URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_bran...
Submission: On January 12 via api from US

Summary

This website contacted 55 IPs in 8 countries across 38 domains to perform 248 HTTP transactions. The main IP is 50.31.169.131, located in Elk Grove Village, United States and belongs to SERVERCENTRAL - Server Central Network, US. The main domain is arstechnica.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 16th 2019. Valid for: 2 years.
This is the only time arstechnica.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 50.31.169.131 23352 (SERVERCEN...)
16 205.234.175.175 30081 (CACHENETW...)
6 2a00:1450:400... 15169 (GOOGLE)
5 143.204.90.242 16509 (AMAZON-02)
10 23.210.249.164 16625 (AKAMAI-AS)
28 23.210.250.213 16625 (AKAMAI-AS)
1 13.225.78.8 16509 (AMAZON-02)
3 143.204.101.13 16509 (AMAZON-02)
2 2606:4700::68... 13335 (CLOUDFLAR...)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
8 216.58.210.2 15169 (GOOGLE)
2 23.210.250.44 16625 (AKAMAI-AS)
2 35.173.145.106 14618 (AMAZON-AES)
2 13.224.197.33 16509 (AMAZON-02)
1 54.76.0.5 16509 (AMAZON-02)
2 151.101.112.239 54113 (FASTLY)
1 3 35.190.59.101 15169 (GOOGLE)
2 35.201.67.47 15169 (GOOGLE)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 178.250.2.130 44788 (ASN-CRITE...)
1 143.204.101.55 16509 (AMAZON-02)
1 54.154.203.64 16509 (AMAZON-02)
1 2600:9000:215... 16509 (AMAZON-02)
15 54.173.157.53 14618 (AMAZON-AES)
1 3.10.124.206 16509 (AMAZON-02)
6 2a00:1450:400... 15169 (GOOGLE)
7 152.195.132.202 15133 (EDGECAST)
7 2a00:1450:400... 15169 (GOOGLE)
1 52.6.38.26 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
7 95.100.198.32 16625 (AKAMAI-AS)
1 35.190.40.172 15169 (GOOGLE)
26 13.224.197.104 16509 (AMAZON-02)
1 2a00:1450:400... 15169 (GOOGLE)
2 52.4.170.229 14618 (AMAZON-AES)
2 34.231.252.38 14618 (AMAZON-AES)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 64.202.112.95 22075 (AS-OUTBRAIN)
3 2a00:1450:400... 15169 (GOOGLE)
4 143.204.98.73 16509 (AMAZON-02)
1 2606:4700:10:... 13335 (CLOUDFLAR...)
2 52.45.226.131 14618 (AMAZON-AES)
1 151.101.14.2 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a03:2880:f02... 32934 (FACEBOOK)
6 13.225.78.108 16509 (AMAZON-02)
5 52.205.63.26 14618 (AMAZON-AES)
1 35.244.174.68 15169 (GOOGLE)
12 30 152.199.22.24 15133 (EDGECAST)
4 178.250.0.165 44788 (ASN-CRITE...)
1 2a03:2880:f02... 32934 (FACEBOOK)
4 69.173.144.143 26667 (RUBICONPR...)
248 55
Apex Domain
Subdomains
Transfer
38 cloudfront.net
d1z2jf7jlzjs58.cloudfront.net
dwgyu36up6iuz.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
2 MB
30 advertising.com
adserver-us.adtech.advertising.com
16 KB
29 moatads.com
z.moatads.com
mb.moatads.com
px.moatads.com
173 KB
26 condenastdigital.com
pixel.condenastdigital.com
capture.condenastdigital.com
infinityid.condenastdigital.com
4d.condenastdigital.com
wren.condenastdigital.com
24 KB
16 arstechnica.net
cdn.arstechnica.net
591 KB
9 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
pubads.g.doubleclick.net
110 KB
8 casalemedia.com
as-sec.casalemedia.com
4 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
50 KB
8 googlesyndication.com
tpc.googlesyndication.com
pagead2.googlesyndication.com
142 KB
8 skimresources.com
s.skimresources.com
r.skimresources.com
t.skimresources.com
p.skimresources.com
17 KB
7 cookielaw.org
cdn.cookielaw.org
164 KB
6 google-analytics.com
www.google-analytics.com
19 KB
5 cnevids.com
player.cnevids.com
api.cnevids.com
63 KB
5 amazon-adsystem.com
c.amazon-adsystem.com
30 KB
4 rubiconproject.com
fastlane.rubiconproject.com
3 KB
4 criteo.com
bidder.criteo.com
580 B
4 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
48 KB
4 google.com
adservice.google.com
ampcid.google.com
www.google.com
2 KB
4 googletagservices.com
www.googletagservices.com
44 KB
3 googleapis.com
imasdk.googleapis.com
116 KB
3 parsely.com
srv-2020-01-12-12.config.parsely.com
srv-2020-01-12-12.pixel.parsely.com
1 KB
3 google.de
adservice.google.de
ampcid.google.de
www.google.de
2 KB
2 facebook.net
connect.facebook.net
143 KB
2 polarcdn-terrax.com
polarcdn-terrax.com
595 B
2 mediavoice.com
cdn.mediavoice.com
plugin.mediavoice.com
127 KB
2 actionbutton.co
embed.actionbutton.co
prod-native.actionbutton.co
17 KB
2 indexww.com
js-sec.indexww.com
37 KB
2 arstechnica.com
arstechnica.com
16 KB
1 facebook.com
an.facebook.com
1 KB
1 rlcdn.com
api.rlcdn.com
203 B
1 2mdn.net
s0.2mdn.net
11 KB
1 onetrust.com
geolocation.onetrust.com
511 B
1 consensu.org
api.skimlinks.mgr.consensu.org
636 B
1 adsrvr.org
match.adsrvr.org
536 B
1 rkdms.com
mid.rkdms.com
1 criteo.net
static.criteo.net
28 KB
1 zqtk.net
segment-data.zqtk.net
553 B
1 googletagmanager.com
www.googletagmanager.com
71 KB
248 38
Domain Requested by
30 adserver-us.adtech.advertising.com 12 redirects arstechnica.com
26 dwgyu36up6iuz.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
25 px.moatads.com arstechnica.com
16 cdn.arstechnica.net arstechnica.com
15 capture.condenastdigital.com arstechnica.com
8 as-sec.casalemedia.com js-sec.indexww.com
7 tpc.googlesyndication.com securepubads.g.doubleclick.net
7 cdn.cookielaw.org www.googletagmanager.com
cdn.cookielaw.org
7 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
arstechnica.com
6 images.outbrainimg.com arstechnica.com
