Submitted URL: http://ow.ly/i20M50onE7D
Effective URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winra...
Submission: On March 28 via manual from US

Summary

This website contacted 88 IPs in 6 countries across 58 domains to perform 249 HTTP transactions. The main IP is 50.31.169.131, located in Chicago, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 54.183.130.144 ()
1 50.31.169.131 23352 (SERVERCEN...)
18 205.234.175.175 30081 (CACHENETW...)
2 95.100.196.33 16625 (AKAMAI-AS)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
1 151.101.0.239 54113 (FASTLY)
1 95.100.198.179 16625 (AKAMAI-AS)
2 52.206.32.35 14618 (AMAZON-AES)
2 52.85.188.235 16509 (AMAZON-02)
1 3 52.213.58.51 16509 (AMAZON-02)
1 9 2a00:1450:400... 15169 (GOOGLE)
1 91.228.74.213 27281 (QUANTCAST)
1 46.228.164.13 56396 (TURN)
4 2a03:2880:f01... 32934 (FACEBOOK)
1 54.230.202.169 16509 (AMAZON-02)
1 35.190.92.63 15169 (GOOGLE)
1 52.32.108.251 16509 (AMAZON-02)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
3 52.3.171.116 14618 (AMAZON-AES)
1 2 104.103.89.123 16625 (AKAMAI-AS)
1 2 35.190.59.101 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
2 54.230.93.177 16509 (AMAZON-02)
2 54.230.95.153 16509 (AMAZON-02)
5 95.100.198.4 16625 (AKAMAI-AS)
1 52.210.6.215 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 54.230.95.20 16509 (AMAZON-02)
2 52.204.40.232 14618 (AMAZON-AES)
1 52.86.70.149 14618 (AMAZON-AES)
1 2a05:f500:10:... 14413 (LINKEDIN)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.6.60.254 14618 (AMAZON-AES)
2 52.44.76.10 14618 (AMAZON-AES)
2 54.174.217.231 14618 (AMAZON-AES)
15 52.2.117.76 14618 (AMAZON-AES)
2 216.137.61.155 16509 (AMAZON-02)
1 2600:9000:200... 16509 (AMAZON-02)
1 34.250.76.236 16509 (AMAZON-02)
2 63.140.41.50 15224 (OMNITURE)
1 1 66.117.28.86 ()
7 23.58.216.21 16625 (AKAMAI-AS)
8 23.36.208.73 16625 (AKAMAI-AS)
1 35.190.40.172 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
6 216.58.207.66 15169 (GOOGLE)
2 2 2a00:1450:400... ()
2 2 2a00:1450:400... ()
2 2a00:1450:400... 15169 (GOOGLE)
2 2606:4700::68... 13335 (CLOUDFLAR...)
2 2a03:2880:f11... 32934 (FACEBOOK)
1 64.74.236.19 22075 (AS-OUTBRAIN)
1 74.119.119.131 19750 (AS-CRITEO)
1 54.230.95.73 16509 (AMAZON-02)
1 34.193.122.206 14618 (AMAZON-AES)
2 3 52.49.216.17 16509 (AMAZON-02)
1 2600:9000:200... 16509 (AMAZON-02)
4 34.199.18.114 14618 (AMAZON-AES)
16 52.85.188.80 16509 (AMAZON-02)
2 35.201.67.47 15169 (GOOGLE)
1 2600:9000:200... 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
1 54.85.9.53 14618 (AMAZON-AES)
2 34.209.164.143 16509 (AMAZON-02)
2 2 185.33.223.209 ()
4 34.215.123.63 16509 (AMAZON-02)
2 2 172.217.22.34 ()
2 35.160.176.109 16509 (AMAZON-02)
2 2 185.64.189.110 ()
1 151.101.2.2 54113 (FASTLY)
1 54.230.95.26 16509 (AMAZON-02)
3 2a00:1450:400... 15169 (GOOGLE)
3 52.85.188.32 16509 (AMAZON-02)
1 52.85.188.140 16509 (AMAZON-02)
2 52.94.220.16 16509 (AMAZON-02)
6 213.19.162.61 26667 (RUBICONPR...)
8 20 152.195.39.114 15133 (EDGECAST)
10 54.165.0.24 14618 (AMAZON-AES)
3 2a00:1450:400... 15169 (GOOGLE)
4 95.100.199.29 16625 (AKAMAI-AS)
1 2606:4700::68... 13335 (CLOUDFLAR...)
4 104.17.192.78 13335 (CLOUDFLAR...)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a00:1450:400... ()
1 54.192.81.165 ()
5 54.192.81.154 ()
1 52.33.126.96 ()
2 35.153.236.75 ()
1 52.85.188.56 ()
3 34.235.240.97 ()
2 178.250.0.165 ()
249 88
Apex Domain
Subdomains
Transfer
36 condenastdigital.com
pixel.condenastdigital.com
4d.condenastdigital.com
infinityid.condenastdigital.com
capture.condenastdigital.com
22 KB
29 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
1 MB
20 advertising.com
adserver-us.adtech.advertising.com
5 KB
18 arstechnica.net
cdn.arstechnica.net
674 KB
10 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
cm.g.doubleclick.net
pubads.g.doubleclick.net
93 KB
10 ad.gt
a.ad.gt
p.ad.gt
ids.ad.gt
pixels.ad.gt
21 KB
9 evidon.com
c.evidon.com
iabmap.evidon.com
36 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
51 KB
8 google-analytics.com
www.google-analytics.com
21 KB
7 skimresources.com
s.skimresources.com
r.skimresources.com
p.skimresources.com
t.skimresources.com
17 KB
6 rubiconproject.com
fastlane.rubiconproject.com
9 KB
5 googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
64 KB
5 google.com
ampcid.google.com
adservice.google.com
www.google.com
1 KB
5 cnevids.com
api.cnevids.com
player.cnevids.com
58 KB
4 polarcdn-pentos.com
polarcdn-pentos.com
789 B
4 moatads.com
z.moatads.com
px.moatads.com
265 KB
4 casalemedia.com
as-sec.casalemedia.com
3 KB
4 betrad.com
l.betrad.com
480 B
4 google.de
ampcid.google.de
adservice.google.de
www.google.de
1 KB
4 amazon-adsystem.com
c.amazon-adsystem.com
aax.amazon-adsystem.com
23 KB
4 googletagservices.com
www.googletagservices.com
99 KB
4 facebook.net
connect.facebook.net
113 KB
4 demdex.net
dpm.demdex.net
condenast.demdex.net
4 KB
3 googleapis.com
imasdk.googleapis.com
106 KB
3 adsrvr.org
match.adsrvr.org
1 KB
3 polarcdn-terrax.com
polarcdn-terrax.com
103 KB
3 consensu.org
api.skimlinks.mgr.consensu.org
vendorlist.consensu.org
evidon.mgr.consensu.org
16 KB
3 parsely.com
srv-2019-03-28-18.config.parsely.com
srv-2019-03-28-18.pixel.parsely.com
1 KB
3 medtargetsystem.com
www.medtargetsystem.com
95 KB
3 bounceexchange.com
tag.bounceexchange.com
assets.bounceexchange.com
98 KB
3 arstechnica.com
arstechnica.com
sstats.arstechnica.com
16 KB
2 criteo.com
bidder.criteo.com
426 B
2 plrsrvcs.com
bw-prod.plrsrvcs.com
2 KB
2 pubmatic.com
image2.pubmatic.com
1 KB
2 adnxs.com
secure.adnxs.com
2 KB
2 facebook.com
www.facebook.com
247 B
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
121 KB
2 scorecardresearch.com
sb.scorecardresearch.com
1 KB
2 outbrain.com
widgets.outbrain.com
odb.outbrain.com
47 KB
2 adobedtm.com
assets.adobedtm.com
42 KB
1 2mdn.net
s0.2mdn.net
11 KB
1 polarcdn.com
static.polarcdn.com
111 KB
1 rlcdn.com
api.rlcdn.com
50 B
1 rkdms.com
mid.rkdms.com
402 B
1 criteo.net
static.criteo.net
25 KB
1 everesttech.net
cm.everesttech.net
527 B
1 quantcount.com
rules.quantcount.com
2 KB
1 linkedin.com
px.ads.linkedin.com
93 B
1 arsdev.net
cdn.accelerator.arsdev.net
304 B
1 zqtk.net
segment-data.zqtk.net
922 B
1 indexww.com
js-sec.indexww.com
39 KB
1 licdn.com
snap.licdn.com
5 KB
1 sail-horizon.com
ak.sail-horizon.com
41 KB
1 turn.com
d.turn.com
698 B
1 quantserve.com
secure.quantserve.com
6 KB
1 googletagmanager.com
www.googletagmanager.com
61 KB
1 ow.ly
ow.ly
211 B
0 rfihub.com Failed
p.rfihub.com Failed
249 58
Domain Requested by
28 capture.condenastdigital.com arstechnica.com
20 adserver-us.adtech.advertising.com 8 redirects arstechnica.com
18 cdn.arstechnica.net arstechnica.com
17 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
8 c.evidon.com assets.adobedtm.com
c.evidon.com
arstechnica.com
8 www.google-analytics.com 1 redirects www.googletagmanager.com
www.google-analytics.com
6 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
6 images.outbrainimg.com arstechnica.com
6 fastlane.rubiconproject.com js-sec.indexww.com
6 ids.ad.gt arstechnica.com
5 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
4 polarcdn-pentos.com static.polarcdn.com
4 as-sec.casalemedia.com js-sec.indexww.com
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
4 l.betrad.com arstechnica.com
4 4d.condenastdigital.com cdn.arstechnica.net
pixel.condenastdigital.com
4 www.googletagservices.com cdn.arstechnica.net
securepubads.g.doubleclick.net
4 connect.facebook.net arstechnica.com
connect.facebook.net
d2c8v52ll5s99u.cloudfront.net
3 z.moatads.com securepubads.g.doubleclick.net
d2c8v52ll5s99u.cloudfront.net
3 tpc.googlesyndication.com securepubads.g.doubleclick.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 match.adsrvr.org 2 redirects js-sec.indexww.com
3 polarcdn-terrax.com cdn.mediavoice.com
static.polarcdn.com
arstechnica.com
3 infinityid.condenastdigital.com cdn.arstechnica.net
pixel.condenastdigital.com
d2c8v52ll5s99u.cloudfront.net
3 player.cnevids.com cdn.arstechnica.net
player.cnevids.com
3 www.medtargetsystem.com arstechnica.com
www.medtargetsystem.com
3 dpm.demdex.net 1 redirects arstechnica.com
2 bidder.criteo.com static.criteo.net
2 srv-2019-03-28-18.pixel.parsely.com arstechnica.com
2 bw-prod.plrsrvcs.com static.polarcdn.com
arstechnica.com
2 aax.amazon-adsystem.com c.amazon-adsystem.com
2 image2.pubmatic.com 2 redirects
2 cm.g.doubleclick.net 2 redirects
2 secure.adnxs.com 2 redirects
2 p.ad.gt a.ad.gt
arstechnica.com
2 pagead2.googlesyndication.com securepubads.g.doubleclick.net
arstechnica.com
2 t.skimresources.com s.skimresources.com
2 www.facebook.com arstechnica.com
connect.facebook.net
2 www.google.de arstechnica.com
2 www.google.com 2 redirects
2 stats.g.doubleclick.net 2 redirects
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 sstats.arstechnica.com arstechnica.com
2 assets.bounceexchange.com tag.bounceexchange.com
assets.bounceexchange.com
2 c.amazon-adsystem.com cdn.arstechnica.net
c.amazon-adsystem.com
2 p.skimresources.com arstechnica.com
2 r.skimresources.com 1 redirects arstechnica.com
2 sb.scorecardresearch.com 1 redirects arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 assets.adobedtm.com arstechnica.com
assets.adobedtm.com
1 px.moatads.com arstechnica.com
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 pixels.ad.gt p.ad.gt
1 s0.2mdn.net imasdk.googleapis.com
1 static.polarcdn.com securepubads.g.doubleclick.net
1 odb.outbrain.com widgets.outbrain.com
1 evidon.mgr.consensu.org c.evidon.com
1 vendorlist.consensu.org c.evidon.com
1 iabmap.evidon.com c.evidon.com
1 api.rlcdn.com js-sec.indexww.com
1 mid.rkdms.com js-sec.indexww.com
1 static.criteo.net js-sec.indexww.com
1 log.outbrainimg.com widgets.outbrain.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 adservice.google.de www.googletagservices.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 ampcid.google.de www.google-analytics.com
1 cm.everesttech.net 1 redirects
1 condenast.demdex.net arstechnica.com
1 rules.quantcount.com secure.quantserve.com
1 srv-2019-03-28-18.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 ampcid.google.com www.google-analytics.com
1 px.ads.linkedin.com snap.licdn.com
1 cdn.accelerator.arsdev.net cdn.arstechnica.net
1 cdn.mediavoice.com cdn.arstechnica.net
1 segment-data.zqtk.net cdn.arstechnica.net
1 js-sec.indexww.com cdn.arstechnica.net
1 snap.licdn.com arstechnica.com
1 a.ad.gt www.googletagmanager.com
1 tag.bounceexchange.com arstechnica.com
1 ak.sail-horizon.com www.googletagmanager.com
1 d.turn.com arstechnica.com
1 secure.quantserve.com www.googletagmanager.com
1 widgets.outbrain.com cdn.arstechnica.net
1 pixel.condenastdigital.com cdn.arstechnica.net
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 arstechnica.com
1 ow.ly 1 redirects
0 p.rfihub.com Failed arstechnica.com
249 92
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign Organization Validation CA - SHA256 - G2
2018-09-14 -
2019-09-29
a year crt.sh
assets.adobedtm.com
DigiCert SHA2 High Assurance Server CA
2019-03-04 -
2020-03-11
a year crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-02-22 -
2019-09-07
6 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cnevids.com
Trusted Secure Certificate Authority 5
2017-01-10 -
2020-01-10
3 years crt.sh
*.cloudfront.net
DigiCert Global CA G2
2018-10-08 -
2019-10-09
a year crt.sh
*.demdex.net
DigiCert SHA2 High Assurance Server CA
2018-01-09 -
2021-02-12
3 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2018-10-16 -
2019-10-21
a year crt.sh
*.turn.com
DigiCert SHA2 Secure Server CA
2019-01-25 -
2020-03-31
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-03-08 -
2019-06-06
3 months crt.sh
ak.sail-horizon.com
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
tag.bounceexchange.com
Thawte RSA CA 2018
2018-08-13 -
2020-08-12
2 years crt.sh
*.ad.gt
Amazon
2018-08-03 -
2019-09-03
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2016-02-16 -
2019-04-17
3 years crt.sh
medtargetsystem.com
Amazon
2018-11-23 -
2019-12-23
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.g.doubleclick.net
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
c.amazon-adsystem.com
Amazon
2018-12-18 -
2019-11-21
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-01-09 -
2020-03-09
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-01-25 -
2019-12-11
a year crt.sh
*.accelerator.arsdev.net
Amazon
2018-08-14 -
2019-09-14
a year crt.sh
*.conde.io
Amazon
2018-05-22 -
2019-06-22
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2017-06-06 -
2019-06-11
2 years crt.sh
*.google.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.config.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
*.bounceexchange.com
Amazon
2018-08-21 -
2019-09-21
a year crt.sh
sstats.arstechnica.com
DigiCert SHA2 High Assurance Server CA
2019-03-03 -
2020-06-05
a year crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.evidon.com
DigiCert ECC Secure Server CA
2019-02-01 -
2020-05-02
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2018-08-15 -
2019-10-23
a year crt.sh
www.google.de
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-10-26 -
2019-05-04
6 months crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-03-26 -
2020-03-30
a year crt.sh
*.rkdms.com
Entrust Certification Authority - L1K
2017-10-09 -
2020-10-30
3 years crt.sh
*.rlcdn.com
Go Daddy Secure Certificate Authority - G2
2017-05-08 -
2019-06-21
2 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2017-02-15 -
2019-04-19
2 years crt.sh
l.betrad.com
Go Daddy Secure Certificate Authority - G2
2017-04-25 -
2019-06-24
2 years crt.sh
vendorlist.consensu.org
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
evidon.mgr.consensu.org
Amazon
2018-09-20 -
2019-10-20
a year crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-02-28 -
2019-09-07
6 months crt.sh
*.googleapis.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
aax-eu.amazon-adsystem.com
Amazon
2018-12-12 -
2019-12-10
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
tpc.googlesyndication.com
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
ssl962736.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-19 -
2019-12-11
a year crt.sh
ssl887612.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-03-21 -
2019-09-27
6 months crt.sh
ssl880796.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-02-20 -
2019-08-29
6 months crt.sh
*.doubleclick.net
Google Internet Authority G3
2019-03-01 -
2019-05-24
3 months crt.sh
*.pixel.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
*.criteo.com
DigiCert SHA2 Secure Server CA
2018-11-05 -
2020-01-03
a year crt.sh

This page contains 9 frames:

Primary Page: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Frame ID: 168DD844A211CEB90BF4EE00273FCF35
Requests: 211 HTTP requests in this frame

Frame: https://condenast.demdex.net/dest5.html?d_nsid=0
Frame ID: 547589234AB05500DC73D584D20A3AE4
Requests: 1 HTTP requests in this frame

Frame: https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com&_sid=1484181f-b953-40dc-aba5-1383acce7a46&_vid=a2eee75d-75ee-4015-bb5e-5e7c49a1f394&_ak=119-556-B0E9F642&_flash=false&_th=1553796850|1553796850|1
Frame ID: E29AFDE8813CB1B9E07BD53F86DCE68C
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: A13DC7A7C02A7F0F7941CAAED53430CE
Requests: 30 HTTP requests in this frame

Frame: https://www.facebook.com/tr/
Frame ID: 114D13BE45ED43E28B742B92EC54A90F
Requests: 1 HTTP requests in this frame

Frame: https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Frame ID: 528F2DBC880BE28CCBF800A2FA167E50
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/pagead/js/r20190325/r20110914/client/ext/m_window_focus_non_hydra.js
Frame ID: D26041E8C8536CE53D9633992F79A9C4
Requests: 7 HTTP requests in this frame

Frame: https://static.polarcdn.com/creative/creative.js
Frame ID: D24D43168C79B6B845324353CE56AD7E
Requests: 12 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.289.0_en.html
Frame ID: 7B5B23533897DA4EA06C32472890E9F0
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://ow.ly/i20M50onE7D HTTP 301
    https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+wp-(?:content|includes)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^bouncex$/i

Overall confidence: 100%
Detected patterns
  • env /^criteo/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i
  • env /^google_ad_/i
  • env /^__google_ad_/i
  • env /^Goog_AdSense_/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Overall confidence: 100%
Detected patterns
  • env /^googletag$/i
  • env /^google_tag_manager$/i

Overall confidence: 100%
Detected patterns
  • env /^moment$/i

Overall confidence: 100%
Detected patterns
  • env /^(?:OutbrainPermaLink|OB_releaseVer)$/i

Overall confidence: 100%
Detected patterns
  • env /^PARSELY$/i

Overall confidence: 100%
Detected patterns
  • env /^quantserve$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

249
Requests

98 %
HTTPS

27 %
IPv6

58
Domains

92
Subdomains

88
IPs

6
Countries

3654 kB
Transfer

9303 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://ow.ly/i20M50onE7D HTTP 301
    https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 45
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1553796850283&ns_c=UTF-8&c8=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1553796850283&ns_c=UTF-8&c8=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&c9=
Request Chain 47
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22istockphoto.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22fireeye.com%22%2C%22symantec.com%22%2C%22win-rar.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D HTTP 302
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D72R4RP4RZGY3T9ZVNV03X92&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22istockphoto.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22fireeye.com%22%2C%22symantec.com%22%2C%22win-rar.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=6a47d8446148710e63437a09f8cc8c4a73ed18429d2ea5049d762fe2eeadc953
Request Chain 75
  • https://cm.everesttech.net/cm/dd?d_uuid=73112006233325090314185467398967446249 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XJ0O8gAAEkJQTRN_
Request Chain 88
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j73&tid=UA-31997-1&cid=36730283.1553796851&jid=1759747958&gjid=712940166&_gid=1553478923.1553796851&_u=aGBAgUAjAAQC~&z=18414983 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=36730283.1553796851&jid=1759747958&_v=j73&z=18414983 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=36730283.1553796851&jid=1759747958&_v=j73&z=18414983&slf_rd=1&random=1143785412
Request Chain 132
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&adnxs_id=$UID HTTP 302
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3Db204da9c-434f-454d-8a29-4c97d1af7d57%26adnxs_id%3D%24UID HTTP 302
  • https://ids.ad.gt/api/v1/match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&adnxs_id=914063140411019253
Request Chain 133
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=b204da9c-434f-454d-8a29-4c97d1af7d57 HTTP 302
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=b204da9c-434f-454d-8a29-4c97d1af7d57 HTTP 302
  • https://ids.ad.gt/api/v1/t_match?tdid=b31160cd-4536-488e-a96e-814d736ce7d7&id=b204da9c-434f-454d-8a29-4c97d1af7d57
Request Chain 134
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=b204da9c-434f-454d-8a29-4c97d1af7d57 HTTP 302
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm=&google_sc=&google_ula=450542624&id=b204da9c-434f-454d-8a29-4c97d1af7d57&google_tc= HTTP 302
  • https://ids.ad.gt/api/v1/g_match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&google_gid=CAESENkXT2UY0dVQyHdJmbiOdKg&google_cver=1&google_ula=450542624,0
Request Chain 135
  • https://dpm.demdex.net/ibs:dpid=348447&dpuuid=b204da9c-434f-454d-8a29-4c97d1af7d57&redir=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fadb_match%3Fadb%3D%24%7BDD_UUID%7D%26id%3Db204da9c-434f-454d-8a29-4c97d1af7d57 HTTP 302
  • https://ids.ad.gt/api/v1/adb_match?adb=73112006233325090314185467398967446249&id=b204da9c-434f-454d-8a29-4c97d1af7d57
Request Chain 136
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Db204da9c-434f-454d-8a29-4c97d1af7d57 HTTP 302
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Db204da9c-434f-454d-8a29-4c97d1af7d57 HTTP 302
  • https://ids.ad.gt/api/v1/pbm_match?pbm=AFF0E7D5-E758-465B-9BD4-422CC7181340&id=b204da9c-434f-454d-8a29-4c97d1af7d57
Request Chain 161
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
Request Chain 162
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
Request Chain 163
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
Request Chain 164
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
Request Chain 185
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A4a14f526-5185-11e9-83fa-0e9021409d42;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
Request Chain 186
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A4a15ad68-5185-11e9-a380-0ec83b91fe34;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
Request Chain 187
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2 HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A4a173408-5185-11e9-bc5e-0e2709c2b384;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
Request Chain 188
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A4a173b2e-5185-11e9-a6aa-0e285efb790e;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
Request Chain 249
  • https://www.google-analytics.com/r/collect?v=1&_v=j73&a=31033535&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&ul=en-us&de=UTF-8&dt=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw%20%7C%20Ars%20Technica&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=aGjAAUI7AAQC~&jid=2058568695&gjid=308795039&cid=36730283.1553796851&tid=UA-87198801-1&_gid=7146368.1553796855&_r=1&cd1=b204da9c-434f-454d-8a29-4c97d1af7d57&cd2=LU6O0M&cd4=arstechnica.com&cd5=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cd6=Passive%20Tagger&cd7=a186ba14d33f6e62aa51245e5a087215&cd9=795758&cd3=57&z=741052565 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=36730283.1553796851&jid=2058568695&_gid=7146368.1553796855&gjid=308795039&_v=j73&z=741052565 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=36730283.1553796851&jid=2058568695&_v=j73&z=741052565 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=36730283.1553796851&jid=2058568695&_v=j73&z=741052565&slf_rd=1&random=3821607772

