=782978841&gjid=1204992330&cid=102013205.1526392712&tid=UA-106829284-1&_gid=70478242.1526392712&_r=1&gtm=u4r&z=884523040
Protocol
SPDY
Server
172.217.21.238 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s13-in-f238.1e100.net
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 15 May 2018 13:58:32 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
100 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j67&a=1033922937&t=pageview&_s=2&dl=https%3A%2F%2F401trg.pw%2Flarge_scale_ircbot_infection_attempts%2F&ul=en-us&de=UTF-8&dt=Large%20Scale%20IRCbot%20Infection%20Attempts&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IEBAAUAB~&jid=&gjid=&cid=102013205.1526392712&tid=UA-106829284-1&_gid=70478242.1526392712&gtm=u4r&z=1475935429
Protocol
SPDY
Server
172.217.21.238 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s13-in-f238.1e100.net
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://401trg.pw/large_scale_ircbot_infection_attempts/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 30 Apr 2018 21:47:23 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
1267869
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
hq=":443"; ma=2592000; quic=51303433; quic=51303432; quic=51303431; quic=51303339; quic=51303335,quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

30 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ghost function| gtag object| dataLayer function| Ajax function| pad function| formatDate function| GhostBot function| $ function| jQuery object| Foundation function| EvEmitter function| imagesLoaded function| jQueryBridget function| getSize function| matchesSelector object| fizzyUIUtils function| Outlayer function| Isotope function| Masonry function| WOW object| fluidvids string| j object| _self object| Prism object| google_tag_manager string| GoogleAnalyticsObject function| ga object| gaplugins object| gaGlobal object| gaData

1 Cookies

Domain/Path Name / Value
.401trg.pw/ Name: __cfduid
Value: dbe14e69109d209f401502bba9a44ed2f1526392711

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

401trg.pw
fonts.googleapis.com
fonts.gstatic.com
protectwise-401trg.ghost.io
www.google-analytics.com
www.googletagmanager.com
141.101.114.35
172.217.16.202
172.217.21.195
172.217.21.200
172.217.21.238
190.93.244.35
190.93.245.35
18ab41f7bec11dcbec81224e3892c94bf5254e4f8d552ccace0b047fef3a6875
2218bbf47b340278b7b696dbe3af4eed89edffa709c19abd6747b18147c3a675
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
2b5a4399e1f0b331e31017bcfbe5c8b5e09861402ea233273e5bddcec0eb976d
37e8f50f809595fe50bfbd1a69cedb83b72f5dee6d5bb01f94b1b6e8bea19220
549c3c8332e8441a42d28a390c84d7d58743fb2c76698c6c7b2adce4b7e1f292
54ead44b6ba375de95b097db822095ee956cdeb94ab811343c86fe4e7de23b55
5cd41d18ec8d397ae94ebd370db9b5157cc2987fcd4a3e0f518eb23255ffac43
61d2481315fe084a2b63db34611b0531bcf37d0f51cddc5a1504f0b76782b401
66dc995d8af6f17d9e3931e5de51ef935684a6cbf609a2284d723292676802c0
7efbd86cc7b38ff4073967d7ec290934fc421eb2ed25ed3ec1592d79826e610c
824abdffc4d69f4154d48489f39c32fef7e8109d622a07d975450e0200bff72c
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
97322208e6494e95c1d7aa276f5acf135aecaa7df4e18430c07620c7b4c9e634
9934bdc4b0d4bb98887d7f8f2f7d0fcbc484f768de1f8f631911f1a059fc592a
b128faf2db3afc5cda64e3a00f54dd96e2ebf5b7155c77086cbaec430d08bf2c
b5cb184c3e8093cf7825531764e7a9eabb0ca69065f785578e1202387baf2530
bb26c368923bcf3175af27963a4e5cf3995c9270b1efda60bb0c1e8e6b7b9003
bc3b708d034e0b2175cef2de23b7224c13128b8d0b38c3522c2f5edfca41507d
c15474de07dfe732b561d95bb06c467e5aadc14e59261d0e898dda486f9cc53f
c3e3a05174610b0b2f0dd37205496a4a9b37d3423516fe2cb1d4e6699526cfbe
d16f7620a32eece9b59413d82c0ca8d2881f187390981b53115e273639518c57
d48de89b26c62fe07ddb19e30b2b7438f0adf129393ee1d2b1b0b1b165765960
dcbc64695667bdcb4d14f238407138ef33d6ad13bac426d33424737f3b703b1c
f4bbdf59b4a89b1516e76312df316749a70ca14aed0942d1932cbf6a8e90e440
fb0d0cc4c156ac9be2b02558b83d1cc1c3b2ff898135a81f4c82de627fc95147
fb969deb8ac696f3d20af0a65ce6c4c4e0b15287f4298f44f91b72b1f55a9b0b