6 dp8hsntg6do36.cloudfront.net arstechnica.com
d2c8v52ll5s99u.cloudfront.net
6 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
5 wren.condenastdigital.com cdn.arstechnica.net
5 c.amazon-adsystem.com arstechnica.com
c.amazon-adsystem.com
4 fastlane.rubiconproject.com js-sec.indexww.com
4 bidder.criteo.com static.criteo.net
4 d2c8v52ll5s99u.cloudfront.net player.cnevids.com
imasdk.googleapis.com
d2c8v52ll5s99u.cloudfront.net
4 www.googletagservices.com arstechnica.com
securepubads.g.doubleclick.net
3 imasdk.googleapis.com player.cnevids.com
imasdk.googleapis.com
3 r.skimresources.com 1 redirects arstechnica.com
3 player.cnevids.com arstechnica.com
cdn.arstechnica.net
player.cnevids.com
3 z.moatads.com arstechnica.com
d2c8v52ll5s99u.cloudfront.net
securepubads.g.doubleclick.net
2 connect.facebook.net d2c8v52ll5s99u.cloudfront.net
connect.facebook.net
2 srv-2020-01-12-12.pixel.parsely.com arstechnica.com
2 4d.condenastdigital.com pixel.condenastdigital.com
2 infinityid.condenastdigital.com pixel.condenastdigital.com
d2c8v52ll5s99u.cloudfront.net
2 polarcdn-terrax.com cdn.mediavoice.com
plugin.mediavoice.com
2 p.skimresources.com arstechnica.com
2 t.skimresources.com arstechnica.com
s.skimresources.com
2 pixel.condenastdigital.com arstechnica.com
2 d1z2jf7jlzjs58.cloudfront.net arstechnica.com
d1z2jf7jlzjs58.cloudfront.net
2 api.cnevids.com cdn.arstechnica.net
2 widgets.outbrain.com cdn.arstechnica.net
widgets.outbrain.com
2 adservice.google.com www.googletagservices.com
imasdk.googleapis.com
2 js-sec.indexww.com arstechnica.com
2 arstechnica.com cdn.arstechnica.net
1 pubads.g.doubleclick.net d2c8v52ll5s99u.cloudfront.net
1 pagead2.googlesyndication.com arstechnica.com
1 an.facebook.com js-sec.indexww.com
1 api.rlcdn.com js-sec.indexww.com
1 mcdp-nydc1.outbrain.com widgets.outbrain.com
1 s0.2mdn.net imasdk.googleapis.com
1 odb.outbrain.com widgets.outbrain.com
1 geolocation.onetrust.com cdn.cookielaw.org
1 log.outbrainimg.com widgets.outbrain.com
1 www.google.de arstechnica.com
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 ampcid.google.de www.google-analytics.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 ampcid.google.com www.google-analytics.com
1 srv-2020-01-12-12.config.parsely.com d1z2jf7jlzjs58.cloudfront.net
1 mb.moatads.com z.moatads.com
1 prod-native.actionbutton.co embed.actionbutton.co
1 match.adsrvr.org js-sec.indexww.com
1 mid.rkdms.com js-sec.indexww.com
1 static.criteo.net js-sec.indexww.com
1 plugin.mediavoice.com cdn.mediavoice.com
1 segment-data.zqtk.net arstechnica.com
1 adservice.google.de www.googletagservices.com
1 www.googletagmanager.com arstechnica.com
1 s.skimresources.com arstechnica.com
1 cdn.mediavoice.com arstechnica.com
1 embed.actionbutton.co arstechnica.com
248 65
Subject Issuer Validity Valid
*.arstechnica.com
Sectigo RSA Domain Validation Secure Server CA
2019-01-16 -
2021-01-15
2 years crt.sh
*.cachefly.net
GlobalSign RSA OV SSL CA 2018
2019-12-03 -
2021-10-29
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
c.amazon-adsystem.com
Amazon
2019-10-07 -
2020-09-29
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
moatads.com
DigiCert ECC Secure Server CA
2018-11-10 -
2020-02-09
a year crt.sh
*.actionbutton.co
Go Daddy Secure Certificate Authority - G2
2019-06-25 -
2020-06-27
a year crt.sh
*.cnevids.com
Amazon
2019-05-14 -
2020-03-07
10 months crt.sh
ssl962336.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-11-12 -
2020-05-20
6 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.google.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.zqtk.net
COMODO RSA Domain Validation Secure Server CA
2018-08-09 -
2020-08-24
2 years crt.sh
condenast.com
GlobalSign CloudSSL CA - SHA256 - G3
2019-10-31 -
2020-08-07
9 months crt.sh
ssl446800.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-09-13 -
2020-03-21
6 months crt.sh
*.criteo.net
DigiCert ECC Secure Server CA
2019-12-03 -
2021-04-06
a year crt.sh
*.rkdms.com
Entrust Certification Authority - L1K
2017-10-09 -
2020-10-30
3 years crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
sa437gl.wpc.edgecastcdn.net
DigiCert SHA2 Secure Server CA
2018-05-17 -
2020-08-19
2 years crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.config.parsely.com
Amazon
2019-02-27 -
2020-03-27
a year crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
*.conde.io
Amazon
2019-06-03 -
2020-07-03
a year crt.sh
www.google.de
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.storage.googleapis.com
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.onetrust.com
DigiCert SHA2 Secure Server CA
2018-03-12 -
2020-06-14
2 years crt.sh
*.pixel.parsely.com
Let's Encrypt Authority X3
2019-12-02 -
2020-03-01
3 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.doubleclick.net
GTS CA 1O1
2019-12-10 -
2020-03-03
3 months crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-12-06 -
2020-03-05
3 months crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2019-04-24 -
2020-04-23
a year crt.sh
*.adtech.advertising.com
DigiCert SHA2 High Assurance Server CA
2018-05-22 -
2020-05-26
2 years crt.sh
*.criteo.com
DigiCert ECC Secure Server CA
2019-12-05 -
2021-04-08
a year crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh

This page contains 12 frames:

Primary Page: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Frame ID: 07A25E0B4FC64404B40AF41AF6269970
Requests: 216 HTTP requests in this frame

Frame: https://js-sec.indexww.com/um/ixmatch.html
Frame ID: 6E5564D875CDC67B558E6291D925D4D5
Requests: 1 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.8438380430270684
Frame ID: DB525FA3C15F42B61AD5238704006EE3
Requests: 1 HTTP requests in this frame

Frame: https://prod-native.actionbutton.co/?isNativeEmbed=true&a9c17158-030f-4952-b6af-1434342af89d
Frame ID: 26F39F0C2291AB9C9E377210F4BFEFA2
Requests: 1 HTTP requests in this frame

Frame: https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Frame ID: 6FB184178745AD0E157030AFE736DB5C
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Frame ID: EFEF24BA575B397DD42648284E044A08
Requests: 28 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.358.1_en.html
Frame ID: C5631C2C93181C6DFB06E362F4DCF78B
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 4625DE70547D6DD52472553082C75AF5
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Frame ID: 0C918FD8C17C09BFEF231FBCDA5969CA
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Frame ID: 008B062641FD21239ABFC698C3E7238E
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvNPu4asZA47_7Kb272iKnelXyBV8BfCxKxxN9-H2XV618tOFtzAXo170BMevJ5ZT93W6j3ni3Y7uuJ-f7mfrXB1ItWBs6GU0PAFEtuLDHMUBWaumfRqanremyvnKx1M1Efj40Ajvj3gBLUA0YeBZlzN55wFtUBeCwUvsVLNt-UykecjQ1vpHwLjKHesRLQ4ljmxKvg7dpwGRJE9otc4suazWRhHIkH2BvWj1PVa-nAHe5LFXf8Q40HuaFqnFWo4lnEGXvI0H5EoZogmSPkyukfnOfAwpHGz5ETtYtX9BlkR1F6Rw&sai=AMfl-YTCbHSHo7fFfjdSaj1zXb5NSR1vTpWbCL53Jlv1OzUds7CENt2tATUuyDNeO0e_WDgS0r4TUMgG6nvxvU8h8b4TuHT9cKqkopS3uIVk&sig=Cg0ArKJSzCcRq0qFMUmREAE&adurl=
Frame ID: E42AA25E9352BE026FE26B35F156157A
Requests: 5 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssl6LRWB7CGSDEXDyaRuySObfadZepk3Uf3GJT_LhBB1z1cWyyqnXodHKlVcZ9OuAKdrTKrHfiZu5d-Q7wcRSu9ZjiRS-0hKgff_lcAVg8fTSahkx_h8JL7W1qOZmmpGpo2OGP6_Szv8IreEzdsGjhrxZ2tE1dlAMntPSVWnudxD7qY1MhpuMzO9aEsp1yTsEcraM4BX86Hq78cfKsr2L5qWURL6Qi_tx8scceBSkNyRJW3GrX_ATrn2AZnNmuq_vAsGlLsIjSLgXBzo6Wb2R1SkDXT7mjc2T9InqyYuRwcD44sHg&sai=AMfl-YQNxU74c_tBdHjDmhi_CEET65iMZaNXC3q1I5FX2p5JDhVnCcn3xTcbxl7kkeVmT8AL-ZiF2PyVXphJFKkU5HTuBNwKyR-bPC_Io4h-&sig=Cg0ArKJSzARfevp91KCqEAE&adurl=
Frame ID: B18C09885F0E5DD5A836A99BD1095674
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • html /<link rel=["']stylesheet["'] [^>]+\/wp-(?:content|includes)\//i
  • headers link /rel="https:\/\/api\.w\.org\/"/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<!-- (?:End )?Google Tag Manager -->/i

Page Statistics

248
Requests

96 %
HTTPS

32 %
IPv6

38
Domains

65
Subdomains

55
IPs

8
Countries

3651 kB
Transfer

10174 kB
Size

8
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 46
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DYCWQ55TVE6RE44M6FJ4E385&persistence=1&checksum=9b70e89d6ea680db0108d60616128841374c7ca073a3f60f02d4e90d2d9279f9
Request Chain 110
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=1006128056.1578833254&jid=279629182&gjid=1673014821&_gid=1844234117.1578833254&_u=aChAgUAjAAQC~&z=2005265160 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1006128056.1578833254&jid=279629182&_v=j79&z=2005265160 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1006128056.1578833254&jid=279629182&_v=j79&z=2005265160&slf_rd=1&random=3068067614
Request Chain 162
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 163
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 168
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 169
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 197
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Ab6e7f840-3539-11ea-a92b-12dccfef2018;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 198
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Ab6e84b38-3539-11ea-a663-12c791b7f306;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 199
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Ab710e5b6-3539-11ea-ab1f-127f7115e3c4;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 200
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Ab6e89a5c-3539-11ea-9722-1249c31fdca2;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 234
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 239
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA; HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 241
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;apid=1Ac134dd18-3539-11ea-af36-12bf237d14d4;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Request Chain 242
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA HTTP 302
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;apid=1Ac10b4a52-3539-11ea-b33a-12a8bb4804a8;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA

248 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/
44 KB
15 KB
Document
General
Full URL
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
4ce947286503937c7b56248af08f4572a71d1a59be28d645b575e10dab07523a
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
arstechnica.com
:scheme
https
:path
/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
server
nginx
date
Sun, 12 Jan 2020 12:47:32 GMT
content-type
text/html; charset=UTF-8
link
<https://arstechnica.com/wp-json/>; rel="https://api.w.org/"
strict-transport-security
max-age=300
x-content-type-options
nosniff
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
x-ars-server
web204
content-encoding
gzip
main-480879d7ba.css
cdn.arstechnica.net/wp-content/themes/ars/assets/css/
345 KB
72 KB
Stylesheet
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
7408ff91ddbae65dce04283facad2d16791c7ed107fa2cdbea1046dc0f1436c9