249 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Redirect Chain
  • http://ow.ly/i20M50onE7D
  • https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
43 KB
15 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Chicago, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
f961ab80d265f6faf34893811e183229527157dc732a919dbb4ec4be77484388
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx
date
Thu, 28 Mar 2019 18:14:09 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web203
content-encoding
gzip

Redirect headers

Location
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Connection
close
Content-Length
0
main-e28793ce68.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
332 KB
69 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
bff87041c749a5f66e9f85f96bcb1b6e2a75d8efb198a6a5aa15ea76d5167333

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1553550286:cacheN.fra2-01:H
status
200
content-length
70273
x-cf-tsc
1553647523
x-cf2
H
last-modified
Tue, 26 Mar 2019 16:40:51 GMT
server
CFS 0215
x-cff
B
etag
W/"5c9a5613-53022"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
10822
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:09 GMT
GettyImages-180832603-800x442.jpg
cdn.arstechnica.net/wp-content/uploads/2019/02/
35 KB
35 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2019/02/GettyImages-180832603-800x442.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
db37477da55396dda0a1516f6126dbef75ff3638cbecb6216591e8f5e5713bb3

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1553721799:cacheN.fra2-01:H
status
200
content-length
35737
x-cf-tsc
1553721801
x-cf2
H
last-modified
Wed, 20 Feb 2019 12:19:25 GMT
server
CFS 0215
x-cff
B
etag
"5c6d45cd-8b99"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:09 GMT
main-c32facca0a.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
647 KB
211 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-c32facca0a.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
09f480fc7e3b15909e7b60ddeb68f142ab31e976b88e95cdffe479fdd78dcf23

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
215418
x-cf-tsc
1553729349
x-cf2
H
last-modified
Wed, 27 Mar 2019 23:27:16 GMT
server
CFS 0215
x-cff
B
etag
W/"5c9c06d4-a1cbd"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:09 GMT
ars-3b01442aaa.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
3 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-3b01442aaa.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
64d2d3dc68f59fec33141b38317ceb57a980c650041004016ebeddb7dc609a28

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
1589
x-cf-tsc
1553646431
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:36 GMT
server
CFS 0215
x-cff
B
etag
"5c994930-de9"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27815
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:09 GMT
satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
75 KB
23 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.196.33 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-196-33.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
40543640eb6187832a2bd4f777b1a85f6d1aa283cd708bd29f5ef8114816e740

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
last-modified
Mon, 11 Mar 2019 16:42:01 GMT
server
Apache
etag
"726cdd0e62ef73225b0e432fa2506ff4:1552322521"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
23575
expires
Thu, 28 Mar 2019 19:14:10 GMT
100098X1555750.skimlinks.js
s.skimresources.com/js/
38 KB
14 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
7d231cbacba1d2fc1c2db383374749d2b446e8a6bc72a67a37abed8ffd5422b9

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
content-encoding
gzip
last-modified
Wed, 27 Mar 2019 13:19:53 GMT
server
AmazonS3
x-amz-request-id
D8AEC0EC204F596D
etag
"13c5e7f5477f23998e8a2879b033b19f"
x-hw
1553796849.cds022.pa1.hn,1553796849.cds024.pa1.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
14492
x-amz-id-2
UbtDiODXbLupV0p7TuIVJEM9Il4i65E3C6chr7S8dOtn/0R97kwOVIJpWtEUTFDPR1WcVNMLXvs=
services.min.js
cdn.arstechnica.net/cns/
149 KB
43 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/services.min.js?1553796000
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5ae42b31cd43c4d1a536b9bd53a19693d4bc8447c48051724b26de65f8f89ed7

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
content-encoding
gzip
x-cf3
H
x-amz-request-id
85E6D45B256DE1D6
x-cf1
14961:fB.fra2:co:1553189295:cacheN.fra2-01:H
status
200
content-length
43882
x-amz-id-2
dKj5rKBIu0WtEIpNkAhOQxALpQZWTmeuaEWDffJ/mdNsF4X7SWYUF7GB2incCPpQ38hHNyeLqfA=
x-served-by
cache-mdw17379-MDW
cf4ttl
43200.000
x-cf2
H
last-modified
Thu, 21 Mar 2019 17:17:45 GMT
server
CFS 0215
x-timer
S1553621347.099346,VS0,VE284
x-cff
B
etag
"cf723245057e5def17c0d107b3eac5e6"
vary
Accept-Encoding
content-type
text/javascript
access-control-allow-origin
*
expires
Thu, 23 May 2019 18:14:09 GMT
cache-control
max-age=4838400
cf4age
4485
x-amz-version-id
uOg6df7ZtzAAIyH5AMJ.kfvRiYpzffwE
accept-ranges
bytes
x-cf-tsc
1553625832
x-cache-hits
0
gtm.js
www.googletagmanager.com/
246 KB
61 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:820::2008 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager (scaffolding) /
Resource Hash
3f0ddf19affbff4eabd00a0619d68d3a54dc15802aec7e920693cacf95231155
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
content-encoding
br
last-modified
Wed, 27 Mar 2019 20:07:14 GMT
server
Google Tag Manager (scaffolding)
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
62146
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:09 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
blockquote-15f4e0cf4f.svg
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
434 B
755 B
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/blockquote-15f4e0cf4f.svg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
69df9c207667c2ef7940a78d951cda72d599be4e843d8bc43cc3b0ff2c08e280

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
434
x-cf-tsc
1553678732
x-cf2
H
last-modified
Tue, 26 Mar 2019 16:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5c9a5613-1b2"
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:09 GMT
caution-360x200.jpg
cdn.arstechnica.net/wp-content/uploads/2016/10/
21 KB
21 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2016/10/caution-360x200.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
2924b998a197e7af2f7431b3db26b431b56b3d6e084a3cae9d7a48113a8dfd64

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
21353
x-cf-tsc
1553718535
x-cf2
H
last-modified
Sun, 02 Oct 2016 22:15:30 GMT
server
CFS 0215
x-cff
B
etag
"57f18702-5369"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:09 GMT
Dang.jpg
cdn.arstechnica.net/wp-content/uploads/2018/10/
90 KB
91 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2018/10/Dang.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
d6f350f62fc19bfd7091e3841649be70e806fb94c00a1f777dbed2ea8ecc9daa

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
92486
x-cf-tsc
1553676218
x-cf2
H
last-modified
Mon, 08 Oct 2018 19:35:22 GMT
server
CFS 0215
x-cff
B
etag
"5bbbb17a-16946"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
33599
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:09 GMT
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
4809
x-cf-tsc
1553647525
x-cf2
H
last-modified
Tue, 26 Mar 2019 16:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5c9a5613-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
28688
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:09 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
25592
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24264
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24212
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22872
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18972
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27410
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20872
x-cf-tsc
1553645151
x-cf2
H
last-modified
Tue, 26 Mar 2019 16:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5c9a5613-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
26272
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18824
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27820
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
19516
x-cf-tsc
1553647524
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
29489
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-e28793ce68.css
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fB.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22104
x-cf-tsc
1553645151
x-cf2
H
last-modified
Mon, 25 Mar 2019 21:33:35 GMT
server
CFS 0215
x-cff
B
etag
"5c99492f-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
27103
accept-ranges
bytes
expires
Thu, 23 May 2019 18:14:10 GMT
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.239 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e53759cbefbca7ac3585c5a7586b03a20b664142fa2bb668ba1d11213c97f423

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
Age
261572
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
3, 4493
Connection
keep-alive
Content-Length
13219
x-amz-id-2
xd1+yeEFTU9q2brJ2F7DjIW+4XlI5g+WcyXrwk3x6llRKqsAjUEQ2JZsBiTSzr75ABhMkGX0ZR8=
X-Served-By
cache-iad2141-IAD, cache-hhn1550-HHN
Last-Modified
Mon, 28 Jan 2019 17:44:57 GMT
Server
AmazonS3
X-Timer
S1553796850.071508,VS0,VE0
ETag
"4beefaddd4ac53cdf6e84d0d370b0aa1"
Vary
Accept-Encoding
x-amz-request-id
3CF8D054D39F1709
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Mon, 28 Jan 2019 23:44:56 GMT
outbrain.js
widgets.outbrain.com/
111 KB
39 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1553796850118
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-c32facca0a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.179 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-179.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bf0ef9ffb4976375a8da44b23757a71da03937b8e972b58ca7b0bfdb9f251ff9

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
Last-Modified
Thu, 28 Mar 2019 15:06:25 GMT
Server
Apache
ETag
"cdb7b1a85a5f4983c46fc4fca49b49cb:1553785585"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
39156
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-c32facca0a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.32.35 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-32-35.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
725c7bc55a612ac24f0381c6f089d535113081cab5b492b540c0911ea36945ad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
647
X-XSS-Protection
1; mode=block
X-Request-Id
bf200f07-3d63-4319-9a02-0eefbe67b3f8
X-Runtime
0.001810
X-Backend-Node
10.110.28.153
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"167b5acfa4403e4901e6873b0de12367"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.235 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-235.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
public
Date
Tue, 26 Mar 2019 21:21:06 GMT
Content-Encoding
gzip
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
Age
75180
ETag
W/"53191693-19c1"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 53e3dfdf8efd0c06e5d27cfdbfbe5876.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
Connection
keep-alive
X-Amz-Cf-Id
EnwyL1hoeiDaNRhv7zLHpQQ3SZIF0wBymsgJaatL5aax1di9zBYsxA==
Expires
Wed, 27 Mar 2019 21:21:06 GMT
id
dpm.demdex.net/
5 KB
2 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=3.3.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=F7093025512D2B690A490D44%40AdobeOrg&d_nsid=0&ts=1553796850263
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.213.58.51 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-213-58-51.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
922eef9d4c5b8a54747275b8f2618f367d2d18204899eeb9e7adec05d9958b40

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v025-09cea24dc.edge-irl1.demdex.com 5.50.0.20190319164038 5ms
Pragma
no-cache
Content-Encoding
gzip
X-TID
8tmUQfFzRrU=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
1474
Expires
Thu, 01 Jan 1970 00:00:00 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
3e552578c7d450b023f2cd9d28f830be4335c3acc6c4ab6dadda0769f09e5f22
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 16 Jan 2019 20:01:45 GMT
server
Golfe2
age
1634
date
Thu, 28 Mar 2019 17:46:56 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
17543
expires
Thu, 28 Mar 2019 19:46:56 GMT
quant.js
secure.quantserve.com/
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.213 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
Last-Modified
Thu, 28-Mar-2019 18:14:10 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Thu, 04 Apr 2019 18:14:10 GMT
PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=44913655-bb76-4229-a117-c7943f253100
d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/
253 B
698 B
Script
General
Full URL
https://d.turn.com/r/dd/id/L21rdC84MTYvY2lkLzI4NTk1MjExL3QvMA/kv/PageName=information%20technology,SiteID=Ars%20Technica,CampaignID=1802C,Channel=website,CreativeID=44913655-bb76-4229-a117-c7943f253100
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_CBC
Server
46.228.164.13 , United Kingdom, ASN56396 (TURN, GB),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0448fadc22744224778b931888229c311732d88370eedbb42c4867a84550cf68

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:09 GMT
Cache-Control
max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0
Server
Apache-Coyote/1.1
Content-Type
text/javascript;charset=UTF-8
Content-Length
253
P3P
policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV"
fbevents.js
connect.facebook.net/en_US/
52 KB
16 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
e0476713c1a4b54e3119fdbd5a9ee90777a34c42ff27505b875d645acda126aa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15987
x-xss-protection
0
pragma
private
x-fb-debug
ic1F/OBSQDAc4jfbwdPUEZfX0Rx3w9SnCG4PqjsKQbdfh/wcqC7qsnVOZ8x/0ViQJdxSrERLcTyrRcSdZbD7Dw==
date
Thu, 28 Mar 2019 18:14:10 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
private
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
spm.v1.min.js
ak.sail-horizon.com/spm/
113 KB
41 KB
Script
General
Full URL
https://ak.sail-horizon.com/spm/spm.v1.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.202.169 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-202-169.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
2b28cdf399d9796384093bf46f595eb50e50e11a89a3fef6ce58cfe54f9d5d7b

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:09:10 GMT
content-encoding
gzip
last-modified
Tue, 19 Mar 2019 18:26:45 GMT
server
Apache
age
312
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
status
200
cache-control
max-age=600; must-revalidate
accept-ranges
bytes
content-length
41637
via
1.1 bd5652a800046ffa43683320c0e731b4.cloudfront.net (CloudFront)
x-amz-cf-id
85NBoIC8MgXfq54mVkHojjdi0Oe7RK1A4ITmVGEPuRnPUiHgmjiSuw==
i.js
tag.bounceexchange.com/2806/
10 KB
4 KB
Script
General
Full URL
https://tag.bounceexchange.com/2806/i.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.92.63 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
63.92.190.35.bc.googleusercontent.com
Software
fasthttp /
Resource Hash
98a77130968accd6e7c99652476a8a9f631d8adf6660b24a7c5fa9a2aba7eb7a

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:09 GMT
content-encoding
gzip
server
fasthttp
etag
83ec2ffa065bdf
content-type
text/plain; charset=utf-8
status
200
cache-control
no-cache, must-revalidate
x-region
europe-west3
alt-svc
clear
content-length
3461
via
1.1 google
57
a.ad.gt/api/v1/u/matches/
3 KB
2 KB
Script
General
Full URL
https://a.ad.gt/api/v1/u/matches/57
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.32.108.251 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-32-108-251.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
1e35374f0f9eb5abd2df2f0a6c82ee645e0dca8b808268810198a2a2bde7a195

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
Server
nginx/1.8.1
Connection
keep-alive
Content-Length
1279
Content-Type
text/html; charset=utf-8
insight.min.js
snap.licdn.com/li.lms-analytics/
15 KB
5 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:296::25ea , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
bc9cef10d07e8da3ce80181de07a056414731f86e0dc12e2c81d652b28ac770b

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
Last-Modified
Mon, 03 Dec 2018 23:03:30 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=74727
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4571
beacon.js
www.medtargetsystem.com/javascript/
359 KB
95 KB
Script
General
Full URL
https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) /
Resource Hash
9fe2d2fda8f5a7a0176070a65a3d5887934cb64e43fa376444188b44e40c2045

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
Last-Modified
Wed, 27 Mar 2019 15:14:18 GMT
Server
Apache/2.4.7 (Ubuntu)
ETag
"59cea-58514e433e680-gzip"
Vary
X-Forwarded-Proto,Accept-Encoding
Content-Type
application/javascript
transfer-encoding
chunked
Connection
keep-alive
Accept-Ranges
bytes
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035094&ns__t=1553796850283&ns_c=UTF-8&c8=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw%20%7C%20Ar...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1553796850283&ns_c=UTF-8&c8=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw%20%7C%20A...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1553796850283&ns_c=UTF-8&c8=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&c9=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.103.89.123 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a104-103-89-123.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:10 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035094&ns__t=1553796850283&ns_c=UTF-8&c8=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw%20%7C%20Ars%20Technica&c7=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&c9=
Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:10 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/
67 KB
19 KB
Script
General
Full URL
https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/s-code-contents-566dcf5046f148f38d0aa32bf73df40db7ae7768.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.196.33 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-196-33.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
de4de18224e2109f2f8ff4ce9a40cb51c6a36724b2df68e8bd6080b8ee3a02d0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
last-modified
Mon, 11 Mar 2019 16:42:01 GMT
server
Apache
etag
"06a88b0424fa26cefa8da4fc4967b294:1552322522"
vary
Accept-Encoding
content-type
application/x-javascript
status
200
cache-control
max-age=3600
accept-ranges
bytes
timing-allow-origin
*
content-length
19132
expires
Thu, 28 Mar 2019 19:14:10 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2...
  • https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D72R4RP4RZGY3T9ZVNV03X92&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstech...
192 B
487 B
Script
General
Full URL
https://r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D72R4RP4RZGY3T9ZVNV03X92&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22istockphoto.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22fireeye.com%22%2C%22symantec.com%22%2C%22win-rar.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=6a47d8446148710e63437a09f8cc8c4a73ed18429d2ea5049d762fe2eeadc953
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
b4d843b646a54656d5a6017c778fc23c5738ad9c9a94c579e44ad37e1c5e84e5
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
via
1.1 google
x-content-type-options
nosniff
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
200
access-control-allow-credentials
true
content-type
application/javascript
alt-svc
clear

Redirect headers

date
Thu, 28 Mar 2019 18:14:10 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
location
//r.skimresources.com/api/?callback=skimlinksBeaconCallback&persistence=1&xguid=01D72R4RP4RZGY3T9ZVNV03X92&data=%7B%22pubcode%22%3A%22100098X1555750%22%2C%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F%22%2C%22domains%22%3A%5B%22cdn.arstechnica.net%22%2C%22istockphoto.com%22%2C%22facebook.com%22%2C%22twitter.com%22%2C%22reddit.com%22%2C%22fireeye.com%22%2C%22symantec.com%22%2C%22win-rar.com%22%2C%22outbrain.com%22%2C%22condenast.com%22%5D%7D&checksum=6a47d8446148710e63437a09f8cc8c4a73ed18429d2ea5049d762fe2eeadc953
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
302
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
167
px.gif
p.skimresources.com/
43 B
513 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=6.25161764528605
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
age
0
status
200
x-guploader-uploadid
AEnB2UpqDTqyAQiwmD8INqh-vCmnPulaL7n4S6LH-4dRc5Ao4rgMDx3sPjE10-Fk3Gds6PBejhX0IX0fW4h2QUYIL-z7UnyeJ8kGgrUEzc22AGl45dZqTZM
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1553796850.cds022.pa1.hn,1553796850.cds025.pa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
108 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=6.25161764528605
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
age
0
status
200
x-guploader-uploadid
AEnB2UpqDTqyAQiwmD8INqh-vCmnPulaL7n4S6LH-4dRc5Ao4rgMDx3sPjE10-Fk3Gds6PBejhX0IX0fW4h2QUYIL-z7UnyeJ8kGgrUEzc22AGl45dZqTZM
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1553796850.cds022.pa1.hn,1553796850.cds025.pa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
gpt.js
www.googletagservices.com/tag/js/
44 KB
12 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9c61fde7548776902bd465299ae74d221c8446f1e0aac734585f7fd1dc7481ec
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"120 / 509 of 1000 / last-modified: 1553623255"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
11538
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:10 GMT
apstag.js
c.amazon-adsystem.com/aax2/
66 KB
19 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.177 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-177.fra2.r.cloudfront.net
Software
Server /
Resource Hash
06042f6ac2063c8e23fcce2c7c64449bae470d34c4d46f97e145242158ef15f3

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 16:37:19 GMT
Content-Encoding
gzip
Server
Server
Age
5810
ETag
179e41b046d5f974d2586d066c70d87e
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 60a935292c9892b0b7f9e56f65af863a.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
X-Amz-Cf-Id
ivKFgkbfiVGYs0_DbaaKaWMFbcI8EmQkm8Wz-b0_-0Lljfh-odYhKA==
arstechnica.js
player.cnevids.com/interlude/
107 KB
27 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.153 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-153.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
8df213c73bbbd6e8fecf23b6ea1767f4d18b8ba480f5f9f5d6b4b2847d8b949e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:05 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
5
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
26963
X-XSS-Protection
1; mode=block
X-Request-Id
89a4c984-f25f-4a42-a868-3a5f3a1c4df4
X-Runtime
0.013978
X-Backend-Node
10.110.14.4
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"bdfd966d19b154276034efb827177ed5"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 f2cdeae9faa9c871a27c20811b04af58.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
fp7vKaajlwFi0Tebo1YdiU7yhBQlOVuUyg_LbqF8bbe5ik3a7HcGZw==
htw-condenast.js
js-sec.indexww.com/ht/
176 KB
39 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/htw-condenast.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.4 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-4.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
ebcb1918cee0d14597958c88ced103f45bcb157ee1f574b07e2ad09c67b3fab1