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1578345494:cacheN.fra2-01:H
status
200
content-length
72988
x-cf-tsc
1578345498
x-cf2
H
last-modified
Mon, 06 Jan 2020 20:40:54 GMT
server
CFS 0215
x-cff
B
etag
W/"5e139b56-56238"
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
2
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
gpt.js
www.googletagservices.com/tag/js/
52 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
60a4cec46374fa56f9a4a95e42d22bf984074a193f6db533a7038a490c4ecb7a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"395 / 270 of 1000 / last-modified: 1578693148"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15939
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:33 GMT
apstag.js
c.amazon-adsystem.com/aax2/
87 KB
26 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.242 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-242.fra50.r.cloudfront.net
Software
Server /
Resource Hash
0f144f16507d02eabc67a131e4d54ac36266dcfe3dac263a6971265371eff7b9

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sat, 11 Jan 2020 23:25:50 GMT
content-encoding
gzip
server
Server
x-amz-cf-pop
FRA50-C1
etag
6bed68e25cc35021d570267b56047ef8
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
cache-control
public, max-age=86400
accept-ranges
bytes
x-edge-o15-rid
XSxizGcL9J3m55O9VayhTWwDVGRrWHgF-sLL5OaCDt580rV1mgq1OQ==
x-amz-cf-id
sb4KGg4zw8pbmbR9dskHPUu9fwtchRjunJzeSaSweCi62LLTv1o8nQ==
via
1.1 a09186728c1bcdf0a561aedd92656804.cloudfront.net (CloudFront)
183973-1558632223658.js
js-sec.indexww.com/ht/p/
129 KB
37 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
c17eff2bacde53ebca1ff1d5871b51abeee623069c48b92b05950a24f3e20ce9

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 12 Jan 2020 12:30:16 GMT
Server
Apache
ETag
"904b38-20394-59bf08568b9e0"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=2625
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
37347
Expires
Sun, 12 Jan 2020 13:31:18 GMT
moatheader.js
z.moatads.com/condenastprebidheader987326845656/
187 KB
66 KB
Script
General
Full URL
https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
0eb438ad4233f9cdadd2cf6e5e3544a29b1e693a03f45b0b9fa25e70f2675917

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:33 GMT
Content-Encoding
gzip
Last-Modified
Tue, 29 Oct 2019 23:07:10 GMT
Server
AmazonS3
x-amz-request-id
EE440658F867C214
ETag
"36eff026ea983609efb74e7f83fac3f5"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=22471
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
67412
x-amz-id-2
YL9ogPz0mWBFOZthev9AeEKdbJpmm9pcgfLlY/H6675TxLi7xe45e7mSRBFYKnwFlZgbaSnvgx4=
ars-technica.min.js
cdn.arstechnica.net/cns/
134 KB
44 KB
Script
General
Full URL
https://cdn.arstechnica.net/cns/ars-technica.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
74f7fa7a78e8e51e919df7918f2d872881efca3e930835a1f7d55dfa079bbc21

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-cf3
H
x-amz-request-id
EB5EFB8DF7141FF3
x-cf1
14961:fC.fra2:co:1576089267:cacheN.fra2-01:H
status
200
content-length
44266
x-amz-id-2
rBsgiWaFuvQFzkIrCXZOH1WRGd9bORjDW3ymGUeOhx0SgRVFURe/cfxzQpFeNHJT9JiISUgHK0w=
x-cf-tsc
1576089269
cf4ttl
119.500
x-cf2
H
last-modified
Tue, 10 Dec 2019 17:18:43 GMT
server
CFS 0215
x-timer
S1576089269.399738,VS0,VE9
x-cff
B
etag
"ddc58829b26392a3b7d4ca435d8ade2e"
x-served-by
cache-dca17726-DCA
vary
Accept-Encoding
x-amz-version-id
KECwyyNnH9UBZqmHkq3UHIMjxhZ7ain2
access-control-allow-origin
*
expires
Mon, 13 Jan 2020 12:47:33 GMT
cache-control
max-age=86400
cf4age
2
accept-ranges
bytes
content-type
application/javascript
x-cf-rand
0.316
x-cache-hits
1
ars-bcfee6c82a.ads.us.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
4 KB
2 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/ars-bcfee6c82a.ads.us.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
032027ea92b8b014594b64b514f922a12029c27c3dc27e5c11b09eabfaf810c3

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1565891941:cacheN.fra2-01:H
status
200
content-length
1415
x-cf-tsc
1576519402
x-cf2
H
last-modified
Mon, 16 Dec 2019 17:45:29 GMT
server
CFS 0215
x-cff
B
etag
W/"5df7c2b9-e66"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
utilities-800x533.jpg
cdn.arstechnica.net/wp-content/uploads/2020/01/
38 KB
38 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/uploads/2020/01/utilities-800x533.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
e8dbf7878bdc8806d80910e714ad6f45ed361d2af934caa55895283a09865bb1

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1578687368:cacheN.fra2-01:H
status
200
content-length
38421
x-cf-tsc
1578830882
x-cf2
H
last-modified
Fri, 10 Jan 2020 20:15:36 GMT
server
CFS 0215
x-cff
B
etag
"5e18db68-9615"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
x-cf-rand
1.511
expires
Sun, 08 Mar 2020 12:47:33 GMT
main-21927b84b8.js
cdn.arstechnica.net/wp-content/themes/ars/assets/js/
662 KB
215 KB
Script
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
994348f41972e42ce444fa51b3d2fe5fc1b07fe25771c3ca9add7d2f02208901

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1578344574:cacheN.fra2-01:H
status
200
content-length
219227
x-cf-tsc
1578344575
x-cf2
H
last-modified
Mon, 06 Jan 2020 20:40:54 GMT
server
CFS 0215
x-cff
B
etag
W/"5e139b56-a5753"
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
widget.min.js
embed.actionbutton.co/widget/
53 KB
17 KB
Script
General
Full URL
https://embed.actionbutton.co/widget/widget.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.8 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-8.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f9b84f2df9256c362df6f7eb8ca204830c81a25cec361bcff302e48e55fc15ce

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sat, 11 Jan 2020 01:18:00 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Nov 2019 18:33:48 GMT
Server
AmazonS3
Age
38057
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 90cf045072373c2c671297de3161846f.cloudfront.net (CloudFront)
Cache-Control
no-cache
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA2-C2
Connection
keep-alive
X-Amz-Cf-Id
iuQP1Y8MXIC5PfW9w80UpTr5RN-2YnRjL7mVGCnwBpcAC3Z_izvIAA==
arstechnica.js
player.cnevids.com/interlude/
109 KB
28 KB
Script
General
Full URL
https://player.cnevids.com/interlude/arstechnica.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.13 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-13.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
02a9db289d960e3196e2269632ee772bbcb51333e9ab3503105ae7f3b1665062
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:46:33 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Age
42
X-Cache
Hit from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
27527
X-XSS-Protection
1; mode=block
X-Request-Id
9d68fd51-ef13-400c-9e1d-504b5bc6830a
X-Runtime
0.012876
X-Backend-Node
10.110.120.110
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"febbc10728259fac263903d9c7dd40d9"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 ba77f90aac0ddbc2c4c2c02062fac762.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
_1VsLZBvr5SHrx2zrroWobRZpPcTYdmujex0Ma03TX8Hov73cAcg4A==
conde-asa-polar-master.js
cdn.mediavoice.com/nativeads/script/condenastcorporate/
5 KB
2 KB
Script
General
Full URL
https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
030e91b7512dbb40e9b9057f20bcf54c296a7f28c04bbcde0f2d2706dd2a3a06

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
cf-cache-status
HIT
age
12444
status
200
content-type
text/javascript
content-length
2018
via
1.1 varnish
server
cloudflare
cache-control
max-age=21600
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-varnish
1716844763 1716812162
x-country
DE
cf-ipcountry
DE
accept-ranges
bytes
cf-ray
553f3d591f87d70d-FRA
100098X1555750.skimlinks.js
s.skimresources.com/js/
39 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/100098X1555750.skimlinks.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
0cae365407f154c997a95a4b1318f0da00eeae0533812d2389e7dbb0a8c55c8e

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
last-modified
Tue, 07 Jan 2020 13:26:32 GMT
server
AmazonS3
x-amz-request-id
1A9F78C6C6788B7A
etag
"fe7b319a6fac84576af0e0f704c34150"
x-hw
1578833253.cds003.wa1.hc,1578833253.cds006.wa1.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15252
x-amz-id-2
BlQ7xy2uFxcOFQqp8WR5ue8Z3mX6mkitlPyj8I9uLpCkrhG7ml4XcryNZpE0Xo85tVmzR/6wlTE=
gtm.js
www.googletagmanager.com/
290 KB
71 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
dd962d5b71401686d24eee0af00621b8733e0e227ed985adb2095005fb75d195
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
br
last-modified
Sun, 12 Jan 2020 12:00:00 GMT
server
Google Tag Manager
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
72468
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:33 GMT
ads.js
arstechnica.com/hotzones/src/
0
517 B
XHR
General
Full URL
https://arstechnica.com/hotzones/src/ads.js
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.31.169.131 Elk Grove Village, United States, ASN23352 (SERVERCENTRAL - Server Central Network, US),
Reverse DNS
ge-11-2-1.ar10.ord6.us.scnet.net
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-content-type-options
nosniff
last-modified
Fri, 10 Jan 2020 23:00:53 GMT
server
nginx
etag
"5e190225-0"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
content-length
0
content-security-policy
default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
strict-transport-security
max-age=300
accept-ranges
bytes
x-ars-server
web204
x-xss-protection
1; mode=block
integrator.js
adservice.google.de/adsid/
109 B
778 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
778 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2019121002.js
securepubads.g.doubleclick.net/gpt/
163 KB
60 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
216fd62bccc74ef4e4d35292cd4874e7072a4fb30685afb6235d894a3ec1a2df
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 10 Dec 2019 17:29:18 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
60922
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:33 GMT
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.242 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-242.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 04:19:51 GMT
content-encoding
gzip
vary
Origin
age
30463
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Wed, 08 Jan 2020 04:09:03 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 0d37b2e69745cd9f0c5457fbf1a83129.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
x4dK7H5IXkn82AHrxhK3wyeymMnhirV5MhRfQVOWl4D2EhS0WTy3qw==
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
78c8c364b438f0be81f1c51627902fda95b7aebdd2c04aee28c2f72cd4390207

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
357 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f95836cdd8c1af1d8261e8e198a4c1dd306e2b50ddc389fe820b56212a9cb17d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
economica-bold-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
25 KB
25 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-bold-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
5315cf641e62ac7de4a82e6003cc1bd1ff09218400d8ff5286c951e25aee966b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
25592
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-63f8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
economica-regular-otf-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/economica-regular-otf-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c14a030b0b5ef06f710d9bbff164662d4b43c037e62f254aa6280504013caa34

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24264
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5ec8"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
truncated
/
279 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ecbfb541946a9a9437190a21d98e1c7ab7d863837d7d038a9a1e053c649c8ba

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
400 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6f261533d4b74ae931965cf3609bf47bb55001e39eb7029502d96cec73c4749a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
700 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5ab499494548829e507e9b6cd57247a6cd565e7f1bc6eb55e3da445af76f1f0c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
49282a74c6ced31e99f808232188ade8d82652004df4d664dcdb98c32563dd39

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
841 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
039f13cdf684666dd973e2385f773385adb074039e8a832ec48e1ae35fb20c15

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
channel-ars-be7bb52ba9.png
cdn.arstechnica.net/wp-content/themes/ars/assets/img/
5 KB
5 KB
Image
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/img/channel-ars-be7bb52ba9.png
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
08ed3bf6e73a999bafb422b878fb05b87269b00a65230c9457ce75aee10b873e

Request headers

Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
H
cf4ttl
43200.000
x-cf1
14961:fC.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
4809
x-cf-tsc
1571286841
last-modified
Mon, 14 Oct 2019 19:40:51 GMT
server
CFS 0215
x-cff
B
etag
"5da4cf43-12c9"
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
29303
accept-ranges
bytes
x-cf-rand
3.606
expires
Sun, 08 Mar 2020 12:47:33 GMT
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c7f2558d7005dc61e343b6abb61a63da8ace760a0fdd45cb0cc124b0de5b4c2f