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
Last-Modified
Thu, 28 Mar 2019 17:25:53 GMT
Server
Apache
ETag
"da2ea7-2c123-5852ad8abe407"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=961
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
39347
Expires
Thu, 28 Mar 2019 18:30:11 GMT
conde-nast
segment-data.zqtk.net/
651 B
922 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.210.6.215 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-210-6-215.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
5971eafc54def3822072a6492de11bb0c808bb2579b7eed670ff94c90adb3f59

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Last-Modified
Wed, 27 Mar 2019 21:21:44 GMT
Server
nginx/1.10.3 (Ubuntu)
Connection
keep-alive
Content-Type
application/javascript; charset=UTF-8
Content-Length
651
Expires
Fri, 29 Mar 2019 21:21:44 GMT
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
cf-cache-status
HIT
status
200
content-type
text/javascript
content-length
2018
via
1.1 varnish
server
cloudflare
cache-control
max-age=21600
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1139787694 1139328797
x-country
DE
cf-ipcountry
DE
accept-ranges
bytes
cf-ray
4beb950b9d566409-FRA
https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F
cdn.accelerator.arsdev.net/h/
12 B
304 B
Script
General
Full URL
https://cdn.accelerator.arsdev.net/h/https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F?callback=arsData
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.20 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-20.fra2.r.cloudfront.net
Software
nginx/1.4.6 (Ubuntu) / PHP/5.5.9-1ubuntu4.9
Resource Hash
18c4dfbdcbf664e92468c3a09814db7f114f9b393613e2cb077d81565d496f8d

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:13:22 GMT
via
1.1 ed522e38bfbcd76f653d4691110d92a1.cloudfront.net (CloudFront)
server
nginx/1.4.6 (Ubuntu)
age
184
x-powered-by
PHP/5.5.9-1ubuntu4.9
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
max-age=300, public
x-amz-cf-id
XmzVmKy_J5AwjLVV6ZTnZ52OEhL4T_T5emwidNkz5AYf1adclGIsww==
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.204.40.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-204-40-232.compute-1.amazonaws.com
Software
/
Resource Hash
90ddac7a8a8010966fea9a160022e9b8a42f604ca11e473ef7427a33cfcb41f0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1553796850342
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.86.70.149 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-86-70-149.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
b0dc81e5b47a8587571034d2861c0547d8230a7c82239e899a3aae484a0df018

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ded8aafe08adcc23835de89f62fbee0b98184f32296c7679ab5b5a358f044f63

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
/
px.ads.linkedin.com/collect/
0
93 B
Script
General
Full URL
https://px.ads.linkedin.com/collect/?time=1553796850377&pid=895394&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&fmt=js&s=1
Requested by
Host: snap.licdn.com
URL: https://snap.licdn.com/li.lms-analytics/insight.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
20
x-li-uuid
ejLiQvgxkBWAdrKOQisAAA==
228464857488266
connect.facebook.net/signals/config/
174 KB
41 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/228464857488266?v=2.8.45&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
e256213ec1a54fa198fa9d86552e801c04804ff90b6d9f95f41426ff4ade0ce3
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
41532
x-xss-protection
0
pragma
public
x-fb-debug
eU/RUgvPPGeSSs4uJXld62Q8eSwgFFUzBQ22OuCF/lD7OpWQu74vAoxnEZnJq1GgACg4r7KDJWqC9M72RNnyGA==
date
Thu, 28 Mar 2019 18:14:10 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
932 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 17:16:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
3459
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
856
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:16:31 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
435 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
1; mode=block
arstechnica.com
srv-2019-03-28-18.config.parsely.com/config/
387 B
805 B
Script
General
Full URL
https://srv-2019-03-28-18.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.60.254 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-6-60-254.compute-1.amazonaws.com
Software
/ Express
Resource Hash
df046545d18613ba07684b753b71d8b689ad469bf234067b5881ef2747c19040

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Cache-Control
private, no-cache
Connection
keep-alive
X-Powered-By
Express
ETag
W/"183-AOyZFN3oQr7L+YaZ3WqXZQ"
Content-Length
387
Content-Type
text/javascript; charset=utf-8
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1553796850427
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.44.76.10 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-44-76-10.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
992438b3ff59b327c0045f5e5d162c0f1f20d69b2a8f2a74310ae247ab5d3c85

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.174.217.231 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-174-217-231.compute-1.amazonaws.com
Software
/
Resource Hash
90ddac7a8a8010966fea9a160022e9b8a42f604ca11e473ef7427a33cfcb41f0

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A10.431Z&_t=library_sparrow&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&uNw=1&uUq=1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&requestStart=1194.3750008940697&requestEnd=1281.9449976086617&init=1621.1050003767014&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:10 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A10.447Z&_t=loaded&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns&cns=2_26_0&feature_get_entries=true&feature_performance_now=true&cns_metrics=1_1_0&cns_metrics_sparrow=1_2_0&_logType=info&cns_ads=2.19.0&cns_ads_ars_accelerator=0.2.0&cns_ads_amazon_match_buy=1.1.1&cns_ads_cne_interlude=1.0.0&cns_ads_adobe_audience_manager=1.0.0&cns_ads_index_exchange=1.2.2&cns_ads_proximic=0.1.2&cns_ads_4d=0.5.1&cns_ads_polar=0.2.0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:10 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A10.458Z&_t=library_service&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&init=1192.6049962639809&requestEnd=1132.5350031256676&requestStart=1107.5299978256226&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A10.464Z&_t=page_created&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4000&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&content_uri=information_technology&image_avg_surface=353600&image_count=1&image_surface=353600&server=production&vp_height=1200&vp_width=1585&channel=information_technology&slots_count=6&tags=exploits_malware_vulnerabilities_winrar&template=article&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ijs_all_modules_6232c7c7ac857bfc2f1a5270ad0d5c03.js
assets.bounceexchange.com/assets/smart-tags/versioned/
418 KB
95 KB
Script
General
Full URL
https://assets.bounceexchange.com/assets/smart-tags/versioned/ijs_all_modules_6232c7c7ac857bfc2f1a5270ad0d5c03.js
Requested by
Host: tag.bounceexchange.com
URL: https://tag.bounceexchange.com/2806/i.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
216.137.61.155 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-216-137-61-155.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
71bf2438395d39762b8e333b632f4486855d534b6f9bedcc281ab17a4dfb75b4

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:07:57 GMT
content-encoding
gzip
last-modified
Thu, 28 Mar 2019 15:53:17 GMT
server
AmazonS3
age
375
etag
"33c5514564fb9d1ec686f2b9ebf5764c"
x-cache
Hit from cloudfront
x-amz-version-id
xFY.oEYYaM1DiVb79UAOcqmE.gm2n5.i
status
200
cache-control
max-age=31536000
accept-ranges
bytes
content-type
application/javascript
content-length
96544
via
1.1 7e6ac12144acebd1fc302708f2ecfad6.cloudfront.net (CloudFront)
x-amz-cf-id
wQdWxTzzShoU6u81jldoHksM6m2If1wCXtWsXRKiTKWq9eUpU1qECw==
rules-p-Jjy-Cyr1NZGRz.js
rules.quantcount.com/
4 KB
2 KB
Script
General
Full URL
https://rules.quantcount.com/rules-p-Jjy-Cyr1NZGRz.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2002:9e00:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
efdbd8582066a12cf45115f1e150d2a8de06bf6b14db3feca98b116efeb9e0bb

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:08:37 GMT
content-encoding
gzip
last-modified
Mon, 19 Mar 2018 22:18:17 GMT
server
AmazonS3
age
562
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=3600
x-amz-cf-id
yPvDwLG0Ik_dI5Nuq6BC_mfQF0Jlywxz_4CTHLKKyGuh-gM_D98QDw==
via
1.1 7ef2c666ec525174bdefd4a6eac457dd.cloudfront.net (CloudFront)
Cookie set dest5.html
condenast.demdex.net/ Frame 5475
0
0
Document
General
Full URL
https://condenast.demdex.net/dest5.html?d_nsid=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.250.76.236 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-250-76-236.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

Host
condenast.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Accept-Encoding
gzip, deflate, br
Cookie
demdex=73112006233325090314185467398967446249
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Fri, 22 Mar 2019 09:54:37 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=73112006233325090314185467398967446249;Path=/;Domain=.demdex.net;Expires=Tue, 24-Sep-2019 18:14:10 GMT;Max-Age=15552000
Vary
Accept-Encoding, User-Agent
X-TID
8oKaf99uTi4=
Content-Length
2764
Connection
keep-alive
id
sstats.arstechnica.com/
49 B
552 B
XHR
General
Full URL
https://sstats.arstechnica.com/id?d_visid_ver=3.3.0&d_fieldgroup=A&mcorgid=F7093025512D2B690A490D44%40AdobeOrg&mid=72944279050004423024204213465717933616&ts=1553796850498
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
eae51c73d3b14ada6fa8a14e661f31630de1a95d1c31a35285c6a4f80ec0f07d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Origin
https://arstechnica.com
Accept-Encoding
gzip, deflate, br
Host
sstats.arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded
Accept
*/*
Cache-Control
no-cache
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Cookie
session_seen_posts=0; seen_posts=; AMP_TOKEN=%24RETRIEVING; sID=47ec056c-cf13-4d04-86ce-b6625bf706df
Connection
keep-alive
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

Date
Thu, 28 Mar 2019 18:14:12 GMT
X-Content-Type-Options
nosniff
Server
Omniture DC/2.0.0
xserver
www7026
Vary
Origin
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/x-javascript
Keep-Alive
timeout=15
Content-Length
49
X-XSS-Protection
1; mode=block
ibs:dpid=411&dpuuid=XJ0O8gAAEkJQTRN_
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=73112006233325090314185467398967446249
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=XJ0O8gAAEkJQTRN_
42 B
769 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XJ0O8gAAEkJQTRN_
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.213.58.51 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-213-58-51.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v025-0dfe6344c.edge-irl1.demdex.com 5.50.0.20190319164038 4ms
Pragma
no-cache
X-TID
uFl0R8qdT00=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Server
AMO-cookiemap/1.1
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=XJ0O8gAAEkJQTRN_
Cache-Control
no-cache
Connection
Keep-Alive
Keep-Alive
timeout=15,max=100
Content-Length
0
publisher:getClientId
ampcid.google.de/v1/
3 B
364 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81e::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
1; mode=block
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1553796850118
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=35932
Date
Thu, 28 Mar 2019 18:14:10 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Fri, 29 Mar 2019 04:13:02 GMT
evidon-sitenotice-tag.js
c.evidon.com/sitenotice/
40 KB
11 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.36.208.73 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-36-208-73.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
dff46486a11e8e9c5785ce5d037c4e9e507511c5cb404a044602c68a777b0e7b

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
10669
last-modified
Wed, 20 Mar 2019 19:57:18 GMT
server
Apache
etag
"a0688cb77159ce22f4bcb1519b8859fc:1553111839"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Fri, 29 Mar 2019 18:14:10 GMT
country.js
c.evidon.com/geo/
260 B
456 B
Script
General
Full URL
https://c.evidon.com/geo/country.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.36.208.73 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-36-208-73.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f9784f57729f84391b084eed9e944e048f771129d65e9b58f34095fdfba86473

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
last-modified
Wed, 30 May 2018 22:23:16 GMT
server
Apache
access-control-allow-origin
*
etag
"c1e367d098d326049811561575dbda4a:1527718996"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
status
200
access-control-max-age
86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
content-length
165
snthemes.js
c.evidon.com/sitenotice/4419/
57 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/snthemes.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.36.208.73 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-36-208-73.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cfcdfbf144964c03b23e6e63abfeeeb923eedda0c421f6279bad5040ef5a3dd1

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3254
last-modified
Thu, 26 Jul 2018 15:49:16 GMT
server
Apache
etag
"4f337c9f26cb2f12ef4d5d50fc716fc2:1532620156"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Fri, 29 Mar 2019 18:14:10 GMT
settings.js
c.evidon.com/sitenotice/4419/arstechnica/
18 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/arstechnica/settings.js
Requested by
Host: assets.adobedtm.com
URL: https://assets.adobedtm.com/6372cf21ef88ee60bc2977a4898dcb5c7945a212/satelliteLib-56a425e07376b6977c987d46ef46ba636a6e2036.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.36.208.73 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-36-208-73.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
34cdcc2da3ff2a7234554eb850346c12c2c61cefaf60396542af6e9d3108ca0d

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3798
last-modified
Fri, 15 Mar 2019 18:36:13 GMT
server
Apache
etag
"603795c9b87c0cb44fec11cd75462ca2:1552674973"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Fri, 29 Mar 2019 18:14:10 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
integrator.js
adservice.google.de/adsid/
109 B
481 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:808::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
481 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
pubads_impl_2019032001.js
securepubads.g.doubleclick.net/gpt/
158 KB
57 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
bdc8bcb85e1e7788db0d066b2d3123a1a7f1d64bc65e63ed8db5d96e01296e25
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 20 Mar 2019 17:54:52 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
58516
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:10 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.93.177 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-93-177.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6d6f482982f8f1a1814e279ff50df4ccc301533ca9655e4d080d6b90ec69d69e

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 16:40:52 GMT
Content-Encoding
gzip
Vary
Origin
Age
5629
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 24 Aug 2018 07:13:51 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Via
1.1 53e3dfdf8efd0c06e5d27cfdbfbe5876.cloudfront.net (CloudFront)
Cache-Control
public, max-age=86400
X-Amz-Cf-Id
74Yf3yOByneBY6zfoN4YB4wX874mhhjRv80N6WUqMgCNUszdlYF0xA==
collect
www.google-analytics.com/
35 B
129 B
Other
General
Full URL
https://www.google-analytics.com/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:13 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j73&tid=UA-31997-1&cid=36730283.1553796851&jid=1759747958&gjid=712940166&_gid=1553478923.1553796851&_u=aGBAgUAjAAQC~&z=18414983
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=36730283.1553796851&jid=1759747958&_v=j73&z=18414983
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=36730283.1553796851&jid=1759747958&_v=j73&z=18414983&slf_rd=1&random=1143785412
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=36730283.1553796851&jid=1759747958&_v=j73&z=18414983&slf_rd=1&random=1143785412
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:815::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:10 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:10 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=36730283.1553796851&jid=1759747958&_v=j73&z=18414983&slf_rd=1&random=1143785412
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
plugin.js
plugin.mediavoice.com/
318 KB
119 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
32e0da7d78bf993fb019ea36703662c7c7dc9bb71b82b8627f520cc6779ea1da

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
cf-cache-status
HIT
cf-ray
4beb950e28cd6409-FRA
status
200
content-length
121070
via
1.1 varnish
x-varnish
2050422300 2050422049
last-modified
Wed, 27 Mar 2019 16:18:17 GMT
server
cloudflare
etag
W/"5c9ba249-4f6e8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Fri, 29 Mar 2019 04:19:20 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
587 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

timing-allow-origin
*
date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country
cache-control
max-age=86400
x-country
DE
cf-ray
4beb950d2b7c96d0-FRA
/
www.facebook.com/tr/
44 B
247 B
Image
General
Full URL
https://www.facebook.com/tr/?id=228464857488266&ev=PageView&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&rl=&if=false&ts=1553796850691&cd[SiteSection]=information%20technology&cd[PageTags]=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cd[Brand]=Pitchfork&sw=1600&sh=1200&v=2.8.45&r=stable&ec=0&o=30&fbp=fb.1.1553796850689.56559126&it=1553796850388&coo=false&rqm=GET
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
content-length
44
expires
Thu, 28 Mar 2019 18:14:10 GMT
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
32 KB
7 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-c32facca0a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.206.32.35 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-206-32-35.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
c98797fe6d3a34048c1188040e698560f2fecc546e34797812f489c5f209158b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
6193
X-XSS-Protection
1; mode=block
X-Request-Id
99a42f2f-6d1b-41a2-9036-a055fdd5f685
X-Runtime
0.002611
X-Backend-Node
10.110.126.151
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"0c8ac3ebd993427971a749975f5ea8c5"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1553796850758&sessionId=03bffcf0-9688-9822-2567-600b0a65795f&url=arstechnica.com&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1553796850118
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.74.236.19 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:11 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
a0b3ee3fe50742cae37361e6cf3de6ba
Content-Length
4
Expires
0
en.js
c.evidon.com/sitenotice/4419/translations/
72 KB
4 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/4419/translations/en.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.36.208.73 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-36-208-73.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
7713f8cd92d4d6de8f561a9974209f8532e11b1db64d9a20efb50cf995609db0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
3963
last-modified
Tue, 14 Aug 2018 17:59:16 GMT
server
Apache
etag
"130e50d48e15fc5162f9707b91233f47:1534269556"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Fri, 29 Mar 2019 18:14:10 GMT
publishertag.js
static.criteo.net/js/ld/
83 KB
25 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
74.119.119.131 Palo Alto, United States, ASN19750 (AS-CRITEO - Criteo Corp., US),
Reverse DNS
Software
nginx /
Resource Hash
b0e82f9ce6c1510f32a8e18c9581ba6573b6988dabdd3f2ed6c1ba08eff85cb9

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:17 GMT
Content-Encoding
gzip
Last-Modified
Thu, 07 Mar 2019 13:26:35 GMT
Server
nginx
ETag
W/"5c811c0b-14ca7"
Transfer-Encoding
chunked
Content-Type
text/javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=86400, public
Timing-Allow-Origin
*
Expires
Fri, 29 Mar 2019 18:14:17 GMT
ids
mid.rkdms.com/
0
402 B
XHR
General
Full URL
https://mid.rkdms.com/ids?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.73 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-73.fra2.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

identity
api.rlcdn.com/api/
0
50 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.193.122.206 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-193-122-206.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

status
202
date
Thu, 28 Mar 2019 18:14:17 GMT
content-length
0
rid
match.adsrvr.org/track/
109 B
525 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.49.216.17 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-49-216-17.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
2aa314326339a63a784ec9c2d6e30598d50d83740b964f239d77e40d25a5184f

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Sat, 27 Apr 2019 18:14:13 GMT
iabevidonmapping.js
iabmap.evidon.com/
6 KB
3 KB
Script
General
Full URL
https://iabmap.evidon.com/iabevidonmapping.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:2a00:10:27b4:f500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c12cfe3245b034d5354184f739ae0b54bcfd061434643d69446737fb395eaf15

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 07:25:37 GMT
content-encoding
gzip
last-modified
Mon, 18 Mar 2019 18:46:52 GMT
server
AmazonS3
age
38931
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-id
MCkbT06ThW7RMrO3lPk1u3PCrEK_yPgvZTcw3kfRDmJuidgy4AbjCA==
via
1.1 6558236a06004e2e5ed43d07e2124e70.cloudfront.net (CloudFront)
evidon-cmp.js
c.evidon.com/sitenotice/
23 KB
7 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-cmp.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.36.208.73 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-36-208-73.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
6444118d84f1e81114a8f2fe394aa7b0edf6bf86668577a67d04e4f7e6bd5718

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
6782
last-modified
Wed, 20 Mar 2019 19:57:19 GMT
server
Apache
etag
"696b5da2be219aa209cb3f50d4818f0e:1553111842"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Fri, 29 Mar 2019 18:14:10 GMT
evidon-banner.js
c.evidon.com/sitenotice/
8 KB
3 KB
Script
General
Full URL
https://c.evidon.com/sitenotice/evidon-banner.js
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.36.208.73 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-36-208-73.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
4b51cad50779921c134fe5f8a46df29da7bdedf5f643c331d192b6057af97992

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
2538
last-modified
Wed, 20 Mar 2019 19:57:19 GMT
server
Apache
etag
"41298c7c9394582aaf744ce4397a8521:1553111841"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400, private;max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
expires
Fri, 29 Mar 2019 18:14:10 GMT
1
l.betrad.com/site/v3/4419/3803/3/1/2/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/1/2/1?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.18.114 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-18-114.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Thu, 28 Mar 2019 18:14:11 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
icong1.png
c.evidon.com/pub/
506 B
822 B
Image
General
Full URL
https://c.evidon.com/pub/icong1.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.36.208.73 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-36-208-73.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
47ecf8e24654258186de2aabeeb592dc0c1f3d071b0f5b48622be67a9fd60c98

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
status
200
access-control-max-age
86400
content-length
529
last-modified
Thu, 02 Jun 2011 18:30:38 GMT
server
Apache
etag
"e06dbc187b21a416c4ef0da5a3fd3829:1307039438"
vary
Accept-Encoding
access-control-allow-methods
GET,OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=86400
access-control-allow-credentials
false
accept-ranges
bytes
access-control-allow-headers
*
5c74019c40f94807b9000000.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady38868002
player.cnevids.com/script/video/
60 KB
19 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5c74019c40f94807b9000000.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady38868002
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-c32facca0a.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.153 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-153.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
e795dc74f48cd95cd5d1161cb25fe63d914478a0658297d89e1aa6567efeb3ad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:11 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
19107
X-XSS-Protection
1; mode=block
X-Request-Id
1523af7f-848d-4079-95de-d5be46323d0e
X-Runtime
0.008741
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"2dacadbef4546742dee240e7c06089ac"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 f2cdeae9faa9c871a27c20811b04af58.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
9_9VeIb6o2NzKK_LmmwTmHkQ5Rv0xYfyVA2uDDzAESxgxEQn5MCsvA==
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 27 Feb 2019 16:48:29 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
2510742
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
adbd00b36667674a
X-Served-By
cache-fra19141-FRA
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1551286109.206125,VS0,VE190
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
xwerOqYYJQwmNc-1YKJEKfAisn-WHuuotUcnF4qV4gKZ3BUbF77GoA==
X-Cache-Hits
0
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 23 Mar 2019 15:54:29 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
947420
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
0fcb1e3f977d8a35
X-Served-By
cache-hhn1523-HHN
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1550764250.379842,VS0,VE183
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
yRtp0L3Ps9pNVKoz31Kl7qLeAVc5Nuu1yR5p28tGfjG7hPRJQN-aYg==
X-Cache-Hits
0
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 17 Mar 2019 15:35:49 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
959979
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
d20856717f768878
X-Served-By
cache-fra19143-FRA
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1550244873.748801,VS0,VE172
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
o2hjWwuRd9yxyY4WKM4i_37TjQFP5SApIJsxLN-uTlXkFetyd94mXw==
X-Cache-Hits
0
arstechnica_sitrep-president-trump-s-missile-defense-strategy.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1548700799/
8 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1548700799/arstechnica_sitrep-president-trump-s-missile-defense-strategy.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
de7e987b13a516c3c85e56d6b661929539d01906f8bd15f4440af2c6ed93d6ab