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
18 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
62c7d2da9a5942053f17c9756e53b7cda414541619bd35c2b1441cd88c77f235

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4ec4b6769730ca98db1f40b152c52bd5bec01f61f559fb92709c307750388ac8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
opensans-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
18 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
caa3854f28740fa98125ded826446ee4456379e8ad7c4ff46643347d1901506a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18824
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4988"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
bitter-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
24 KB
24 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1193e934b76ed372f47e23f78f8a13e99d9588e564aff866e8f700e7a0650a83

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
24212
x-cf-tsc
1561917085
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5e94"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
bitter-regular-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
23 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-regular-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
0186840386391fa2c0750ff7450a78e066498ba3274546a6fcf0fa9c55cd457c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22872
x-cf-tsc
1561863055
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5958"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
opensans-semibold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
1f9cd4a445ba85172da6090dd7b95edf55fd9e81ddb193e0b78093c1afa84378

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
18972
x-cf-tsc
1562205866
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4a1c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
opensans-semibolditalic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-semibolditalic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
59201950b83489808587827b4050ffe0597992825daa88c227476cdbbf8ca282

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20872
x-cf-tsc
1562205866
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5188"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
opensans-italic-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
20 KB
21 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-italic-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
c46974d8f6030e4888708b18a5d9a32b25eb765a5708896e1899df449d87aab7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
20748
x-cf-tsc
1562368559
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-510c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
bitter-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
22 KB
22 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/bitter-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
807271433f80bb33654a84ec904035be3d2b34e505a051e3469a47fe39ccb752

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
22104
x-cf-tsc
1562368897
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-5658"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
opensans-bold-webfont.woff2
cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/
19 KB
19 KB
Font
General
Full URL
https://cdn.arstechnica.net/wp-content/themes/ars/assets/fonts/opensans-bold-webfont.woff2
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.234.175.175 , United States, ASN30081 (CACHENETWORKS - CacheNetworks, Inc., US),
Reverse DNS
vip1.G-anycast1.cachefly.net
Software
CFS 0215 /
Resource Hash
86096831a70c72ac0c08f5e65ae92d98330d9fd2b7511dde65ff50b8a16bfd9a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://cdn.arstechnica.net/wp-content/themes/ars/assets/css/main-480879d7ba.css
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-cf3
M
cf4ttl
43200.000
x-cf1
14961:fD.fra2:co:1525808045:cacheN.fra2-01:H
status
200
content-length
19516
x-cf-tsc
1562369864
x-cf2
H
last-modified
Tue, 25 Jun 2019 14:52:45 GMT
server
CFS 0215
x-cff
B
etag
"5d12353d-4c3c"
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=4838400
cf4age
0
accept-ranges
bytes
expires
Sun, 08 Mar 2020 12:47:33 GMT
outbrain.js
widgets.outbrain.com/
114 KB
39 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1578833253334
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.250.44 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-44.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
5a0a93671377a6664ba7cf14edb07eb610b7a41de59270f06c8a6e190aa1c72c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 12 Jan 2020 12:15:40 GMT
Server
AkamaiNetStorage
ETag
"22af29a427ad01d1818440010b0c92a2:1578832461"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
39021
video_groups
api.cnevids.com/v1/
4 KB
1 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups?filters={%22channel_key%22:%22arstechnica%22}&pagesize=20&endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.145.106 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-145-106.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
9f14529883aabaf69fd5def8146c294dfb581116e30c30348c437a10d2c1b8e3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:33 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
665
X-XSS-Protection
1; mode=block
X-Request-Id
cb642c7f-4516-42b4-a8fb-15f20a511d15
X-Runtime
0.001896
X-Backend-Node
10.110.126.151
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"614ee2f7c0e5ca535659eb97221b8940"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
p.js
d1z2jf7jlzjs58.cloudfront.net/
6 KB
3 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/p.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.33 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-33.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
725913eab3460e2955a8ac4ec176f902c7d8d2db60757248b735cbf8698b0749

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 01:43:42 GMT
Content-Encoding
gzip
Age
39831
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Fri, 07 Mar 2014 00:45:07 GMT
Server
nginx
ETag
W/"53191693-19c1"
Content-Type
application/x-javascript
Via
1.1 34f50889bc574f1edeb41dd758962a5b.cloudfront.net (CloudFront)
Cache-Control
max-age=86400, public
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
TT7A-8gyvubzmuvCubW3we7C1mxMZyOq_CHSnsbnfGe3NfLRDBF83g==
Expires
Sun, 12 Jan 2020 01:42:44 GMT
conde-nast
segment-data.zqtk.net/
723 B
553 B
Script
General
Full URL
https://segment-data.zqtk.net/conde-nast?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.76.0.5 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-76-0-5.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
a5be8ebd90e40e03e163a2634948f4a516d68a1bc45215ad5cdc69b3070bafa7

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:33 GMT
Content-Encoding
gzip
Last-Modified
Sun, 12 Jan 2020 12:09:28 GMT
Server
nginx/1.10.3 (Ubuntu)
Content-Type
application/javascript; charset=UTF-8
Connection
keep-alive
Content-Length
258
Expires
Tue, 14 Jan 2020 12:09:28 GMT
ixmatch.html
js-sec.indexww.com/um/ Frame 6E55
0
0
Document
General
Full URL
https://js-sec.indexww.com/um/ixmatch.html
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
js-sec.indexww.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

Server
Apache
Last-Modified
Mon, 19 Jun 2017 19:18:19 GMT
ETag
"74087b-112-55254ff6699bb"
Accept-Ranges
bytes
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Type
text/html; charset=UTF-8
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
211
Date
Sun, 12 Jan 2020 12:47:33 GMT
Connection
keep-alive
ars-technica.config.js
pixel.condenastdigital.com/config/v2/production/
6 KB
2 KB
Script
General
Full URL
https://pixel.condenastdigital.com/config/v2/production/ars-technica.config.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
204f96cd7ddbfc6bf5f972fd350079187faee869527ec70cbc842599bf4f3a3b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:33 GMT
Content-Encoding
gzip
Age
252314
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
1, 114
Connection
keep-alive
Content-Length
1079
x-amz-id-2
qZJZXXPo6Z8HjhsGOcb+0s1SKL7XjxXTGtdgGJ5G15UFQwTNaoOhNidetgjS7SDXxlyWbnPE1Ho=
X-Served-By
cache-iad2140-IAD, cache-hhn4039-HHN
Last-Modified
Thu, 02 Jan 2020 14:42:07 GMT
Server
AmazonS3
X-Timer
S1578833253.459832,VS0,VE0
ETag
"4250c65ee742e1b4f32323df8a749ae7"
Vary
Accept-Encoding
x-amz-request-id
1992D9C740724C71
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Thu, 02 Jan 2020 20:42:19 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DYCWQ55TVE6RE44M6FJ4E385&persistence=1&checksum=9b70e89d6ea680db0108d60616128841374c7ca073a3f60f02d4e90d2d9279f9
0
-1 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DYCWQ55TVE6RE44M6FJ4E385&persistence=1&checksum=9b70e89d6ea680db0108d60616128841374c7ca073a3f60f02d4e90d2d9279f9
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
via
1.1 google
server
openresty/1.11.2.5
access-control-allow-origin
https://arstechnica.com
location
//r.skimresources.com/api/?xguid=01DYCWQ55TVE6RE44M6FJ4E385&persistence=1&checksum=9b70e89d6ea680db0108d60616128841374c7ca073a3f60f02d4e90d2d9279f9
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
status
307
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193

Redirect headers

date
Sun, 12 Jan 2020 12:47:33 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DYCWQ55TVE6RE44M6FJ4E385&persistence=1&checksum=9b70e89d6ea680db0108d60616128841374c7ca073a3f60f02d4e90d2d9279f9
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
robots.txt
t.skimresources.com/api/v2/ Frame DB52
0
105 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.8438380430270684
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
206
date
Sun, 12 Jan 2020 12:47:33 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
text/plain charset=UTF-8
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=6.819273707476648
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
status
200
x-guploader-uploadid
AEnB2UpPDE5i6v3ggas7TTA0pVWanbUjUGt76QVRXUF2--ifNAFT8khLz924QsaiRebx4ILQfqTOg69Y9Ns0MeubdKekQneUeg
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1578833253.cds003.wa1.hc,1578833253.cds005.wa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
470 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=6.819273707476648
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
status
200
x-guploader-uploadid
AEnB2UpPDE5i6v3ggas7TTA0pVWanbUjUGt76QVRXUF2--ifNAFT8khLz924QsaiRebx4ILQfqTOg69Y9Ns0MeubdKekQneUeg
x-goog-storage-class
MULTI_REGIONAL
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
x-hw
1578833253.cds003.wa1.hc,1578833253.cds005.wa1.c
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
plugin.js
plugin.mediavoice.com/
337 KB
125 KB
Script
General
Full URL
https://plugin.mediavoice.com/plugin.js
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:da83 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
4eff2c28c2fb7c3172b7230c3ff98343a52bff5863901a2f2bb6f3f082455055

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
cf-cache-status
HIT
age
34587
cf-ray
553f3d5a4cafd70d-FRA
status
200
content-length
127618
via
1.1 varnish
x-varnish
1984741600 1984740798
last-modified
Fri, 20 Dec 2019 15:04:21 GMT
server
cloudflare
etag
W/"5dfce2f5-544bb"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
GET, OPTIONS
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=43200
access-control-allow-credentials
true
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
expires
Sun, 12 Jan 2020 15:07:24 GMT
condenastcorporate
polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/
181 B
595 B
XHR
General
Full URL
https://polarcdn-terrax.com/nativeads/v1.4.0/json/hostname/arstechnica.com/organization/condenastcorporate
Requested by
Host: cdn.mediavoice.com
URL: https://cdn.mediavoice.com/nativeads/script/condenastcorporate/conde-asa-polar-master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bd131d59efb6aa6a2d98ce4af498a811c84f74148129e140ff5a76904ca9f74

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

timing-allow-origin
*
date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
server
cloudflare
status
200
etag
W/"4ed41fc03a3c3b67ac78af86ee19d7f1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/json; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-Country, CF-Ray
cache-control
max-age=3600
x-country
DE
cf-ray
553f3d5a68dcdfc3-FRA
publishertag.js
static.criteo.net/js/ld/
93 KB
28 KB
Script
General
Full URL
https://static.criteo.net/js/ld/publishertag.js
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.2.130 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
nginx /
Resource Hash
fbc41d3e67802d67bafea737f75aba27b07eae707b51c5b78a89605fc2786ae9

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
last-modified
Fri, 20 Dec 2019 17:19:26 GMT
server
nginx
access-control-allow-origin
*
etag
W/"5dfd029e-17429"
content-type
text/javascript
status
200
cache-control
max-age=86400, public
timing-allow-origin
*
expires
Mon, 13 Jan 2020 12:47:33 GMT
idsv2
mid.rkdms.com/
0
0
XHR
General
Full URL
https://mid.rkdms.com/idsv2?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=CONDENAST
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.55 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-55.fra50.r.cloudfront.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

rid
match.adsrvr.org/track/
109 B
536 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183973
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.203.64 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-203-64.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
b17766b10eb1e731b435712d498a76b1f3802a1ce7ccc9541f327370019d0955

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Tue, 11 Feb 2020 12:47:33 GMT
/
prod-native.actionbutton.co/ Frame 26F3
0
0
Document
General
Full URL
https://prod-native.actionbutton.co/?isNativeEmbed=true&a9c17158-030f-4952-b6af-1434342af89d
Requested by
Host: embed.actionbutton.co
URL: https://embed.actionbutton.co/widget/widget.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:9200:11:8cf6:b500:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash