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 11 Feb 2019 17:05:24 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
1300111
Edge-Cache-Tag
451606510291173075421239350555464354948,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
8338
X-Request-Id
7d27bebea3c736e7
X-Served-By
cache-hhn1525-HHN
Last-Modified
Wed, 30 Jan 2019 18:19:14 GMT
Server
cloudinary
X-Timer
S1549904724.932595,VS0,VE232
ETag
"bcb1adcc61de1e8426163f2fa2a406ba"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
ixFk1zDTTKXLPTev_vA59EZrVR2jT_mi4lhglC8D-EvHZErDsjifoQ==
X-Cache-Hits
0
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 08 Jan 2019 16:38:59 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
1357736
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-fra19129-FRA
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1546965539.158106,VS0,VE116
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
anOdAi-hL1Pa5S2Cv0YNzxyLpkJbYZ0K_QGGbim1ksDIDd8tNG8u1w==
X-Cache-Hits
0
arstechnica_how-does-that-work-rising-sea-levels.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1543950592/
9 KB
10 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1543950592/arstechnica_how-does-that-work-rising-sea-levels.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
dd261883873740a78bac0e65e1cef85b5fcc28635db0ec6c77fdedc60dc88862

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 26 Mar 2019 01:11:19 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
234362
Edge-Cache-Tag
385094425222450584203964863140983279661,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
9655
X-Served-By
cache-hhn1537-HHN
Last-Modified
Thu, 06 Dec 2018 14:36:01 GMT
Server
cloudinary
X-Timer
S1544106963.502265,VS0,VE111
ETag
"bda75cc62fe7e0ea855b01b75e00e673"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
jWY3UTG_mUGXQuMknxeApe7XpygSjFTR4K_qcXvvKrUUzee482XWPw==
X-Cache-Hits
0
arstechnica_hybrid-options-for-us-s-next-top-fighter.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1543245409/
6 KB
7 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1543245409/arstechnica_hybrid-options-for-us-s-next-top-fighter.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
e014974a17d0f6e6775b4fcf5e53e2b0f3570edc070104c75d34a07d8dac4cc5

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 28 Nov 2018 15:14:37 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
1876769
Edge-Cache-Tag
283442808216472163809384800557055011655,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
6586
X-Served-By
cache-hhn1535-HHN
Last-Modified
Wed, 28 Nov 2018 14:30:45 GMT
Server
cloudinary
X-Timer
S1543418077.346624,VS0,VE114
ETag
"8a94ee8d7c54e8d420f337a0b28fb6a6"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
CMYb102MEIJe3rdRli080BrNwIALMR86S9bpsUWqhObODuz6tim7pA==
X-Cache-Hits
0
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 09 Nov 2018 14:44:56 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
1878655
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
0d3c8bdfb997f2cc
X-Served-By
cache-fra19130-FRA
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1541774697.715247,VS0,VE188
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
4oLsq44wDjXgx6gHTTHjFGO6wMGW1tgmk7uWcsQLSJUPGs8hOWUTFA==
X-Cache-Hits
0
arstechnica_star-control-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1540238325/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1540238325/arstechnica_star-control-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
5ecce433fdd65965f4acae00993b06c37d0f4960c18b36312efbf96471f95474

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Tue, 23 Oct 2018 16:50:31 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
1706452
Edge-Cache-Tag
530064111679661360080335205530300069954,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10583
X-Served-By
cache-hhn1536-HHN
Last-Modified
Tue, 23 Oct 2018 16:50:21 GMT
Server
cloudinary
X-Timer
S1540313432.546501,VS0,VE110
ETag
"adccb40ff91a04ac0066ab46e3c60f86"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
fwQppP3wNgaCJq9iX-NGZxhV680SG3zhLbRSEKUDLgfDpBz7rvcriw==
X-Cache-Hits
0
arstechnica_war-stories-serious-sam.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1538576823/
13 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1538576823/arstechnica_war-stories-serious-sam.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
ed86af54b875e74d1f45f0e835237ecb7f8d1bd3f06d51c9586576ef756a372e

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 16:48:03 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
349470
Edge-Cache-Tag
302283555134930517008734674519776029634,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13034
X-Served-By
cache-hhn1547-HHN
Last-Modified
Wed, 03 Oct 2018 18:45:04 GMT
Server
cloudinary
X-Timer
S1538592324.341440,VS0,VE112
ETag
"5ad02d5b6b61591f35f1a938c31ee9e9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
hraNrIhZZ_ulAYVja3VdScAdfANePBDCDikf6nXLXP9FiVkkUP7tsw==
X-Cache-Hits
0
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 21 Sep 2018 16:52:00 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
2138418
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
092ada77d20f151a
X-Served-By
cache-fra19122-FRA
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1537548721.578441,VS0,VE161
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
WMjTJja_Wh5HAK-uQ0yT0Y9j5H25IAiHnmgT9CMLXOQf3ZZd8HD0Fg==
X-Cache-Hits
0
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 06 Jul 2018 19:56:52 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
1810983
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-fra19125-FRA
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1530907012.936576,VS0,VE114
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
unens3ovEtMWlRowNQRk5ACLud__Da1vSvZr2vp8pf56wvhU8RRUgQ==
X-Cache-Hits
0
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 06 Jul 2018 19:56:52 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
1878356
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
2c586190b5f04277
X-Served-By
cache-hhn1529-HHN
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1530907012.372106,VS0,VE153
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
RCV5jvzESwkUzWxESno77x3nUmwRrvwhrdrAuvdw2Qwj9DSOIusdKQ==
X-Cache-Hits
0
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 05:17:06 GMT
Via
1.1 varnish, 1.1 35df23774438ec8a6c97dd0fb08fcb73.cloudfront.net (CloudFront)
Age
385866
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
bb3d79146157beb6
X-Served-By
cache-fra19125-FRA
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1530907012.103758,VS0,VE151
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
Yn_z7ZxwBh9zX9Sr-rHecJNS-L5mEyOh7X1SLZdnW6tPKMwptnUn2w==
X-Cache-Hits
0
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
20312
l.betrad.com/site/v3/4419/3803/3/1/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/1/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.18.114 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-18-114.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Thu, 28 Mar 2019 18:14:11 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
20312
l.betrad.com/site/v3/4419/3803/3/2/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/2/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.18.114 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-18-114.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Thu, 28 Mar 2019 18:14:11 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
track.php
t.skimresources.com/api/
22 B
409 B
XHR
General
Full URL
https://t.skimresources.com/api/track.php
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 Ann Arbor, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:10 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
warning
299 - "Deprecated API"
alt-svc
clear
content-length
22
link
t.skimresources.com/api/
22 B
92 B
XHR
General
Full URL
https://t.skimresources.com/api/link
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 Ann Arbor, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:10 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
warning
299 - "Deprecated API"
alt-svc
clear
content-length
22
vendorlist.json
vendorlist.consensu.org/
77 KB
15 KB
XHR
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:200c:5400:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
206f0eabacd22ac264d69e707b23dbf1d62c7a71fec411fb1705d41d10f3d3b8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

x-amz-version-id
_fia.YnZ1x5w_3lCYfgDlmWXHJCpA74h
content-encoding
gzip
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
78513
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 21 Mar 2019 16:00:22 GMT
server
AmazonS3
date
Wed, 27 Mar 2019 20:26:34 GMT
access-control-max-age
86400
access-control-allow-methods
GET
content-type
application/json; charset=utf-8
via
1.1 ed522e38bfbcd76f653d4691110d92a1.cloudfront.net (CloudFront)
cache-control
max-age=259200
x-amz-cf-id
24b-KvyIPe-fsfgSZqAkEQ4TS-lybGQXjhTo7maEaClJ_RMeHAjyfg==
20312
l.betrad.com/site/v3/4419/3803/3/4/2/1/
0
120 B
Image
General
Full URL
https://l.betrad.com/site/v3/4419/3803/3/4/2/1/20312?consent=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.199.18.114 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-18-114.compute-1.amazonaws.com
Software
/ Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
204
date
Thu, 28 Mar 2019 18:14:11 GMT
content-encoding
gzip
etag
W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI"
x-powered-by
Express
vary
Accept-Encoding
user
4d.condenastdigital.com/
46 B
410 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=87b98178-6df9-4410-a13d-de79e65e3fc2
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/services.min.js?1553796000
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.204.40.232 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-204-40-232.compute-1.amazonaws.com
Software
/
Resource Hash
b9ec3ae0166b258389fe1f16ff8c7711e313a5596c00ace75b1432a8ba595000

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 18:14:10 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
show_companion_ad.js
pagead2.googlesyndication.com/pagead/
163 KB
61 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_companion_ad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
f73ceb0acd72bd4d50b54591471a2e052b1960b4f005b090eca307501cc37d6c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:02:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
682
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
62379
x-xss-protection
0
server
cafe
etag
8914855523793955095
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Thu, 28 Mar 2019 19:02:49 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A10.952Z&_t=library_gpt&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&init=2143.2100012898445&requestEnd=1622.2650036215782&requestStart=1530.280001461506&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
user
4d.condenastdigital.com/
46 B
410 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=986a734d-80d7-4ef6-9a7b-2e48857327ac
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.174.217.231 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-174-217-231.compute-1.amazonaws.com
Software
/
Resource Hash
c5b55969867327b704e34b19e50ad31593cb726ff89a42ed3572b69307c8e706

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:11 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
getcookie
evidon.mgr.consensu.org/iab/
169 B
380 B
Script
General
Full URL
https://evidon.mgr.consensu.org/iab/getcookie
Requested by
Host: c.evidon.com
URL: https://c.evidon.com/sitenotice/evidon-cmp.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.85.9.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-85-9-53.compute-1.amazonaws.com
Software
/
Resource Hash
9b133863146a5f391e8cee0842cafc7498ae89b6f79edbecfc842055342c1fe2

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:11 GMT
access-control-allow-origin
*
x-amzn-requestid
495b481c-5185-11e9-a506-89c88b2e30b3
content-type
text/javascript
status
200
x-amzn-trace-id
Root=1-5c9d0ef3-a3611cceef0139271503f0bb;Sampled=0
x-amz-apigw-id
XQ9GCGcEoAMF11w=
content-length
169
57
p.ad.gt/api/v1/p/passive/a186ba14d33f6e62aa51245e5a087215/b204da9c-434f-454d-8a29-4c97d1af7d57/
50 KB
14 KB
Script
General
Full URL
https://p.ad.gt/api/v1/p/passive/a186ba14d33f6e62aa51245e5a087215/b204da9c-434f-454d-8a29-4c97d1af7d57/57
Requested by
Host: a.ad.gt
URL: https://a.ad.gt/api/v1/u/matches/57
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.164.143 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-164-143.us-west-2.compute.amazonaws.com
Software
nginx/1.10.1 / Express
Resource Hash
bcd1d30d2f17a43147b496cd3a073297cbde2d496d516fa77a28ba90c89fd5e0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:14 GMT
Content-Encoding
gzip
Server
nginx/1.10.1
X-Powered-By
Express
ETag
W/"c962-rIU1FrHZH6+hTcVWc3Uv6Yz3oeo"
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/html; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Connection
keep-alive
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Content-Length
13174
match
ids.ad.gt/api/v1/
Redirect Chain
  • https://secure.adnxs.com/getuid?https://ids.ad.gt/api/v1/match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&adnxs_id=$UID
  • https://secure.adnxs.com/bounce?%2Fgetuid%3Fhttps%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fmatch%3Fid%3Db204da9c-434f-454d-8a29-4c97d1af7d57%26adnxs_id%3D%24UID
  • https://ids.ad.gt/api/v1/match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&adnxs_id=914063140411019253
43 B
577 B
Image
General
Full URL
https://ids.ad.gt/api/v1/match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&adnxs_id=914063140411019253
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:18 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 29 Mar 2019 06:14:18 GMT

Redirect headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:20 GMT
AN-X-Request-Uuid
123688f0-fa19-410c-8ec9-586aa914433d
Content-Type
text/html; charset=utf-8
Server
nginx/1.13.4
Location
https://ids.ad.gt/api/v1/match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&adnxs_id=914063140411019253
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
X-Proxy-Origin
185.216.33.24; 185.216.33.24; 314.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.80:80
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
t_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://match.adsrvr.org/track/cmf/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=b204da9c-434f-454d-8a29-4c97d1af7d57
  • https://match.adsrvr.org/track/cmb/generic?ttd_pid=8gkxb6n&ttd_tpi=1&gpdr=0&ttd_puid=b204da9c-434f-454d-8a29-4c97d1af7d57
  • https://ids.ad.gt/api/v1/t_match?tdid=b31160cd-4536-488e-a96e-814d736ce7d7&id=b204da9c-434f-454d-8a29-4c97d1af7d57
43 B
607 B
Image
General
Full URL
https://ids.ad.gt/api/v1/t_match?tdid=b31160cd-4536-488e-a96e-814d736ce7d7&id=b204da9c-434f-454d-8a29-4c97d1af7d57
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:15 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Fri, 29 Mar 2019 06:14:15 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:13 GMT
x-aspnet-version
4.0.30319
location
https://ids.ad.gt/api/v1/t_match?tdid=b31160cd-4536-488e-a96e-814d736ce7d7&id=b204da9c-434f-454d-8a29-4c97d1af7d57
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
302
cache-control
private,no-cache, must-revalidate
content-type
text/html
content-length
259
g_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm&google_sc&google_ula=450542624&id=b204da9c-434f-454d-8a29-4c97d1af7d57
  • https://cm.g.doubleclick.net/pixel?google_nid=audigent_w_appnexus_3985&google_cm=&google_sc=&google_ula=450542624&id=b204da9c-434f-454d-8a29-4c97d1af7d57&google_tc=
  • https://ids.ad.gt/api/v1/g_match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&google_gid=CAESENkXT2UY0dVQyHdJmbiOdKg&google_cver=1&google_ula=450542624,0
43 B
586 B
Image
General
Full URL
https://ids.ad.gt/api/v1/g_match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&google_gid=CAESENkXT2UY0dVQyHdJmbiOdKg&google_cver=1&google_ula=450542624,0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:12 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 29 Mar 2019 06:14:12 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:11 GMT
server
HTTP server (unknown)
location
https://ids.ad.gt/api/v1/g_match?id=b204da9c-434f-454d-8a29-4c97d1af7d57&google_gid=CAESENkXT2UY0dVQyHdJmbiOdKg&google_cver=1&google_ula=450542624,0
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
302
cache-control
no-cache, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
357
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
adb_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://dpm.demdex.net/ibs:dpid=348447&dpuuid=b204da9c-434f-454d-8a29-4c97d1af7d57&redir=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fadb_match%3Fadb%3D%24%7BDD_UUID%7D%26id%3Db204da9c-434f-454d-8a29-4c97d...
  • https://ids.ad.gt/api/v1/adb_match?adb=73112006233325090314185467398967446249&id=b204da9c-434f-454d-8a29-4c97d1af7d57
43 B
609 B
Image
General
Full URL
https://ids.ad.gt/api/v1/adb_match?adb=73112006233325090314185467398967446249&id=b204da9c-434f-454d-8a29-4c97d1af7d57
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.160.176.109 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-35-160-176-109.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:12 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Fri, 29 Mar 2019 06:14:12 GMT

Redirect headers

Pragma
no-cache
X-TID
lFO24GCjQI8=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Location
https://ids.ad.gt/api/v1/adb_match?adb=73112006233325090314185467398967446249&id=b204da9c-434f-454d-8a29-4c97d1af7d57
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
pbm_match
ids.ad.gt/api/v1/
Redirect Chain
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Db204da9c-434f-454d-8a29-4c97d1af7d57
  • https://image2.pubmatic.com/AdServer/UCookieSetPug?ird=1&rd=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fpbm_match%3Fpbm%3D%23PM_USER_ID%26id%3Db204da9c-434f-454d-8a29-4c97d1af7d57
  • https://ids.ad.gt/api/v1/pbm_match?pbm=AFF0E7D5-E758-465B-9BD4-422CC7181340&id=b204da9c-434f-454d-8a29-4c97d1af7d57
43 B
607 B
Image
General
Full URL
https://ids.ad.gt/api/v1/pbm_match?pbm=AFF0E7D5-E758-465B-9BD4-422CC7181340&id=b204da9c-434f-454d-8a29-4c97d1af7d57
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:18 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
transfer-encoding
chunked
Expires
Fri, 29 Mar 2019 06:14:18 GMT

Redirect headers

Location
https://ids.ad.gt/api/v1/pbm_match?pbm=AFF0E7D5-E758-465B-9BD4-422CC7181340&id=b204da9c-434f-454d-8a29-4c97d1af7d57
Date
Thu, 28 Mar 2019 18:14:18 GMT
X-Cnection
close
Server
Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.1e-fips mod_fastcgi/2.4.6
Content-Length
439
Content-Type
text/html; charset=iso-8859-1
cm
p.rfihub.com/
0
0

ptrack-v1.2.0-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
39 KB
15 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.2.0-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.235 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-235.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
f77676385ed899908297ac3d793b6f79b7a342438ba59b9878678c42a8a7ffa1

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
public
Date
Thu, 03 Jan 2019 23:57:31 GMT
Content-Encoding
gzip
Last-Modified
Thu, 03 Jan 2019 22:59:57 GMT
Server
nginx
Age
7237000
ETag
W/"5c2e93ed-9c5a"
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 53e3dfdf8efd0c06e5d27cfdbfbe5876.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
Connection
keep-alive
X-Amz-Cf-Id
9qFzuokDGa_WWXoNIYWMr_jaS8ztxTsE98Az8aDVQNku5NRAv-dBnw==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
Cookie set /
www.medtargetsystem.com/beacon/portal/ Frame E29A
0
0
Document
General
Full URL
https://www.medtargetsystem.com/beacon/portal/?_url=https%3A%2F%2Farstechnica.com&_sid=1484181f-b953-40dc-aba5-1383acce7a46&_vid=a2eee75d-75ee-4015-bb5e-5e7c49a1f394&_ak=119-556-B0E9F642&_flash=false&_th=1553796850|1553796850|1
Requested by
Host: www.medtargetsystem.com
URL: https://www.medtargetsystem.com/javascript/beacon.js?v2.5.12
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash

Request headers

Host
www.medtargetsystem.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Content-Encoding
gzip
Content-Type
text/html; charset=UTF-8
Date
Thu, 28 Mar 2019 18:14:11 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
P3P
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma
no-cache
Server
Apache/2.4.7 (Ubuntu)
Set-Cookie
DMDSESSID=aordmjvl06nc8rno4ieu4eq314; path=/; HttpOnly
Vary
X-Forwarded-Proto,Accept-Encoding
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
6419
Connection
keep-alive
collect.gif
www.medtargetsystem.com/analytics/
0
245 B
Image
General
Full URL
https://www.medtargetsystem.com/analytics/collect.gif?e=1&aid=&vid=a2eee75d-75ee-4015-bb5e-5e7c49a1f394&sid=1484181f-b953-40dc-aba5-1383acce7a46&vh=1&vt=1553796850&pt=1553796850&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&r=&t=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw%20%7C%20Ars%20Technica&p=2377.00&pm=&ab=&ak=119-556-B0E9F642
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.171.116 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-3-171-116.compute-1.amazonaws.com
Software
Apache/2.4.7 (Ubuntu) / PHP/7.0.19-1+deb.sury.org~trusty+2
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:11 GMT
Server
Apache/2.4.7 (Ubuntu)
Connection
keep-alive
X-Powered-By
PHP/7.0.19-1+deb.sury.org~trusty+2
Content-Length
0
Vary
X-Forwarded-Proto
Content-Type
text/html; charset=UTF-8
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A11.194Z&_t=pageview&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&_o=ars-technica&_c=general&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
get
odb.outbrain.com/utils/
14 KB
9 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=01020507&apv=false&sig=6gw7Prf2&format=vjapi&rand=93640&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1553796850118
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.2 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
ee24d1ca5624bc0425f2c7be317e15171c4d1debc0de09880d922bf61f33bea3
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-served-by
cache-jfk8138-JFK, cache-hhn1546-HHN
pragma
no-cache
x-timer
S1553796852.725389,VS0,VE141
date
Thu, 28 Mar 2019 18:14:11 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.38
accept-ranges
bytes, bytes
x-cache-hits
0, 0
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5c74019c40f94807b9000000&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5c74019c40f94807b9000000.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady38868002
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.230.95.26 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-54-230-95-26.fra2.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
4cb700c88dc3f246d9375b74a6b8649e1662b70ebec21ad4653cb2d0ab61ecb2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 18:13:43 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
27
X-Cache
Hit from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2046
X-XSS-Protection
1; mode=block
X-Request-Id
686028fe-d709-4bd4-9336-f41e9413df1e
X-Runtime
0.009106
X-Backend-Node
10.110.45.152
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"8db4f41bf939e7f5e9b89cb92bd3791a"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 ae322f9f82b436687f3bcaf36433b2bb.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
zaluQj903Y6rOof77B0-kLShrdEdclfPoFiEkD6JSdcsu1WeDpJhIA==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame A13D
243 KB
83 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5c74019c40f94807b9000000.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady38868002
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b2bbbf299b9ef55b814e7837cce59810e13f4d07dd4c9b035435ee106183499b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
85023
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:11 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
61 KB
22 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5c74019c40f94807b9000000.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady38868002
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
247c84ddd74a3379f040a73e56b599cd2b4e1bfdc0a634666f145a2b980d0e07
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:06:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 27 Mar 2019 17:11:07 GMT
server
sffe
age
459
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
22750
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:21:32 GMT
player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame A13D
74 KB
11 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5c74019c40f94807b9000000.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady38868002
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-32.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4cc07db5e979ec8fc492f1cd9d88391360460adc0d8ce6ae568d50cc084da3e0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Wed, 13 Feb 2019 16:48:53 GMT
content-encoding
gzip
last-modified
Wed, 06 Feb 2019 15:32:39 GMT
server
AmazonS3
age
3720320
etag
"4acddbd24b10301fdc4909837b98a5bf"
x-cache
Hit from cloudfront
content-type
text/css; charset=utf-8
status
200
cache-control
max-age=63072000, public
accept-ranges
bytes
content-length
11327
via
1.1 a2289d8b15b881db1c42086062568883.cloudfront.net (CloudFront)
x-amz-cf-id
rJbEVIjSLt1-1fiMfKOMrjSALyQRunVfsMrdWXRS7eerxEv1kPep_Q==
expires
Tue, 01 Jan 2030 00:00:00 GMT
main-5f76ee91f42b53ea57b3.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame A13D
910 KB
226 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5c74019c40f94807b9000000.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady38868002
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.140 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-140.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
c3342303f41612974a86ed42c07380b83800874c429b0ff35ca160bd3e43ca98

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Wed, 27 Mar 2019 16:40:22 GMT
Content-Encoding
gzip
Last-Modified
Wed, 20 Mar 2019 14:40:39 GMT
Server
AmazonS3
Age
92033
ETag
"075291ebb4ae8d56aa088e9260610aed"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 503a28017d94e3a67757eb66ee760010.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
231222
X-Amz-Cf-Id
8HQ5wZozZVtYDj8jMgYIIFmkUf1gLlbK0iFCIDqAHGXhB2x-gNg50Q==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
/
www.facebook.com/tr/ Frame 114D
0
0
Document
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8083:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash

Request headers

:method
POST
:authority
www.facebook.com
:scheme
https
:path
/tr/
content-length
2526
pragma
no-cache
cache-control
no-cache
origin
https://arstechnica.com
upgrade-insecure-requests
1
content-type
application/x-www-form-urlencoded
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
accept-encoding
gzip, deflate, br
cookie
fr=0IrIiunfcDRKZYKBM..BcnQ7y...1.0.BcnQ7y.
Origin
https://arstechnica.com
Upgrade-Insecure-Requests
1
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/

Response headers

status
200
content-type
text/plain
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-length
0
server
proxygen-bolt
date
Thu, 28 Mar 2019 18:14:11 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A11.374Z&_t=slot_staged&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=25770.380952380954&image_count=21&image_surface=541178&server=production&vp_height=1200&vp_width=1585&created=2556.1349987983704&staged=2564.5650029182434&pageload_to_staged=2564.5650029182434&channel=information_technology&ctx_template=article&id=155379685136565p4aidblenkqwdf4knygq8wjygohp&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&tags=exploits_malware_vulnerabilities_winrar&template=article&type=post_nav&CNS_init=1192.6049962639809&CNS_init_to_staged=1371.9600066542625&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:11 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A11.391Z&_t=slot_staged&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=25770.380952380954&image_count=21&image_surface=541178&server=production&vp_height=1200&vp_width=1585&created=2558.6849972605705&staged=2582.269996404648&pageload_to_staged=2582.269996404648&channel=information_technology&ctx_template=article&id=1553796851367yuwnjhzl5w1rem6dq8oudizhuowpie&instance=0&name=siderail_0&position_fold=atf&position_xy=145x0&tags=exploits_malware_vulnerabilities_winrar&template=article&type=siderail&CNS_init=1192.6049962639809&CNS_init_to_staged=1389.665000140667&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:12 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A11.401Z&_t=slot_staged&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=25770.380952380954&image_count=21&image_surface=541178&server=production&vp_height=1200&vp_width=1585&created=2559.550002217293&staged=2592.6050022244453&pageload_to_staged=2592.6050022244453&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&tags=exploits_malware_vulnerabilities_winrar&template=article&type=native_xrail&CNS_init=1192.6049962639809&CNS_init_to_staged=1400.0000059604645&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:12 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A11.408Z&_t=slot_staged&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=25770.380952380954&image_count=21&image_surface=541178&server=production&vp_height=1200&vp_width=1585&created=2560.29000133276&staged=2599.210001528263&pageload_to_staged=2599.210001528263&channel=information_technology&ctx_template=article&id=1553796851369zbpd2to83yndru2ah0fzkqulqxesfi&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=exploits_malware_vulnerabilities_winrar&template=article&type=out_of_page&CNS_init=1192.6049962639809&CNS_init_to_staged=1406.6050052642822&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:12 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
bid
aax.amazon-adsystem.com/e/dtb/
47 B
344 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pid=7739863187491553796850593&cb=3354280647261553796851440&ws=1600x1200&v=7.27.00&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_155379685136565p4aIdblEnKqWDF4kNYgQ8wjygoHP_post_nav_0_container%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%7D%5D&pj=%7B%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.220.16 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
bd748f38b10a4c5b88d9b094da43237969abe59799df7b83386b222b80e87036

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 18:14:14 GMT
Server
Server
Vary
User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
47
bid
aax.amazon-adsystem.com/e/dtb/
47 B
344 B
XHR
General
Full URL
https://aax.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pid=7739863187491553796850593&cb=5527039750281553796851442&ws=1600x1200&v=7.27.00&t=2000&slots=%5B%7B%22sd%22%3A%22cns_ads_1553796851367YuwNjhzl5w1REM6Dq8oUdiZHUOwpie_siderail_0_container%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%7D%5D&pj=%7B%22apse%22%3A%7B%22chunkRequests%22%3Afalse%2C%22shouldSampleLatency%22%3Afalse%7D%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.94.220.16 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
Server /
Resource Hash
0f152048bdc37a874bc00bac62ec24c5abb165656391d6dd69de75cbc50096c9

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 18:14:14 GMT
Server
Server
Vary
User-Agent
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
https://arstechnica.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
47
cygnus
as-sec.casalemedia.com/
66 B
945 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A61524199%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%221%22%2C%22siteID%22%3A%22175689%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%222%22%2C%22siteID%22%3A%22175690%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%223%22%2C%22siteID%22%3A%22175691%22%7D%2C%22id%22%3A%223%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.4 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-4.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9f748b950aa45fd254a0326260aa66999cb3b4c394d71b63a4962cb0608dbf29

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:18 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Thu, 28 Mar 2019 18:14:18 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
239 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.10198362446802722
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
583d589ec64e61702eaf9d916c1703522640591b69cce2b0b823c2a0f46e88e1

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:12 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=7
Content-Length
239
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
240 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=57&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.9483346087110756
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
26bec92d1b71a7930f48379949a8e19ea6952284046c51d32a799b6d3e86fe77

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:12 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=7
Content-Length
240
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
240 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=55&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.11459617549055068
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
ab45880e538a82696eea7a3423cf1c590a3ed5921ba6656709a5caa3c98b9b8e

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:12 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=7
Content-Length
240
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa;
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
945 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=175689&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A21498675%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2210%22%2C%22siteID%22%3A%22175698%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2211%22%2C%22siteID%22%3A%22175699%22%7D%2C%22id%22%3A%222%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A1050%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2212%22%2C%22siteID%22%3A%22175700%22%7D%2C%22id%22%3A%223%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.4 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-4.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
0be304ea0acaa5fb5dd9e8f1275469a5e5d98530a666c9dc82b1898894a1e816

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:18 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
text/javascript
Content-Length
86
Expires
Thu, 28 Mar 2019 18:14:18 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
236 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.6033174116965532
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
0f470ad8d333c9e93c2acd6a1665c9e725569eb07f957ec633a6c65e70ed4b5b

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:12 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=8
Content-Length
236
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
236 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=10&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.1796530052614318
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
c149e1c3c025bf96853c023acc499531751beec4dcc79c021e3b91c686cc4dd3

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:13 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=5
Content-Length
236
Expires
Wed, 17 Sep 1975 21:32:10 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
240 B
2 KB
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=54&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&p_screen_res=1600x1200&site_id=196712&zone_id=960274&kw=rp.fastlane&tk_flint=index&rand=0.6447134973023094
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
213.19.162.61 , United Kingdom, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
432d9889eb352134cef6126512c0a8ed0b2a06f85120e1ce788d60ea8df770b2

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:13 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=0, max=9
Content-Length
240
Expires
Wed, 17 Sep 1975 21:32:10 GMT
local_storage_frame10.min.html
assets.bounceexchange.com/assets/bounce/ Frame 528F
0
0
Document
General
Full URL
https://assets.bounceexchange.com/assets/bounce/local_storage_frame10.min.html
Requested by
Host: assets.bounceexchange.com
URL: https://assets.bounceexchange.com/assets/smart-tags/versioned/ijs_all_modules_6232c7c7ac857bfc2f1a5270ad0d5c03.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
216.137.61.155 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-216-137-61-155.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
assets.bounceexchange.com
:scheme
https
:path
/assets/bounce/local_storage_frame10.min.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/

Response headers

status
200
content-type
text/html
content-length
995
date
Tue, 05 Feb 2019 00:08:24 GMT
last-modified
Thu, 06 Dec 2018 22:10:11 GMT
etag
"55fccc7bc73db2181e976f1ccec90e2c"
cache-control
max-age=31536000
content-encoding
gzip
x-amz-version-id
iR64T.LKj_uq4qI1dcEGfT66vRlvUKzS
accept-ranges
bytes
server
AmazonS3
age
4471548
x-cache
Hit from cloudfront
via
1.1 7e6ac12144acebd1fc302708f2ecfad6.cloudfront.net (CloudFront)
x-amz-cf-id
s7Q8xB-HxBh7l9HXdAkwSpHGTITUHpWvBj-JSOc8xftHWldWD03sAA==
eyJpdSI6IjZlNTMwMzZiMDg5OWEyZWY3NDU5NTg0NTg4ODU4M2Q3MzI5M2NiNzY0ZWVlZmMxMGJlZWNlNDFjZWYyOGMzODAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
3 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjZlNTMwMzZiMDg5OWEyZWY3NDU5NTg0NTg4ODU4M2Q3MzI5M2NiNzY0ZWVlZmMxMGJlZWNlNDFjZWYyOGMzODAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
1bef4225ffc59fb3b04d8c9f7867f9ab36ac8b2a8be09195a78c9a232f4f05d7
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 12 Mar 2019 21:41:56 GMT
Date
Thu, 28 Mar 2019 18:14:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2037312
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
3428
eyJpdSI6ImYyODlkYTMyMmI0N2FjNmRhYTVkZTg0YzRiM2IzNzRiMmRlODIwMDM0YTg4ZWFjNDQ1ZjVlZjczYWQwMWEyZWEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
5 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImYyODlkYTMyMmI0N2FjNmRhYTVkZTg0YzRiM2IzNzRiMmRlODIwMDM0YTg4ZWFjNDQ1ZjVlZjczYWQwMWEyZWEiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
043e0a19c1f17d32514109292cfe22910217f322f3578af73db78105edb02996
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 21 Feb 2019 19:34:22 GMT
Date
Thu, 28 Mar 2019 18:14:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1305010
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
5326
eyJpdSI6ImZlMjRjN2I4MzRiZTI1YWZkMjliYzc0MzJiMzA5NTBmNDc1MmQ2YTViNjg5MzQ3M2E3ZWFhMWRkZGU5NjQ0ODMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
14 KB
15 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImZlMjRjN2I4MzRiZTI1YWZkMjliYzc0MzJiMzA5NTBmNDc1MmQ2YTViNjg5MzQ3M2E3ZWFhMWRkZGU5NjQ0ODMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ecdde76d076e23eecbc61fa8d6123b17d00f8bd2ca902d62a5fde70b1d2e32c1
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 11 Mar 2019 12:44:24 GMT
Date
Thu, 28 Mar 2019 18:14:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1473414
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
14796
eyJpdSI6IjM0Mzc1NDU4MDE4NWNlNzQwY2QwYjk0MTJkNzZiMmIwNzY3OGUwNDNlYjQxZmZjOWUxNmZmMDI1MjUwMzQzYTMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
8 KB
8 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjM0Mzc1NDU4MDE4NWNlNzQwY2QwYjk0MTJkNzZiMmIwNzY3OGUwNDNlYjQxZmZjOWUxNmZmMDI1MjUwMzQzYTMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
712fd9fdf44c8c6a7ddceef60ced4f15abbca3ebc4d6fbc91102df60d91c705c
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 06 Mar 2019 15:59:38 GMT
Date
Thu, 28 Mar 2019 18:14:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=957524
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
7908
eyJpdSI6ImEzMDJhMGEwZjViYjJhNzBmN2M5NTUyZDkzNTQ3ZjgwZDgyNGIxYWI2OWI2ZTdkN2ZmMWRjMzhlZWIyNjY5MGUiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
10 KB
10 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImEzMDJhMGEwZjViYjJhNzBmN2M5NTUyZDkzNTQ3ZjgwZDgyNGIxYWI2OWI2ZTdkN2ZmMWRjMzhlZWIyNjY5MGUiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f653f3e2bb220625797727a33060ab99a40dd802ec8a0491242f2a3b4c89f3ae
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 05 Mar 2019 10:05:26 GMT
Date
Thu, 28 Mar 2019 18:14:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1034075
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
10012
eyJpdSI6IjQ0NDM4NmU1YTVhNDQ5MGNkMWU2Nzc1N2QxOTFkNzJlYmYwYjNmNjY1N2U3ZDYxZWVmNzYwZDk1MjM1NWFhMWYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
8 KB
8 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjQ0NDM4NmU1YTVhNDQ5MGNkMWU2Nzc1N2QxOTFkNzJlYmYwYjNmNjY1N2U3ZDYxZWVmNzYwZDk1MjM1NWFhMWYiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.58.216.21 Amsterdam, Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-58-216-21.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c501aac51b08b6be6b93882f14a1dba4e34858f36904e4da63c8f159fcb4a286
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 14 Mar 2019 20:31:54 GMT
Date
Thu, 28 Mar 2019 18:14:12 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1786134
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
7922
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A12.391Z&_t=slot_requested&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=20043.62962962963&image_count=27&image_surface=541178&server=production&vp_height=1200&vp_width=1585&created=2556.1349987983704&staged=2564.5650029182434&pageload_to_staged=2564.5650029182434&channel=information_technology&ctx_template=article&id=155379685136565p4aidblenkqwdf4knygq8wjygohp&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&tags=exploits_malware_vulnerabilities_winrar&template=article&type=post_nav&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1371.9600066542625&inViewport=2580.4499983787537&pageLoad_to_in_viewport=1387.8450021147728&isRefresh=true&is_first_Request=true&requested=3582.6549977064133&pageLoad_to_requested=3582.6549977064133&CNS_init_to_requested=2390.0500014424324&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.4 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-4.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:13 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 28 Mar 2019 18:14:13 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A12.401Z&_t=slot_requested&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=20043.62962962963&image_count=27&image_surface=541178&server=production&vp_height=1200&vp_width=1585&created=2558.6849972605705&staged=2582.269996404648&pageload_to_staged=2582.269996404648&channel=information_technology&ctx_template=article&id=1553796851367yuwnjhzl5w1rem6dq8oudizhuowpie&instance=0&name=siderail_0&position_fold=atf&position_xy=145x0&tags=exploits_malware_vulnerabilities_winrar&template=article&type=siderail&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1389.665000140667&inViewport=2592.079997062683&pageLoad_to_in_viewport=1399.4750007987022&isRefresh=true&requested=3592.820003628731&pageLoad_to_requested=3592.820003628731&CNS_init_to_requested=2400.21500736475&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=175689&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/htw-condenast.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
95.100.198.4 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-4.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:13 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Thu, 28 Mar 2019 18:14:13 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A12.407Z&_t=slot_requested&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=20043.62962962963&image_count=27&image_surface=541178&server=production&vp_height=1200&vp_width=1585&created=2559.550002217293&staged=2592.6050022244453&pageload_to_staged=2592.6050022244453&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&tags=exploits_malware_vulnerabilities_winrar&template=article&type=native_xrail&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1400.0000059604645&inViewport=2597.9499965906143&pageLoad_to_in_viewport=1405.3450003266335&isRefresh=true&requested=3598.6199975013733&pageLoad_to_requested=3598.6199975013733&CNS_init_to_requested=2406.0150012373924&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A12.415Z&_t=slot_requested&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=febd88e7-8070-4f6f-89b0-8fab65d17ab1&sID=47ec056c-cf13-4d04-86ce-b6625bf706df&pID=22510819-e20b-4472-bd27-5575f3b83526&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=20043.62962962963&image_count=27&image_surface=541178&server=production&vp_height=1200&vp_width=1585&created=2560.29000133276&staged=2599.210001528263&pageload_to_staged=2599.210001528263&channel=information_technology&ctx_template=article&id=1553796851369zbpd2to83yndru2ah0fzkqulqxesfi&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&tags=exploits_malware_vulnerabilities_winrar&template=article&type=out_of_page&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1406.6050052642822&inViewport=2606.0400009155273&pageLoad_to_in_viewport=1413.4350046515465&isRefresh=true&requested=3606.2899976968765&pageLoad_to_requested=3606.2899976968765&CNS_init_to_requested=2413.6850014328957&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ads
securepubads.g.doubleclick.net/gampad/
16 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=233066315492557&correlator=114553536857045&output=json_html&callback=googletag.impl.pubads.callbackProxy1&impl=fifs&adsid=NT&json_a=1&hxva=1&scor=3579739333187049&eid=21062421%2C53887176&vrg=2019032001&tfcd=0&guci=1.2.0.0.2.2.0.0&plat=1%3A32776%2C2%3A32776%2C8%3A32776&sc=1&sfv=1-0-32&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1%2Chero%2Crail%2C2&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5%2C0%2F1%2F6%2F3%2F4%2F5%2C0%2F1%2F7%2F3%2F4%2F5%2C0%2F1%2F7%2F3%2F4%2F8&prev_iu_szs=1x1%2C728x90%7C970x60%7C970x250%7C930x400%7C930x370%7C970x90%7C970x420%7C9x1%7C9x3%7C9x9%7C1200x370%2C300x250%7C300x600%7C300x1050%2C300x140&fsbs=1%2C1%2C1%2C1&ists=8&prev_scp=ctx_slot_name%3D_out_of_page_0%26ctx_slot_instance%3D_out_of_page_0%26ctx_slot_type%3D_out_of_page%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dpost_nav_0%26ctx_slot_instance%3Dpost_nav_0%26ctx_slot_type%3Dpost_nav%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dsiderail_0%26ctx_slot_instance%3Dsiderail_0%26ctx_slot_type%3Dsiderail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0%7Cctx_slot_name%3Dnative_xrail_0%26ctx_slot_instance%3Dnative_xrail_0%26ctx_slot_type%3Dnative_xrail%26ctx_slot_manual_rn%3D0%26ctx_slot_rn%3D0&eri=1&cust_params=amznbid%3D1%26amznp%3D1%26env_device_type%3Ddesktop%26env_server%3Dproduction%26rdt_device_template%3Ddesktop_article%26cnt_tags%3Dexploits%252Cmalware%252Cvulnerabilities%252Cwinrar%26usr_bkt_pv%3D27%26ctx_cns_version%3D2_26_0%26vnd_prx_segments%3D300003%252C121100%252C131100%252C131103%252C131127%252C210001%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cwmhp4i%252C2hkgm5%252Cap05we%252Cv8lc56%252C_C-MEwihv3za_%26vnd_4d_ctx_topics%3DALLBRANDS_70%252CALLBRANDS_7%252CALLBRANDS_63%252CALLBRANDS_38%252CALLBRANDS_31%252CALLBRANDS_283%252CALLBRANDS_274%252CALLBRANDS_258%252CALLBRANDS_167%252CALLBRANDS_134%252CALLBRANDS_64%252CALLBRANDS_57%252CALLBRANDS_28%252CALLBRANDS_244%252CALLBRANDS_21%252CALLBRANDS_192%26vnd_4d_ctx_topic_sc%3D0.5628404061344047%252C0.5628404061344047%252C0.5628404061344047%252C0.5628404061344047%252C0.5628404061344047%252C0.5628404061344047%252C0.5628404061344047%252C0.5628404061344047%252C0.5628404061344047%252C0.5628404061344047%252C0.11272932733641451%252C0.11272932733641451%252C0.11272932733641451%252C0.11272932733641451%252C0.11272932733641451%252C0.11272932733641451%26vnd_4d_ctx_entities%3Dwinrar%252Csymantec%252Cpassword%252Cpage%2520layout%252Cfireeye%252Cmalware%252Celfin%252Cespionage%252Cars%2520technica%2520addendum%252Cactive%2520attack%252Cfile-compression%252Cone%2520campaign%252Cdan%2520goodin%252Cspear-phishing%252Ccredit%2520card%252Cutc%252Ckeylogger%252Csaudi%2520arabia.%252Cbuzy.%252Ccond%25C3%25A9%2520nast%26vnd_4d_ctx_ent_sc%3D1%252C0.7395313059595316%252C0.7347694559352109%252C0.7189079984838979%252C0.6957357579301836%252C0.6066133099686202%252C0.5542530364368511%252C0.5502770236547431%252C0.5385550432945296%252C0.5208480129021588%252C0.48477908975905576%252C0.447181955566681%252C0.4457186638344211%252C0.4307143044859507%252C0.4155263660617445%252C0.4131322236990694%252C0.40213747174052256%252C0.400989722137997%252C0.39791341022368365%252C0.3636754959324837%26vnd_4d_ctx_keywords%3Dwinrar%252Ccode-execution%2520vulnerability%252Csymantec%252Cpassword%252Cpage%2520layout%252Cfireeye%252Cactor%252Cmalware%252Celfin%252Cespionage%252Cars%2520technica%2520addendum%252Cemail%252Cactive%2520attack%252Cfile%252Cattacker%252Cpayload%252Cfile-compression%252Cone%2520campaign%252Cdan%2520goodin%252Cmalicious%2520software%26vnd_4d_ctx_kw_sc%3D1%252C0.914226989447515%252C0.7395313059595316%252C0.7347694559352109%252C0.7189079984838979%252C0.6957357579301836%252C0.6074592928566748%252C0.6066133099686202%252C0.5542530364368511%252C0.5502770236547431%252C0.5385550432945296%252C0.5263937227367543%252C0.5208480129021588%252C0.5149769121811406%252C0.5082270714071432%252C0.4946380275928971%252C0.48477908975905576%252C0.447181955566681%252C0.4457186638344211%252C0.4438861078880977%26vnd_4d_pid%3D22510819-e20b-4472-bd27-5575f3b83526%26vnd_4d_xid%3D87b98178-6df9-4410-a13d-de79e65e3fc2%26vnd_4d_sid%3D47ec056c-cf13-4d04-86ce-b6625bf706df%26ctx_template%3Darticle%26ctx_page_slug%3Da-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%26ctx_page_channel%3Dinformation_technology&cookie_enabled=1&bc=15&lmt=1553796852&dt=1553796852551&dlt=1553796849816&idt=1085&frm=20&biw=1585&bih=1200&oid=3&adxs=0%2C193%2C1063%2C1063&adys=0%2C80%2C370%2C786&adks=3409348299%2C1090902973%2C3325270341%2C57498633&ucis=1%7C2%7C3%7C4&ifi=1&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&dssz=74&icsg=35229469245440&mso=262144&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x-1%7C1200x90%7C300x250%7C300x0&msz=0x-1%7C1200x90%7C300x250%7C300x140&blev=1&bisch=1&ga_vid=36730283.1553796851&ga_sid=1553796853&ga_hid=31033535&fws=4%2C4%2C4%2C4
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
dec9d7b8f9b9df1b8135ed3626535f60388bbdf86b6cb5a3cf7b149123e3b1a8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:12 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
6291
x-xss-protection
0
google-lineitem-id
-2,4830169578,-2,4736014287
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2,138247271585,-2,138237302059
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019032001.js
securepubads.g.doubleclick.net/gpt/
68 KB
25 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
sffe /
Resource Hash
73aa8ed17343a31465bb84462a14f0b11a7e3b0ee0c75963cb56aa3efd0ae37a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 20 Mar 2019 17:54:52 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
25995
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:13 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-32/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-32/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:818::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Purpose
prefetch
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

ADTECH;apid=1A4a14f526-5185-11e9-83fa-0e9021409d42;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A4a14f526-5185-11e9-83fa-0e9021409d42;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A4a14f526-5185-11e9-83fa-0e9021409d42;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A4a14f526-5185-11e9-83fa-0e9021409d42;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A4a14f526-5185-11e9-83fa-0e9021409d42;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4a15ad68-5185-11e9-a380-0ec83b91fe34;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A4a15ad68-5185-11e9-a380-0ec83b91fe34;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A4a15ad68-5185-11e9-a380-0ec83b91fe34;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A4a15ad68-5185-11e9-a380-0ec83b91fe34;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A4a15ad68-5185-11e9-a380-0ec83b91fe34;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4a173408-5185-11e9-bc5e-0e2709c2b384;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A4a173408-5185-11e9-bc5e-0e2709c2b384;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A4a173408-5185-11e9-bc5e-0e2709c2b384;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A4a173408-5185-11e9-bc5e-0e2709c2b384;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A4a173408-5185-11e9-bc5e-0e2709c2b384;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4a173b2e-5185-11e9-a6aa-0e285efb790e;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A4a173b2e-5185-11e9-a6aa-0e285efb790e;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A4a173b2e-5185-11e9-a6aa-0e285efb790e;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A4a173b2e-5185-11e9-a6aa-0e285efb790e;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A4a173b2e-5185-11e9-a6aa-0e285efb790e;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4a14f526-5185-11e9-83fa-0e9021409d42;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/
494 B
610 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704190/0/-1/ADTECH;apid=1A4a14f526-5185-11e9-83fa-0e9021409d42;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._ML5bNV9O
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
5889489ee7cf4094290062f87a045d1164449964524d0711b0015601a11ceb45

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
494
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4a15ad68-5185-11e9-a380-0ec83b91fe34;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/
495 B
635 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704186/0/-1/ADTECH;apid=1A4a15ad68-5185-11e9-a380-0ec83b91fe34;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851451;callback=window.headertag.AolHtb.adResponseCallbacks._y3ltZCVa
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
95e7be5743d06c2a19022d4a7fef94cc8c92fb4429ac81ef369fe94fccb147e0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
495
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4a173b2e-5185-11e9-a6aa-0e285efb790e;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/
495 B
611 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704187/0/-1/ADTECH;apid=1A4a173b2e-5185-11e9-a6aa-0e285efb790e;cfp=1;rndc=1553796852;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._6ceMzO7b
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
3f75578b1f419ff358eba52b90195d12c88672406a96d6a994e72e389e6c4dab

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
495
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1A4a173408-5185-11e9-bc5e-0e2709c2b384;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/
494 B
610 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/4704180/0/-1/ADTECH;apid=1A4a173408-5185-11e9-bc5e-0e2709c2b384;cfp=1;rndc=1553796851;cmd=bid;cors=yes;v=2;misc=1553796851450;callback=window.headertag.AolHtb.adResponseCallbacks._xlTWgHt2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.39.114 Ashburn, United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
cf96fe1de761646532bde64246fc1efffad094e7aa7d1c0e0ecef9d7481a372a

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:12 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
494
expires
Mon, 15 Jun 1998 00:00:00 GMT
s0119118508933
sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/
43 B
615 B
Image
General
Full URL
https://sstats.arstechnica.com/b/ss/conde-arstechnica/1/JS-1.4.1-D7QN/s0119118508933?AQB=1&ndh=1&pf=1&t=28%2F2%2F2019%2018%3A14%3A12%204%200&D=D%3D&mid=72944279050004423024204213465717933616&aamlh=6&ce=UTF-8&ns=condenast&pageName=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&g=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&c.&visCheck=72944279050004423024204213465717933616&.c&cc=USD&ch=Biz%20%26amp%3B%20IT&events=event2%2Cevent28&aamb=6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y&v2=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&l2=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar%7Ctype%3A%20report&c3=D%3Dv3&v3=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&c4=D%3Dv4&v4=1482285&c5=D%3Dv5&v5=report&c6=D%3Dv6&v6=Biz%20%26amp%3B%20IT&c7=D%3Dv7&v7=Biz%20%26amp%3B%20IT%2Fundefined&c11=D%3Dv11&v11=2%3A14%20PM%7CThursday&c16=not%20logged%20in&v16=not%20logged%20in&c17=1&v17=1&c23=D%3Dv23&v23=New&c32=D%3Dv32&v32=1&c44=D%3Dv44&v44=null&c50=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar%7Ctype%3A%20report&c51=D%3Dv51&v51=desktop%20layout%3A1600x1200&c55=D%3Dv55&v55=Dan%20Goodin&c56=D%3Dv56&v56=1.1&c60=D%3Dv60&v60=820&c61=D%3Dv61&v61=20h%7C0d&c62=D%3Dv62&v62=2019-03-27T21%3A20%3A36%2B00%3A00&c65=D%3Dv65&v65=null&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
63.140.41.50 Lehi, United States, ASN15224 (OMNITURE - Adobe Systems Inc., US),
Reverse DNS
arstechnica.com.ssl.d1.sc.omtrdc.net
Software
Omniture DC/2.0.0 /
Resource Hash
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, br
Host
sstats.arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Cookie
s_depth=1; s_vnum_m=1554076800918%26vn%3D1; sinvisit_m=true; s_ppn=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F; s_nr=1553796852919-New; s_cc=true
Connection
keep-alive
Cache-Control
no-cache
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:13 GMT
X-Content-Type-Options
nosniff
X-C
ms-6.6.0
P3P
CP="This is not a P3P policy"
Connection
Keep-Alive
Content-Length
43
X-XSS-Protection
1; mode=block
Pragma
no-cache
Last-Modified
Fri, 29 Mar 2019 18:14:13 GMT
Server
Omniture DC/2.0.0
xserver
www93
ETag
"3336753334218457088-5094592674787236054"
Vary
*
Content-Type
image/gif
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, max-age=0, no-transform, private
Keep-Alive
timeout=15
Expires
Wed, 27 Mar 2019 18:14:13 GMT
m_window_focus_non_hydra.js
tpc.googlesyndication.com/pagead/js/r20190325/r20110914/client/ext/ Frame D260
2 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20190325/r20110914/client/ext/m_window_focus_non_hydra.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:818::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4dd51e6b250e15946ca0af835e0511093c82c5678115aac3055645d889a1681a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 25 Mar 2019 13:06:54 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
277639
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1049
x-xss-protection
1; mode=block
server
cafe
etag
9573447915536422037
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Mon, 08 Apr 2019 13:06:54 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D260
79 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
874ac360dbc509500b7551f32599714232ad3a933f34e311c1ba7d68b27ddbad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1553685379633397"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
29870
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:13 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame D260
287 KB
89 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
7388f50d11573024cf0aca7117021410484aa11026addd176d184a55d7204662

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:16 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Mar 2019 15:29:41 GMT
Server
AmazonS3
x-amz-request-id
742E7BC3C21F5F73
ETag
"cec6001707cfda367af3855094ffed16"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=25850
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
90640
x-amz-id-2
FEE7m23XKPcBq1q6J3dPAEP7U5bC32lUA4na8uajdjiVqF8HBbihm5SFU/PWj+3dX4UX8yvjq9A=
778489797820282430
tpc.googlesyndication.com/simgad/ Frame D260
1 KB
1 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/778489797820282430
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:818::2001 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a8776cd5d9b452db19ebf8c02c4eaabe3dbfa40731a5f0385884650861d457a6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Sat, 09 Mar 2019 03:45:06 GMT
x-content-type-options
nosniff
age
1693747
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1093
x-xss-protection
1; mode=block
last-modified
Tue, 16 Oct 2018 19:26:10 GMT
server
sffe
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 08 Mar 2020 03:45:06 GMT
osd.js
www.googletagservices.com/activeview/js/current/
77 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
9ed6308b644f91c953d318635ae4c5ea03977a40badb5c0ea94e963dd343a8dc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1553685379633397"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
29012
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:13 GMT
creative.js
static.polarcdn.com/creative/ Frame D24D
290 KB
111 KB
Script
General
Full URL
https://static.polarcdn.com/creative/creative.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:f87e , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8aa6ba834bdbd506ba9746d5ca744b234613a6a7b72c3bb0efe0858c8e040d36

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
content-encoding
gzip
cf-cache-status
HIT
status
200
content-length
112745
via
1.1 varnish
timing-allow-origin
*
x-varnish
431210961 431210845
last-modified
Wed, 27 Mar 2019 16:18:07 GMT
server
cloudflare
cache-control
max-age=10800
etag
W/"5c9ba23f-489ee"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cf-ipcountry
DE
access-control-allow-credentials
true
accept-ranges
bytes
cf-ray
4beb951db9f0bf07-FRA
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Thu, 28 Mar 2019 19:20:27 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame D24D
79 KB
29 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81a::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
874ac360dbc509500b7551f32599714232ad3a933f34e311c1ba7d68b27ddbad
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1553685379633397"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
29870
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:13 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame D24D
287 KB
89 KB
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019032001.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
7388f50d11573024cf0aca7117021410484aa11026addd176d184a55d7204662

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:16 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Mar 2019 15:29:41 GMT
Server
AmazonS3
x-amz-request-id
742E7BC3C21F5F73
ETag
"cec6001707cfda367af3855094ffed16"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=25850
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
90640
x-amz-id-2
FEE7m23XKPcBq1q6J3dPAEP7U5bC32lUA4na8uajdjiVqF8HBbihm5SFU/PWj+3dX4UX8yvjq9A=
view
securepubads.g.doubleclick.net/pcs/ Frame D260
0
269 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjstuM1-0Y6i2m2idOl3AuF_QBifCQTzPPsqUpJnNSISdU4aa5BOrffTsedoXy0VVpJqKpXRi-5L28-E9OAMl-WF9xwvtCoi5-XdTWlh_acok8zIpmXH7xboPpo2TVRM-VS33bkzDd7NVUQNPT7nqm0TymvLu0gGS7YVAi-0y60zjEFs4gT6mkQ6S5-HAQpn2QRPworGyvfY5LZ_MA-Yj-UaBIxXZl61wZpc718y6b3F3-bzENxuexTT6W8Swsh1wSc55fbQVhKkXD5k4jCnTvQ_fCGYohCfi9WWVv0TVUg&sai=AMfl-YQfqK4TJTr3--UjZBqwTdWeXb0ohzNNx3VuFTkCOEMNGp2idmhl6yI8PGncNOGMh3QLEOSBQ67I9kgiIl6IKbWrLEQeUywpERyHC-GzfA&sig=Cg0ArKJSzCbppdY7O7joEAE&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:13 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame D24D
0
254 B
Image
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvOj9L_a2ny8M0DUPMW6JJ786PhJab3_QV_km7kR1jli37mE86qoLeJ0YevavT7Vjnk_k2l1iXiaIGidKBWHPoDHgH_36K7cgZRoUva8-IsEGD4PrEanvBqOSpiNSt8bDyjx7DhLOYpOW6BhQMuJ2QtQ54xicG3TiZBNk6mba4pCdx-9V1SQJI5UDyosJ9skC3tfgz28dceH1ZPUILy6vL_1iAZZQwzyzXO6s1UalD0wg53iMNjYdiyfvdOTc1HMZdWS3FYwx3vPDW3VMRD989NQuv_hjDBDwgU3EEk1Q&sai=AMfl-YR7PYJdOBO7IEQnJ2QQnCsEMcmk7ZaUK73DNm-h_M0YwI1ukF-_OIP7s4ipH6FtarhCQue4jpZzwNxqI4n4MAnQvg07UtGLgxD0hPKMvw&sig=Cg0ArKJSzGItLCvq1bz_EAE&urlfix=1&adurl=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
cache-control
private
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:13 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A13.296Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=75904ebe-e758-4baf-8543-ed4d685693bd&uNw=1&uUq=1&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=24810.74074074074&image_count=27&image_surface=669890&server=production&vp_height=1200&vp_width=1585&created=2560.29000133276&staged=2599.210001528263&pageload_to_staged=2599.210001528263&channel=information_technology&ctx_template=article&id=1553796851369zbpd2to83yndru2ah0fzkqulqxesfi&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=exploits_malware_vulnerabilities_winrar&template=article&type=out_of_page&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1406.6050052642822&inViewport=2606.0400009155273&pageLoad_to_in_viewport=1413.4350046515465&isRefresh=true&requested=3606.2899976968765&pageLoad_to_requested=3606.2899976968765&CNS_init_to_requested=2413.6850014328957&rendered=4487.51500248909&creative_type=sized&is_empty=true&request_to_rendered=881.2250047922134&is_first_rendered=true&pageLoad_to_rendered=4487.51500248909&CNS_init_to_rendered=3294.910006225109&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A13.300Z&_t=unfriendly_iframe&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=75904ebe-e758-4baf-8543-ed4d685693bd&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=24810.74074074074&image_count=27&image_surface=669890&server=production&vp_height=1200&vp_width=1585&created=2560.29000133276&staged=2599.210001528263&pageload_to_staged=2599.210001528263&channel=information_technology&ctx_template=article&id=1553796851369zbpd2to83yndru2ah0fzkqulqxesfi&instance=0&name=out_of_page_0&out_of_page=true&position_fold=atf&position_xy=0x0&request_number=1&tags=exploits_malware_vulnerabilities_winrar&template=article&type=out_of_page&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1406.6050052642822&inViewport=2606.0400009155273&pageLoad_to_in_viewport=1413.4350046515465&isRefresh=true&requested=3606.2899976968765&pageLoad_to_requested=3606.2899976968765&CNS_init_to_requested=2413.6850014328957&rendered=4487.51500248909&creative_type=sized&is_empty=true&request_to_rendered=881.2250047922134&is_first_rendered=true&pageLoad_to_rendered=4487.51500248909&CNS_init_to_rendered=3294.910006225109&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A13.313Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=75904ebe-e758-4baf-8543-ed4d685693bd&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=24810.74074074074&image_count=27&image_surface=669890&server=production&vp_height=1200&vp_width=1585&created=2556.1349987983704&staged=2564.5650029182434&pageload_to_staged=2564.5650029182434&channel=information_technology&ctx_template=article&id=155379685136565p4aidblenkqwdf4knygq8wjygohp&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x193&request_number=1&tags=exploits_malware_vulnerabilities_winrar&template=article&type=post_nav&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1371.9600066542625&inViewport=2580.4499983787537&pageLoad_to_in_viewport=1387.8450021147728&isRefresh=true&is_first_Request=true&requested=3582.6549977064133&pageLoad_to_requested=3582.6549977064133&CNS_init_to_requested=2390.0500014424324&rendered=4504.1050016880035&advertiser_id=4552798968&creative_id=138247271585&creative_type=sized&line_item_id=4830169578&order_id=2409944368&rendered_size=1x1&request_to_rendered=921.4500039815903&pageLoad_to_rendered=4504.1050016880035&CNS_init_to_rendered=3311.5000054240227&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A13.318Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=75904ebe-e758-4baf-8543-ed4d685693bd&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=24810.74074074074&image_count=27&image_surface=669890&server=production&vp_height=1200&vp_width=1585&created=2558.6849972605705&staged=2582.269996404648&pageload_to_staged=2582.269996404648&channel=information_technology&ctx_template=article&id=1553796851367yuwnjhzl5w1rem6dq8oudizhuowpie&instance=0&name=siderail_0&position_fold=atf&position_xy=20x0&request_number=1&tags=exploits_malware_vulnerabilities_winrar&template=article&type=siderail&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1389.665000140667&inViewport=2592.079997062683&pageLoad_to_in_viewport=1399.4750007987022&isRefresh=true&requested=3592.820003628731&pageLoad_to_requested=3592.820003628731&CNS_init_to_requested=2400.21500736475&rendered=4509.005002677441&creative_type=sized&is_empty=true&request_to_rendered=916.1849990487099&pageLoad_to_rendered=4509.005002677441&CNS_init_to_rendered=3316.40000641346&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A13.321Z&_t=unfriendly_iframe&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=75904ebe-e758-4baf-8543-ed4d685693bd&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=24810.74074074074&image_count=27&image_surface=669890&server=production&vp_height=1200&vp_width=1585&created=2558.6849972605705&staged=2582.269996404648&pageload_to_staged=2582.269996404648&channel=information_technology&ctx_template=article&id=1553796851367yuwnjhzl5w1rem6dq8oudizhuowpie&instance=0&name=siderail_0&position_fold=atf&position_xy=20x0&request_number=1&tags=exploits_malware_vulnerabilities_winrar&template=article&type=siderail&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1389.665000140667&inViewport=2592.079997062683&pageLoad_to_in_viewport=1399.4750007987022&isRefresh=true&requested=3592.820003628731&pageLoad_to_requested=3592.820003628731&CNS_init_to_requested=2400.21500736475&rendered=4509.005002677441&creative_type=sized&is_empty=true&request_to_rendered=916.1849990487099&pageLoad_to_rendered=4509.005002677441&CNS_init_to_rendered=3316.40000641346&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.117.76 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-2-117-76.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A13.330Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=75904ebe-e758-4baf-8543-ed4d685693bd&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=24810.74074074074&image_count=27&image_surface=669890&server=production&vp_height=1200&vp_width=1585&created=2559.550002217293&staged=2592.6050022244453&pageload_to_staged=2592.6050022244453&channel=information_technology&ctx_template=article&id=native_xrail300x140_frame&instance=0&name=native_xrail_0&position_fold=atf&position_xy=436x0&request_number=1&tags=exploits_malware_vulnerabilities_winrar&template=article&type=native_xrail&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1400.0000059604645&inViewport=2597.9499965906143&pageLoad_to_in_viewport=1405.3450003266335&isRefresh=true&requested=3598.6199975013733&pageLoad_to_requested=3598.6199975013733&CNS_init_to_requested=2406.0150012373924&rendered=4521.080002188683&advertiser_id=1454517775&creative_id=138237302059&creative_type=sized&line_item_id=4736014287&order_id=2338761482&rendered_size=300x140&request_to_rendered=922.4600046873093&pageLoad_to_rendered=4521.080002188683&CNS_init_to_rendered=3328.4750059247017&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:13 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
truncated
/ Frame D260
212 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
60416f082871961ce73243c200ad60885b6805ee2bc3f36040a0668e54377fbd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
wt
polarcdn-pentos.com/ Frame D24D
3 B
592 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=1&n=3&p=UNKNOWN&s=1&u=91fb5272-a45e-4a2d-b493-de334b059848&v=2%2F9483971&w=1.131.0&y=w&z=v1.6.31&pas=asa-web&pag2=%2F3379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2&pai=abf1d&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=0940fd5404e472906be5955466b22003&t=arx&parcid=dc7bb&parid=7d162&parin=1&partm=0&par=s&maxts=0.009&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&_=1553796853440
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4beb952139bf9c11-AMS
wt
polarcdn-pentos.com/ Frame D24D
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=2&n=3&p=UNKNOWN&s=1&u=91fb5272-a45e-4a2d-b493-de334b059848&v=2%2F9483971&w=1.131.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=u&pai=abf1d&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=0940fd5404e472906be5955466b22003&t=atx&parcid=dc7bb&parid=0dcf4&parin=2&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&_=1553796853441
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4beb952139c19c11-AMS
pl
bw-prod.plrsrvcs.com/bid/ Frame D24D
0
340 B
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/bid/pl
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dd0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Access-Control-Request-Method
POST
Origin
https://arstechnica.com
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Access-Control-Request-Headers
content-type,x-openrtb-version

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
server
cloudflare
access-control-allow-origin
*
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, POST, OPTIONS
status
204
cf-ray
4beb951e6bdbbee4-FRA
access-control-allow-headers
Content-Type, x-openrtb-version
truncated
/ Frame D24D
215 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bc48a0a71cdc0c10ed28c6042f0470173386d5c83a68c9608264c97e63796f11

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Type
image/png
pl
bw-prod.plrsrvcs.com/bid/ Frame D24D
2 KB
1 KB
XHR
General
Full URL
https://bw-prod.plrsrvcs.com/bid/pl
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6811:dd0f , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
f38a9a0e1ed8b976ad2695b39f63b49478c601cd950bee2cac78b70588b58786

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
x-openrtb-version
2.3
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Origin
https://arstechnica.com
Content-Type
application/json

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
content-encoding
gzip
x-polar-trace-id
x-polar-response-id
c37f55a44074418b954abe76a0bb253e
status
200
x-polar-h
fbfd7-30
x-polar-t
0.202
pragma
no-cache
server
cloudflare
cache-control
no-cache, no-store, must-revalidate
x-polar-misses
tq
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
access-control-expose-headers
CF-IPCountry
cf-ipcountry
DE
cf-ray
4beb951e7bf0bee4-FRA
expires
0
wt
polarcdn-pentos.com/ Frame D24D
3 B
66 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=3&n=3&p=UNKNOWN&s=1&u=91fb5272-a45e-4a2d-b493-de334b059848&v=2%2F9483971&w=1.131.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.a170e777-23cc-4ba0-b2ec-8ea3f3a8048f.c37f55&paensm=n&pai=abf1d&d=arstechnica.com&l=&pajs=&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&cu=0940fd5404e472906be5955466b22003&t=arx&parcid=dc7bb&parid=0dcf4&parin=2&partm=1&par=s&maxts=0.432&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&_=1553796853442
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4beb952139c09c11-AMS
192331735d6742bb8293ae8f68171f68
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/ Frame D24D
16 KB
4 KB
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/creative/192331735d6742bb8293ae8f68171f68?order=cbe30fbce6d94ed685a75c934f4416e4
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
3bd0b26ea5fd1260259d23a2037a5847f25fb7b2cd0f76590284c20dfdd16297

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 28 Mar 2019 18:14:13 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"b3a5d1e21843674034e44065c3e84535"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country
cache-control
max-age=900
x-country
DE
cf-ray
4beb9520dd3e96d0-FRA
wt
polarcdn-pentos.com/ Frame D24D
3 B
65 B
XHR
General
Full URL
https://polarcdn-pentos.com/wt?e=4&n=3&p=NA-ARSTECH-11238837&s=1&u=91fb5272-a45e-4a2d-b493-de334b059848&v=2%2F9483971&w=1.131.0&y=w&z=v1.6.31&pas=asa-web-polarpmp&pag1=conde_customcontent_market&pag2=brand_arstechnica&paenb=y&paena=a.a170e777-23cc-4ba0-b2ec-8ea3f3a8048f.c37f55&paenli=3eaf49f2b3064394ac4418be206c0540&paenlip=2c5975f4da59438fa69fc321df0222b6&paeno=cbe30fbce6d94ed685a75c934f4416e4&paenop=75059c2f630e478f8ff38526e7318713&paes=d742280dbe5d47e982fceee364475341&paensm=n&pai=abf1d&d=arstechnica.com&l=Key-native_xrail+%5BXrail%5D&pajs=body&pepm=gdpr-eu&pepc=n&mepc=1&pasf=0&pecy=DE&c=b2829e80ae5c43bbba330e21b45ab0eb&pacexp=24ec42973e614b2abfa6c84dc216fc06&t=i&pasp=6fe1dded4b5f4d1a8a01dfa8492cbdab&pvhref=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&_=1553796853443
Requested by
Host: static.polarcdn.com
URL: https://static.polarcdn.com/creative/creative.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.17.192.78 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
2f0e2d95e318789b840f67b7004cb30985ce2e0ef3ece7507b2b15e8441811a7

Request headers

Accept
text/plain, */*; q=0.01
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
cf-cache-status
HIT
x-amz-request-id
DB783A05C3FEE54D
status
200
content-length
3
x-amz-id-2
HR6fi+cOwrsUo+aPPrhwEkXGglWgyYRjfSoOWmHXK7CYt3cuTeIZsmO8mrEyano/N3YhGjUNDr0=
last-modified
Mon, 09 Jul 2018 17:31:51 GMT
server
cloudflare
etag
"28e4477bb454eb35226fe56082545e13"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
access-control-max-age
3600
access-control-allow-methods
GET
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
public, max-age=604800
accept-ranges
bytes
cf-ray
4beb952139c29c11-AMS
5c9bbf59fc70759534a71aba
polarcdn-terrax.com/image/v1.0.0/bin/
98 KB
98 KB
Image
General
Full URL
https://polarcdn-terrax.com/image/v1.0.0/bin/5c9bbf59fc70759534a71aba?v=55db1&w=300
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4032 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
c137b856df4f31b97d0944c83e1510c47571274546d75a7aafbfcbbe241d8ce7

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:13 GMT
via
1.1 varnish
cf-cache-status
HIT
cf-ray
4beb95214cc764b1-FRA
status
200
access-control-max-age
432000
content-length
100273
x-varnish
1137770351 1137764220
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=432000
accept-ranges
bytes
timing-allow-origin
*
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A14.512Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=75904ebe-e758-4baf-8543-ed4d685693bd&sID=ae37540b-f663-432e-9014-8250e718022d&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=cns_ads&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&content_uri=information_technology&image_avg_surface=25531.785714285714&image_count=28&image_surface=714890&server=production&vp_height=1200&vp_width=1585&created=2556.1349987983704&staged=2564.5650029182434&pageload_to_staged=2564.5650029182434&channel=information_technology&ctx_template=article&id=155379685136565p4aidblenkqwdf4knygq8wjygohp&instance=0&name=post_nav_0&position_fold=atf&position_xy=125x793&request_number=1&tags=exploits_malware_vulnerabilities_winrar&template=article&type=post_nav&CNS_init=1192.6049962639809&suffix=dart&CNS_init_to_staged=1371.9600066542625&inViewport=2580.4499983787537&pageLoad_to_in_viewport=1387.8450021147728&isRefresh=true&is_first_Request=true&requested=3582.6549977064133&pageLoad_to_requested=3582.6549977064133&CNS_init_to_requested=2390.0500014424324&rendered=4504.1050016880035&advertiser_id=4552798968&creative_id=138247271585&creative_type=sized&line_item_id=4830169578&order_id=2409944368&rendered_size=1x1&request_to_rendered=921.4500039815903&pageLoad_to_rendered=4504.1050016880035&CNS_init_to_rendered=3311.5000054240227&is_first_impression_viewable=true&impression_Viewable=5702.804997563362&in_viewport_to_visible_change=3122.3549991846085&pageLoad_to_gpt_viewable=5702.804997563362&CNS_init_to_impression_Viewable=4510.200001299381&request_to_impression_Viewable=2120.149999856949&ver_cns_ads=2_19_0&device=desktop&cns=2_26_0&_logType=info&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:15 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
activeview
pagead2.googlesyndication.com/pcs/ Frame D260
42 B
112 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssfGFPbiSubZQaZHzVPULo6cy2GzLPVOanrYlHLbXS0VYQ9JvgKlUrQAfLKmOhCrvrMS_FHau4H8_qXXMgSwTyP6naymPzCoXwVc6TyGDQ&sig=Cg0ArKJSzKwJfZLCLGi0EAE&adk=1090902973&tt=-1&bs=1585%2C1200&mtos=1014,1014,1014,1014,1014&tos=1014,0,0,0,0&p=125,793,126,794&mcvt=1014&rs=3&ht=0&tfs=118&tls=1132&mc=1&lte=1&bas=0&bac=0&avms=geo&rst=1553796853315&rpt=160&isd=0&msd=0&lm=2&mce=0&oseid=3&xdi=0&ps=1585%2C4680&ss=1600%2C1200&pt=-1&deb=1-2-2-12-13-19-26-11&tvt=1124&r=v&id=osdim&vs=4&uc=13&upc=0&tgt=DIV&cl=1&cec=5&clc=0&cac=0&cd=1x5&v=20190327
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:815::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:14 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
access-control-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
53915b12-dc76-4be6-a1fd-69b08d466766
https://arstechnica.com/ Frame A13D
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/53915b12-dc76-4be6-a1fd-69b08d466766
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame A13D
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-32.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-93d3ac933e3b2a7c0bd52030be8ef0af.css
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 18:14:16 GMT
Content-Encoding
gzip
X-Cache
RefreshHit from cloudfront
Access-Control-Max-Age
3000
Connection
keep-alive
Content-Length
29632
Via
1.1 c55f09a9188f77960d35c97bad15e1b2.cloudfront.net (CloudFront)
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
KJQ83KZ5ZZpk7CXjzryGZnI4Fa_6UhBAEbN8eNWveDoJnKef6cV73w==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.289.0_en.html
imasdk.googleapis.com/js/core/ Frame 7B5B
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.289.0_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:814::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.289.0_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
183600
date
Tue, 26 Mar 2019 18:07:09 GMT
expires
Wed, 25 Mar 2020 18:07:09 GMT
last-modified
Tue, 26 Mar 2019 17:41:25 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
1; mode=block
cache-control
public, max-age=31536000
age
173226
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
client.js
s0.2mdn.net/instream/video/ Frame A13D
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:816::2006 , Ireland, ASN (),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
10523
x-xss-protection
0
expires
Thu, 28 Mar 2019 18:14:15 GMT
integrator.js
adservice.google.com/adsid/ Frame A13D
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:817::2002 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:14:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,44,43,39",quic=":443"; ma=2592000; v="46,44,43,39"
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame A13D
52 KB
16 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
e0476713c1a4b54e3119fdbd5a9ee90777a34c42ff27505b875d645acda126aa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
15987
x-xss-protection
0
pragma
private
x-fb-debug
ic1F/OBSQDAc4jfbwdPUEZfX0Rx3w9SnCG4PqjsKQbdfh/wcqC7qsnVOZ8x/0ViQJdxSrERLcTyrRcSdZbD7Dw==
date
Thu, 28 Mar 2019 18:14:15 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
private
access-control-allow-credentials
true
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame A13D
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.32 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-32.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:11:59 GMT
content-encoding
gzip
last-modified
Wed, 24 May 2017 18:19:15 GMT
server
AmazonS3
age
137
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/javascript
status
200
x-amz-cf-id
3i9jBQ76l57m-Z5cL9aPRy3Zw_MPYxxjBhDs8GfVWWgIpB7DSYkDJw==
via
1.1 a2289d8b15b881db1c42086062568883.cloudfront.net (CloudFront)
collect
www.google-analytics.com/r/
35 B
112 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:15 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
infinityid
infinityid.condenastdigital.com/ Frame A13D
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/infinityid
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.44.76.10 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-44-76-10.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e7d2665ba190d03f7f6873f51c06e6bfa4f069bd217a585ead8747126332fd97

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 18:14:15 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
track
capture.condenastdigital.com/ Frame A13D
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-28T18%3A14%3A15.024Z&_c=&_t=Player%20Requested&sID=ae37540b-f663-432e-9014-8250e718022d&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:15 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/ Frame A13D
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-28T18%3A14%3A15.095Z&_c=gptError&_t=gptData&sID=ae37540b-f663-432e-9014-8250e718022d&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22Cannot%20read%20property%20%270%27%20of%20undefined%22%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225c74019c40f94807b9000000%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:15 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/ Frame A13D
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-28T18%3A14%3A15.204Z&_c=Performance&_t=adj_player_download_time&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-c-and-c-tiberian-sun&cId=5c74019c40f94807b9000000&cKe=&cPd=2019-02-26T16%3A00%3A00%2B00%3A00&cTi=Command%20%26%20Conquer%3A%20Tiberian%20Sun%20%7C%20War%20Stories&mDu=782&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&pWw=540&pWh=303.75&sID=ae37540b-f663-432e-9014-8250e718022d&uId=75904ebe-e758-4baf-8543-ed4d685693bd&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%2266798d80-281f-d424-58dc-6f9ddf14d7b%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3295.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&_v=3696.624994277954&adId=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:15 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1551193450/ Frame A13D
65 KB
66 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
2720e6e8e7f3ae84079b8e84afdc637805a8886e610db0b29217947057a3a0e4

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 16:06:17 GMT
Via
1.1 varnish, 1.1 412049da39a44d4e9af054ecc17534dd.cloudfront.net (CloudFront)
Age
59856
Edge-Cache-Tag
313687566273846460968749706722669918033,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
66605
X-Request-Id
d05453b4de442a1f
X-Served-By
cache-fra19134-FRA
Last-Modified
Tue, 26 Feb 2019 16:01:05 GMT
Server
cloudinary
X-Timer
S1551197155.084973,VS0,VE468
ETag
"88b0913f1937b6d9267d1b2ef5ebdae4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
ivzOmA4ZJMABFd2Nt-wyMRm1ESmE8iOI9B8jJIdKNdwygrIB1zMeiw==
X-Cache-Hits
0
ed2945fc-45f3-4520-8dd4-648a02d3ebc4thumbs.mp4
dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ Frame A13D
101 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ed2945fc-45f3-4520-8dd4-648a02d3ebc4thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.81.165 Seattle, United States, ASN (),
Reverse DNS
server-54-192-81-165.mia50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Range
bytes=0-
chrome-proxy
frfr

Response headers

Date
Thu, 28 Mar 2019 00:01:31 GMT
Via
1.1 14f31b44964ee74b0b9da827060c6d97.cloudfront.net (CloudFront)
Last-Modified
Mon, 25 Feb 2019 23:46:10 GMT
Server
AmazonS3
Age
65566
ETag
"1c51b5694b5f0596f2162f4b722c3668"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-2539905/2539906
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2539906
X-Amz-Cf-Id
zmk3CAFk0uRikaO_rgBkgy7pTMYhNByurF20t5PYKEN40xb8H831CQ==
ed2945fc-45f3-4520-8dd4-648a02d3ebc4thumbs.mp4
dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ Frame A13D
16 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ed2945fc-45f3-4520-8dd4-648a02d3ebc4thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.81.154 Seattle, United States, ASN (),
Reverse DNS
server-54-192-81-154.mia50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Range
bytes=0-
chrome-proxy
frfr

Response headers

Date
Thu, 28 Mar 2019 00:01:31 GMT
Via
1.1 2b9113e25093a7b65f5fea387ef4e79d.cloudfront.net (CloudFront)
Last-Modified
Mon, 25 Feb 2019 23:46:10 GMT
Server
AmazonS3
Age
65568
ETag
"1c51b5694b5f0596f2162f4b722c3668"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-2539905/2539906
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2539906
X-Amz-Cf-Id
Ne1OG1LD_xVeySbdqg4Gu2RdNq-eOrfjkQxWrbiZtrIprcm0G2h2Xw==
track
capture.condenastdigital.com/ Frame A13D
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-28T18%3A14%3A15.244Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-c-and-c-tiberian-sun&cId=5c74019c40f94807b9000000&cKe=&cPd=2019-02-26T16%3A00%3A00%2B00%3A00&cTi=Command%20%26%20Conquer%3A%20Tiberian%20Sun%20%7C%20War%20Stories&mDu=782&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&pWw=540&pWh=303.75&sID=ae37540b-f663-432e-9014-8250e718022d&uId=75904ebe-e758-4baf-8543-ed4d685693bd&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%2266798d80-281f-d424-58dc-6f9ddf14d7b%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3295.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&adId=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.165.0.24 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-165-0-24.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:15 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
9e41e1c3-2024-4cbf-99d4-677d622e41e2
https://arstechnica.com/ Frame A13D
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/9e41e1c3-2024-4cbf-99d4-677d622e41e2
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
ed2945fc-45f3-4520-8dd4-648a02d3ebc4manifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ Frame A13D
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ed2945fc-45f3-4520-8dd4-648a02d3ebc4manifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.81.154 Seattle, United States, ASN (),
Reverse DNS
server-54-192-81-154.mia50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a58fe84f39cc5f886751461a855297d43a3909ae323d4a0064c0a9ffbf1803c3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 00:03:43 GMT
Via
1.1 1b5f17b0fe932d74f5b54cdfd6d76f94.cloudfront.net (CloudFront)
Vary
Origin
Age
65764
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Mon, 25 Feb 2019 23:44:00 GMT
Server
AmazonS3
ETag
"59f7cf78ad2c92218911c28ad165a692"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Accept-Ranges
bytes
X-Amz-Cf-Id
MZQtt0QDMOiVp3KsaB_BNswZWmk2bK5AosZMIVEL3xfoXtcIj7mPKQ==
getpixels
pixels.ad.gt/api/v1/
5 KB
2 KB
Script
General
Full URL
https://pixels.ad.gt/api/v1/getpixels?tagger_id=a186ba14d33f6e62aa51245e5a087215&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&code=LU6O0M
Requested by
Host: p.ad.gt
URL: https://p.ad.gt/api/v1/p/passive/a186ba14d33f6e62aa51245e5a087215/b204da9c-434f-454d-8a29-4c97d1af7d57/57
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.33.126.96 Boardman, United States, ASN (),
Reverse DNS
ec2-52-33-126-96.us-west-2.compute.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
746e702acf29abec0770d991897634ddec9bd2d3a1c5bc39c08e7d93a9636bcc

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:17 GMT
Content-Encoding
gzip
Server
nginx/1.12.1
Connection
keep-alive
Content-Length
1465
Content-Type
text/html; charset=utf-8
ecommerce.js
www.google-analytics.com/plugins/ua/
1 KB
835 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ecommerce.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8e1b84265e633c043720dd0921476c16bc9f75e393e855c9116ca7c3a847b5c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:13:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
62
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
735
x-xss-protection
0
expires
Thu, 28 Mar 2019 19:13:13 GMT
ec.js
www.google-analytics.com/plugins/ua/
3 KB
1 KB
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/ec.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
058ed961bfe422af7bfc65865f4c08531ec8ace995f8a1ec560a46581cb7712c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 28 Mar 2019 18:10:08 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Apr 2016 03:17:22 GMT
server
sffe
age
247
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
1296
x-xss-protection
0
expires
Thu, 28 Mar 2019 19:10:08 GMT
conde_nast_xid
ids.ad.gt/api/v1/put/
43 B
267 B
Image
General
Full URL
https://ids.ad.gt/api/v1/put/conde_nast_xid?conde_nast_xid=986a734d-80d7-4ef6-9a7b-2e48857327ac
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.215.123.63 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-215-123-63.us-west-2.compute.amazonaws.com
Software
nginx/1.8.1 /
Resource Hash
afe0dcfca292a0fae8bce08a48c14d3e59c9d82c6052ab6d48a22ecc6c48f277

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:15 GMT
Cache-Control
public, max-age=43200
Server
nginx/1.8.1
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Fri, 29 Mar 2019 06:14:15 GMT
a186ba14d33f6e62aa51245e5a087215
p.ad.gt/api/v1/p/tid/dec/s/
0
616 B
Image
General
Full URL
https://p.ad.gt/api/v1/p/tid/dec/s/a186ba14d33f6e62aa51245e5a087215?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&title=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&image=https%3A%2F%2Fcdn.arstechnica.net%2Fwp-content%2Fuploads%2F2019%2F02%2FGettyImages-180832603-760x380.jpg&type=article&tags=&sn=1&description=Code-execution%20vulnerability%20is%20being%20used%20to%20install%20password%20stealers%20and%20much%20more.
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.209.164.143 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-34-209-164-143.us-west-2.compute.amazonaws.com
Software
nginx/1.10.1 / Express
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:15 GMT
Server
nginx/1.10.1
X-Powered-By
Express
ETag
W/"0-2jmj7l5rSw0yVb/vlWAYkK/YBwk"
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/html; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Connection
keep-alive
Access-Control-Allow-Headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Range,Range
Content-Length
0
/
srv-2019-03-28-18.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-03-28-18.pixel.parsely.com/plogger/?rand=1553796855284&plid=91327652&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%2205d73d41-315c-424b-a4c8-b4a9ca384ceb%22%2C%22parsely_site_uuid%22%3A%22525859be-917a-40a1-9511-163cb25a0c32%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&sref=&sts=1553796855281&slts=0&title=A+rogue%E2%80%99s+gallery+of+bad+actors+is+exploiting+that+critical+WinRAR+flaw+%7C+Ars+Technica&date=Thu+Mar+28+2019+18%3A14%3A15+GMT%2B0000+(Coordinated+Universal+Time)&action=pageview&pvid=88284276&u=525859be-917a-40a1-9511-163cb25a0c32
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.236.75 Seattle, United States, ASN (),
Reverse DNS
ec2-35-153-236-75.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:17 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
1663130473914833
connect.facebook.net/signals/config/ Frame A13D
174 KB
41 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.8.45&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:216:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
c10239d2cd4695b695ac26ab2da8284a1d4ae182e39ae1f712c5ad020ed30e51
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
vary
Origin, Accept-Encoding
content-length
41533
x-xss-protection
0
pragma
public
x-fb-debug
SUcFFZr/TFi3uEcrFX6f/QK0a3PUrfZHwkQyBOvW9RlXAeYuv62z5s1izener9v1ttNFvELWYlYy/SLVkgKDMg==
date
Thu, 28 Mar 2019 18:14:15 GMT
x-frame-options
DENY
access-control-allow-methods
OPTIONS
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
https://connect.facebook.net
access-control-expose-headers
X-FB-Debug, X-Loader-Length
cache-control
public, max-age=1200
access-control-allow-credentials
true
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1551193450/ Frame A13D
65 KB
66 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.56 Seattle, United States, ASN (),
Reverse DNS
server-52-85-188-56.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
2720e6e8e7f3ae84079b8e84afdc637805a8886e610db0b29217947057a3a0e4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 16:06:17 GMT
Via
1.1 varnish, 1.1 7a5407bd3564d5f8494603c5f2d0661f.cloudfront.net (CloudFront)
Age
59857
Edge-Cache-Tag
313687566273846460968749706722669918033,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
66605
X-Request-Id
d05453b4de442a1f
X-Served-By
cache-fra19134-FRA
Last-Modified
Tue, 26 Feb 2019 16:01:05 GMT
Server
cloudinary
X-Timer
S1551197155.084973,VS0,VE468
ETag
"88b0913f1937b6d9267d1b2ef5ebdae4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
6zRp5Vjte-Uyvr0rFc57RheZsotFSys8ZADtT_GMuZRz__ofBVqaBA==
X-Cache-Hits
0
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1551193450/ Frame A13D
65 KB
66 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.188.80 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-188-80.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
2720e6e8e7f3ae84079b8e84afdc637805a8886e610db0b29217947057a3a0e4

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 16:06:17 GMT
Via
1.1 varnish, 1.1 412049da39a44d4e9af054ecc17534dd.cloudfront.net (CloudFront)
Age
59856
Edge-Cache-Tag
313687566273846460968749706722669918033,316951410886732526360935603098811400471,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
66605
X-Request-Id
d05453b4de442a1f
X-Served-By
cache-fra19134-FRA
Last-Modified
Tue, 26 Feb 2019 16:01:05 GMT
Server
cloudinary
X-Timer
S1551197155.084973,VS0,VE468
ETag
"88b0913f1937b6d9267d1b2ef5ebdae4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With
X-Amz-Cf-Id
x91tkclAdhDYN6R1I2jyf42SSS90uWVopyMTxPQOgkDLSgPlUbhKhA==
X-Cache-Hits
0
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j73&a=31033535&t=pageview&_s=1&dl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploitin...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-87198801-1&cid=36730283.1553796851&jid=2058568695&_gid=7146368.1553796855&gjid=308795039&_v=j73&z=741052565
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=36730283.1553796851&jid=2058568695&_v=j73&z=741052565
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=36730283.1553796851&jid=2058568695&_v=j73&z=741052565&slf_rd=1&random=3821607772
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=36730283.1553796851&jid=2058568695&_v=j73&z=741052565&slf_rd=1&random=3821607772
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:815::2003 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:15 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:15 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-87198801-1&cid=36730283.1553796851&jid=2058568695&_v=j73&z=741052565&slf_rd=1&random=3821607772
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2019-03-28T18%3A14%3A16.703Z&_t=timespent&cBr=Ars%20Technica&cKe=exploits%7Cmalware%7Cvulnerabilities%7Cwinrar&cCh=information%20technology&cTi=A%20rogue%E2%80%99s%20gallery%20of%20bad%20actors%20is%20exploiting%20that%20critical%20WinRAR%20flaw&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_64%2C%20ALLBRANDS_57%2C%20ALLBRANDS_28%2C%20ALLBRANDS_244%2C%20ALLBRANDS_21%2C%20ALLBRANDS_192&cTpw=0.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.5628404061344047%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451%2C%200.11272932733641451&cEnt=winrar%2C%20symantec%2C%20password%2C%20page%20layout%2C%20fireeye%2C%20malware%2C%20elfin%2C%20espionage%2C%20ars%20technica%20addendum%2C%20active%20attack%2C%20file-compression%2C%20one%20campaign%2C%20dan%20goodin%2C%20spear-phishing%2C%20credit%20card%2C%20utc%2C%20keylogger%2C%20saudi%20arabia.%2C%20buzy.%2C%20cond%C3%A9%20nast&cEnw=1%2C%200.7395313059595316%2C%200.7347694559352109%2C%200.7189079984838979%2C%200.6957357579301836%2C%200.6066133099686202%2C%200.5542530364368511%2C%200.5502770236547431%2C%200.5385550432945296%2C%200.5208480129021588%2C%200.48477908975905576%2C%200.447181955566681%2C%200.4457186638344211%2C%200.4307143044859507%2C%200.4155263660617445%2C%200.4131322236990694%2C%200.40213747174052256%2C%200.400989722137997%2C%200.39791341022368365%2C%200.3636754959324837&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&cCl=820&cId=1482285&cPd=2019-03-27T21%3A20%3A36.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRt=direct&pHp=%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pRr=direct&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=75904ebe-e758-4baf-8543-ed4d685693bd&sID=ae37540b-f663-432e-9014-8250e718022d&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=986a734d-80d7-4ef6-9a7b-2e48857327ac&_v=5000&cKh=winrar%2Ccode-execution%20vulnerability%2Csymantec%2Cpassword%2Cpage%20layout%2Cfireeye%2Cactor%2Cmalware
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN (),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:16 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
ads
pubads.g.doubleclick.net/gampad/ Frame A13D
1 KB
1 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/biz-andamp-it&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=height%3D304%26muted%3D1%26series%3D5c82bd18bcdfff6f1f2fc5e7%26width%3D540&correlator=undefined&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fwar-stories-c-and-c-tiberian-sun&vid=5c74019c40f94807b9000000&cmsid=1495&ppid=e0d00638de1044f781df6eda1e100910
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
216.58.207.66 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s25-in-f2.1e100.net
Software
cafe /
Resource Hash
a04c006232f585e0b242ed92620a725e89f21d759d1e266508572bb4dc33d765
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

date
Thu, 28 Mar 2019 18:14:18 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
655
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame A13D
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-28T18%3A14%3A18.126Z&_c=timedOut&_t=gptData&sID=ae37540b-f663-432e-9014-8250e718022d&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&dim1=%7B%22adBlocked%22%3Afalse%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22Cannot%20read%20property%20%270%27%20of%20undefined%22%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225c74019c40f94807b9000000%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN (),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:18 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/
35 B
112 B
Other
General
Full URL
https://www.google-analytics.com/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::200e , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Thu, 28 Mar 2019 18:14:18 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,44,43,39"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame A13D
280 KB
87 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
bb6ba64ed1b727bf14a5944ae042fddf5e6a3e664ce79562029a9fd95d7df3dd

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:18 GMT
Content-Encoding
gzip
Last-Modified
Tue, 26 Mar 2019 15:26:22 GMT
Server
AmazonS3
x-amz-request-id
A9F5C0AD89E0A126
ETag
"02523d5d072002d276c9c8e517dca27c"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=25418
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
88194
x-amz-id-2
UA+IA6a/Bo+zhTeZBooWuiLGSHBL3ieA4ZFak5bTZXATYqiy0o2FLklbVq3QYELuQ7gmr0ut3Mg=
track
capture.condenastdigital.com/ Frame A13D
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2019-03-28T18%3A14%3A18.239Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=http%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fwar-stories-c-and-c-tiberian-sun&cId=5c74019c40f94807b9000000&cKe=&cPd=2019-02-26T16%3A00%3A00%2B00%3A00&cTi=Command%20%26%20Conquer%3A%20Tiberian%20Sun%20%7C%20War%20Stories&cTy=%2F3379%2Fconde.ars%2Fplayer%2Fbiz-andamp-it&mDu=782&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&pID=f656a21f-9fd2-4912-ae77-d2a36607262d&pWw=540&pWh=303.75&sID=ae37540b-f663-432e-9014-8250e718022d&uId=75904ebe-e758-4baf-8543-ed4d685693bd&xid=e0d00638-de10-44f7-81df-6eda1e100910&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22guid%22%3A%2266798d80-281f-d424-58dc-6f9ddf14d7b%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3295.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22tabStatus%22%3A%22active%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%7D&videoViews=1&adId=
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.240.97 Ashburn, United States, ASN (),
Reverse DNS
ec2-34-235-240-97.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Thu, 28 Mar 2019 18:14:18 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&o=3&t=1553796858316&de=975875632524&m=0&ar=4d52d3f132-clean&q=8&cb=0&cu=1553796858316&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=Command%20%26%20Conquer_%20Tiberian%20Sun%20%7C%20War%20Stories%3A%2F3379%2Fconde.ars%2Fplayer%2Fbiz-andamp-it%3Aundefined%3Aundefined&zMoatVideoId=5c74019c40f94807b9000000&zMoatAP=-&qs=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&fs=161888&na=1978603814&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
95.100.199.29 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-199-29.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Pragma
no-cache
Date
Thu, 28 Mar 2019 18:14:18 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Thu, 28 Mar 2019 18:14:18 GMT
ed2945fc-45f3-4520-8dd4-648a02d3ebc4thumbs.mp4
dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ Frame A13D
32 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ed2945fc-45f3-4520-8dd4-648a02d3ebc4thumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.81.154 Seattle, United States, ASN (),
Reverse DNS
server-54-192-81-154.mia50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Range
bytes=98304-

Response headers

Date
Thu, 28 Mar 2019 00:01:31 GMT
Via
1.1 a3f9acbeedd7bc2d447ffde08ad4558a.cloudfront.net (CloudFront)
Last-Modified
Mon, 25 Feb 2019 23:46:10 GMT
Server
AmazonS3
Age
65569
ETag
"1c51b5694b5f0596f2162f4b722c3668"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 98304-2539905/2539906
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2441602
X-Amz-Cf-Id
qGLZ36AbdFXDnPwEln7KqIF46cIz8WOhkS5tGlE3-nO0f0cUCYcuAQ==
ed2945fc-45f3-4520-8dd4-648a02d3ebc4file-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ Frame A13D
11 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ed2945fc-45f3-4520-8dd4-648a02d3ebc4file-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.81.154 Seattle, United States, ASN (),
Reverse DNS
server-54-192-81-154.mia50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
262d54dfcec7eb70a2671aeec60cd38113508e74659558fc200dd1daa9acf04b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 00:03:43 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Feb 2019 23:48:41 GMT
Server
AmazonS3
Age
110736
Vary
Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
Gm32pd7NRcaFwR5ZZ2y0Ubt3MCvoes4zmOUhm5WGgG9mGcCOP9gXNA==
Via
1.1 1b5f17b0fe932d74f5b54cdfd6d76f94.cloudfront.net (CloudFront)
ecbc132c-34df-4f26-9ac4-e2081fc89a29
https://arstechnica.com/ Frame A13D
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/ecbc132c-34df-4f26-9ac4-e2081fc89a29
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3445bd22374e7449265ec9c8ae91ba255148fb1583701f636792dc933befa73b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
ed2945fc-45f3-4520-8dd4-648a02d3ebc4file-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ Frame A13D
484 KB
468 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5c74019c40f94807b9000000/ed2945fc-45f3-4520-8dd4-648a02d3ebc4file-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.192.81.154 Seattle, United States, ASN (),
Reverse DNS
server-54-192-81-154.mia50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
ca6fd08300ee5329565fbb6937f74ce4f52a7de2e7c690e04548e90144545e9b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com

Response headers

Date
Thu, 28 Mar 2019 00:03:44 GMT
Content-Encoding
gzip
Last-Modified
Mon, 25 Feb 2019 23:48:29 GMT
Server
AmazonS3
Age
65600
Vary
Origin
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
X-Amz-Cf-Id
zqeZQrovL8Qe4xOP6lVE_FiD0mf_Oc2Oo-SQCxBV-VD7VbTqG66V7w==
Via
1.1 1b5f17b0fe932d74f5b54cdfd6d76f94.cloudfront.net (CloudFront)
/
srv-2019-03-28-18.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2019-03-28-18.pixel.parsely.com/plogger/?rand=1553796865784&plid=91327652&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%2205d73d41-315c-424b-a4c8-b4a9ca384ceb%22%2C%22parsely_site_uuid%22%3A%22525859be-917a-40a1-9511-163cb25a0c32%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2019%2F03%2Fa-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw%2F&sref=&sts=1553796865784&slts=0&date=Thu+Mar+28+2019+18%3A14%3A25+GMT%2B0000+(Coordinated+Universal+Time)&action=heartbeat&inc=5&tt=4900&pvid=88284276&u=525859be-917a-40a1-9511-163cb25a0c32
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.236.75 Seattle, United States, ASN (),
Reverse DNS
ec2-35-153-236-75.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 28 Mar 2019 18:14:25 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
cdb
bidder.criteo.com/
0
213 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=65&profileId=154&cb=88700294384
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
178.250.0.165 , France, ASN (),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://arstechnica.com
Date
Thu, 28 Mar 2019 18:14:27 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Timing-Allow-Origin
*
Vary
Origin
cdb
bidder.criteo.com/
0
213 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=65&profileId=154&cb=53874286915
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_CBC
Server
178.250.0.165 , France, ASN (),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw/
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Access-Control-Allow-Origin
https://arstechnica.com
Date
Thu, 28 Mar 2019 18:14:27 GMT
Access-Control-Allow-Credentials
true
Server
Finatra
Timing-Allow-Origin
*
Vary
Origin

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
p.rfihub.com
URL
https://p.rfihub.com/cm?pub=38725&userid=b204da9c-434f-454d-8a29-4c97d1af7d57&in=1&forward=https%3A%2F%2Fids.ad.gt%2Fapi%2Fv1%2Fszm_match%3Fszm%3D{userid}%26id%3Db204da9c-434f-454d-8a29-4c97d1af7d57

Verdicts & Comments Add Verdict or Comment

181 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| ars object| digitalData object| cns object| dataLayer object| BOOMR_mq object| google_tag_manager object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady38868002 function| __cmp function| e object| visitor function| Visitor object| s_c_il number| s_c_in function| DIL object| dilInstance string| referrer object| urlParams string| queryString string| fullUrl object| myParam string| GoogleAnalyticsObject function| ga object| _qevents object| __adIq_Config string| b object| h object| _aam_dataLayer undefined| userId boolean| _aam_spa function| fbq function| _fbq function| getVisitNumCustom number| d string| _linkedin_partner_id object| _linkedin_data_partner_ids object| AIM object| SparrowCache function| Sparrow object| _satellite object| PARSELY object| __SKIM_JS_GLOBAL__ function| skimlinksBeaconCallback function| skimlinksBeaconSecondaryCallback function| skimlinksBeaconAuxCallback object| googletag function| moatCondeListener object| apstag object| headertag object| CN object| _4d function| arsData object| _cne object| PolarConde function| _bizo_local_logger function| _bizo_fire_partners boolean| _bizo_main_already_called object| google_tag_data object| gaplugins string| hash boolean| sparrowInitialize object| _sparrow object| bouncex function| quantserve function| __qc object| ezt object| _qoptions object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater function| s_doPlugins function| s_getLoadTime function| AppMeasurement function| s_gi function| s_pgicq object| s string| s_loadT number| s_objectID number| s_giq object| evidon number| vb object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| __core-js_shared__ object| core object| gaGlobal object| gaData object| NATIVEADS object| NATIVEADS_QUEUE object| Sailthru object| Criteo function| headertag_render object| rubicontag object| GPT_jstiming undefined| google_measure_js_timing boolean| google_noFetch boolean| google_DisableInitialLoad number| __google_ad_urls_id function| docReady object| NATIVEADS_STORE object| _0xfd28 function| _0x8fd2 object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| googleCompanionsServicePresent function| googleGetCompanionAdSlots function| googleSetCompanionAdContents function| google_show_companion_ad function| google_show_companion_ad_in_slot function| google_get_companion_slot_params function| google_companion_error function| google_companion_loaded function| google_increment_num_ad_mouseovers string| google_ad_output string| google_ad_client string| google_flash_version boolean| google_webgl_support string| google_ad_section string| google_country function| reload_campaigns function| setBounceCookie function| getBounceCookie function| setBounceVisitCookie function| getBounceVisitCookie function| clearBounceCookie function| mb object| closure_lm_41151 object| google number| google_unique_id object| google_reactive_ads_global_state object| s_i_conde-arstechnica object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb string| key string| au_audience_code object| closure_lm_571120 string| audigent_visitor_id object| Moat#G26 boolean| Moat#EVA object| MoatSuperV26 object| aupixels object| criteo_pubtag number| google_global_correlator function| arrive function| unbindArrive function| leave function| unbindLeave

0 Cookies

5 Console Messages

Source Level URL
Text
console-api warning URL: https://player.cnevids.com/interlude/arstechnica.js(Line 2)
Message:
CNE Player: no interlude for "information-technology/2019/03/a-rogues-gallery-of-bad-actors-are-exploiting-that-critical-winrar-flaw" ("No available slot found.")
console-api log URL: https://c.evidon.com/sitenotice/evidon-sitenotice-tag.js(Line 1)
Message:
Evidon -- evidon-notice-link not found on page, cant display the consent link.
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js(Line 12)
Message:
TypeError: Cannot read property 'getItem' of null
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js(Line 12)
Message:
PLAYER lineItem error?:
console-api warning URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-5f76ee91f42b53ea57b3.js(Line 12)
Message:
PLAYER lineItem error?:

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
a.ad.gt
aax.amazon-adsystem.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ak.sail-horizon.com
ampcid.google.com
ampcid.google.de
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
assets.adobedtm.com
assets.bounceexchange.com
bidder.criteo.com
bw-prod.plrsrvcs.com
c.amazon-adsystem.com
c.evidon.com
capture.condenastdigital.com
cdn.accelerator.arsdev.net
cdn.arstechnica.net
cdn.mediavoice.com
cm.everesttech.net
cm.g.doubleclick.net
condenast.demdex.net
connect.facebook.net
d.turn.com
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dpm.demdex.net
dwgyu36up6iuz.cloudfront.net
evidon.mgr.consensu.org
fastlane.rubiconproject.com
iabmap.evidon.com
ids.ad.gt
image2.pubmatic.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
l.betrad.com
log.outbrainimg.com
match.adsrvr.org
mid.rkdms.com
odb.outbrain.com
ow.ly
p.ad.gt
p.rfihub.com
p.skimresources.com
pagead2.googlesyndication.com
pixel.condenastdigital.com
pixels.ad.gt
player.cnevids.com
plugin.mediavoice.com
polarcdn-pentos.com
polarcdn-terrax.com
pubads.g.doubleclick.net
px.ads.linkedin.com
px.moatads.com
r.skimresources.com
rules.quantcount.com
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
secure.adnxs.com
secure.quantserve.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
snap.licdn.com
srv-2019-03-28-18.config.parsely.com
srv-2019-03-28-18.pixel.parsely.com
sstats.arstechnica.com
static.criteo.net
static.polarcdn.com
stats.g.doubleclick.net
t.skimresources.com
tag.bounceexchange.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
vendorlist.consensu.org
widgets.outbrain.com
www.facebook.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
www.medtargetsystem.com
z.moatads.com
p.rfihub.com
104.103.89.123
104.17.192.78
151.101.0.239
151.101.2.2
151.139.128.10
152.195.39.114
172.217.22.34
178.250.0.165
185.33.223.209
185.64.189.110
205.234.175.175
213.19.162.61
216.137.61.155
216.58.207.66
23.36.208.73
23.58.216.21
2600:9000:2002:9e00:6:44e3:f8c0:93a1
2600:9000:200c:2a00:10:27b4:f500:93a1
2600:9000:200c:5400:1:af78:4c0:93a1
2606:4700::6811:4032
2606:4700::6811:4132
2606:4700::6811:dd0f
2606:4700::6813:da83
2606:4700::6813:f87e
2a00:1450:4001:808::2002
2a00:1450:4001:814::200a
2a00:1450:4001:815::2002
2a00:1450:4001:815::2003
2a00:1450:4001:816::2006
2a00:1450:4001:817::2002
2a00:1450:4001:817::2004
2a00:1450:4001:818::2001
2a00:1450:4001:81a::2002
2a00:1450:4001:81a::200e
2a00:1450:4001:81e::200e
2a00:1450:4001:820::2008
2a00:1450:400c:c0a::9a
2a02:26f0:6c00:296::25ea
2a03:2880:f01c:216:face:b00c:0:3
2a03:2880:f11c:8083:face:b00c:0:25de
2a05:f500:10:101::b93f:9105
34.193.122.206
34.199.18.114
34.209.164.143
34.215.123.63
34.235.240.97
34.250.76.236
35.153.236.75
35.160.176.109
35.190.40.172
35.190.59.101
35.190.92.63
35.201.67.47
46.228.164.13
50.31.169.131
52.2.117.76
52.204.40.232
52.206.32.35
52.210.6.215
52.213.58.51
52.3.171.116
52.32.108.251
52.33.126.96
52.44.76.10
52.49.216.17
52.6.60.254
52.85.188.140
52.85.188.235
52.85.188.32
52.85.188.56
52.85.188.80
52.86.70.149
52.94.220.16
54.165.0.24
54.174.217.231
54.183.130.144
54.192.81.154
54.192.81.165
54.230.202.169
54.230.93.177
54.230.95.153
54.230.95.20
54.230.95.26
54.230.95.73
54.85.9.53
63.140.41.50
64.74.236.19
66.117.28.86
74.119.119.131
91.228.74.213
95.100.196.33
95.100.198.179
95.100.198.4
95.100.199.29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