Request headers

:method
GET
:authority
prod-native.actionbutton.co
:scheme
https
:path
/?isNativeEmbed=true&a9c17158-030f-4952-b6af-1434342af89d
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

status
200
content-type
text/html
date
Fri, 10 Jan 2020 15:29:34 GMT
last-modified
Fri, 10 Jan 2020 15:29:17 GMT
cache-control
max-age=31536000,public
server
AmazonS3
content-encoding
gzip
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 6b8ac2d6d64dc42007741d312e2d73ab.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA50-C1
x-amz-cf-id
wfxYEo8ITg7YcZ2_8wXZTSlVBfVr708e-Atg9A9u6MQ0rky344msuw==
age
163080
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&app=playerservice&cCh=videos%2Fshow&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pID=&sID=&uId=&xid=&_ts=2020-01-12T12%3A47%3A33.554Z&_c=error&_t=Interlude%20Insertion%20Error&dim1=%7B%22interludeFailure%22%3A%22unsupported%20template%22%2C%22pageTemplate%22%3A%22article%7Creport%22%2C%22url%22%3A%22information-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=Availability%3A%20unsupported%20template
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:33 GMT
Connection
keep-alive
transfer-encoding
chunked
Content-Type
image/gif
yi.js
mb.moatads.com/
2 KB
2 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&callback=MoatNadoAllJsonpRequest_2684051
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/condenastprebidheader987326845656/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.10.124.206 London, United Kingdom, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-10-124-206.eu-west-2.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
7baef6a5f9b73f5605e0215d5137298fe205afd9e7a8fe4189f643269856fd04

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
server
TornadoServer/4.5.3
etag
"847057c77b7b502b6a8c28686b5fce6c9fbfaf0c"
content-type
text/html; charset=UTF-8
status
200
cache-control
max-age=900
timing-allow-origin
*
content-length
1577
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1578833253558&de=17136225344&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&na=1835534715&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:33 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:33 GMT
analytics.js
www.google-analytics.com/
43 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
838
date
Sun, 12 Jan 2020 12:33:35 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Sun, 12 Jan 2020 14:33:35 GMT
otSDKStub.js
cdn.cookielaw.org/scripttemplates/
8 KB
3 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-NLXNPCQ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FE8) /
Resource Hash
c2bdfd6b334593875cb7e009a4ae681f003edf8118a0ae5bb7568216ece5d1d2

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
content-md5
kqDQnbDVJYMXPp1pIncMkg==
x-cache
HIT
status
200
content-length
2682
x-ms-lease-status
unlocked
last-modified
Mon, 30 Dec 2019 16:01:08 GMT
server
ECAcc (frc/8FE8)
etag
0x8D78D417B96453F
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
cc14ac43-801e-012e-5844-c91e74000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:47:33 GMT
ads
securepubads.g.doubleclick.net/gampad/
418 B
702 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=313297302630897&correlator=959187204198244&output=ldjh&impl=fifs&adsid=NT&eid=21065354%2C21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars%2Cinterstitial%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=1x1&ists=1&prev_scp=pos%3Dinterstitial%26ctx_slot_type%3Dout_of_page%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dout_of_page_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1578833253&dt=1578833253766&dlt=1578833253134&idt=543&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=0&adks=2746652139&ucis=1&ifi=1&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=35&icsg=137482993664&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x1&msz=1585x1&ga_vid=1006128056.1578833254&ga_sid=1578833254&ga_hid=471057445&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
d941cdd850e70a4e2cea14fc6c712455aa30d1d0bdd343255ef1beeddcc5aee9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
210
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2019121002.js
securepubads.g.doubleclick.net/gpt/
64 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
sffe /
Resource Hash
4c52ed8f9039265ffed7fdca0b967b2624325e6356433f437e044b0dd332cddf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 10 Dec 2019 17:29:18 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24811
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:33 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/
419 B
367 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=313297302630897&correlator=959187204198244&output=ldjh&impl=fifs&adsid=NT&eid=21065354%2C21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars.native%2Clegacy%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=2x2&prev_scp=pos%3Dlegacy%26ctx_slot_type%3Dnative_xrail%26ctx_slot_rn%3D0%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dnative_xrail_0&eri=1&cust_params=amznbid%3D0%26amznp%3D0%26m_data%3Dwaiting%26m_safety%3Dwaiting%26m_categories%3Dwaiting%26m_mv%3Dwaiting%26m_gv%3Dwaiting%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D&cookie_enabled=1&bc=31&abxe=1&lmt=1578833253&dt=1578833253780&dlt=1578833253134&idt=543&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=786&adks=2072965525&ucis=2&ifi=2&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=36&icsg=563087436414976&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x0&msz=300x2&ga_vid=1006128056.1578833254&ga_sid=1578833254&ga_hid=471057445&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
67e88095554ce31ca1a7b6a0ebc58541f11bd761cb910187cb13fb97760e9dda
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
206
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
/
r.skimresources.com/api/
152 B
459 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DYCWQ55TVE6RE44M6FJ4E385&persistence=1&checksum=9b70e89d6ea680db0108d60616128841374c7ca073a3f60f02d4e90d2d9279f9
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
e3f404172ea7e48c78f0a535f9096323cac80605c7b7cc94642a0189e46f8140
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

date
Sun, 12 Jan 2020 12:47:33 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
sparrow.min.js
pixel.condenastdigital.com/
38 KB
14 KB
Script
General
Full URL
https://pixel.condenastdigital.com/sparrow.min.js
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.239 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1dc3900687fb65b292f1e210c5fe7a931938516ab318c529e5a97433462cb7bc

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:33 GMT
Content-Encoding
gzip
Age
312016
Via
1.1 varnish, 1.1 varnish
X-Cache
HIT, HIT
X-Cache-Hits
1, 14445
Connection
keep-alive
Content-Length
13257
x-amz-id-2
vf6gNMpMA++XXQzC6rvTwyrkJUmwCILPrImZKtomr84UhzC/j5ZMFJICYyuXSwNJn5xnGsq13FM=
X-Served-By
cache-iad2142-IAD, cache-hhn4039-HHN
Last-Modified
Wed, 20 Nov 2019 22:07:21 GMT
Server
AmazonS3
X-Timer
S1578833254.860848,VS0,VE0
ETag
"dc39378d5b3f7ed533d42c4765bc2eae"
Vary
Accept-Encoding
x-amz-request-id
26C5BF0665EAC459
Access-Control-Allow-Origin
*
Cache-Control
no-cache, public, max-age=604800
Accept-Ranges
bytes
Content-Type
application/javascript
Expires
Thu, 21 Nov 2019 04:07:20 GMT
arstechnica.com
srv-2020-01-12-12.config.parsely.com/config/
419 B
837 B
Script
General
Full URL
https://srv-2020-01-12-12.config.parsely.com/config/arstechnica.com
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.6.38.26 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-6-38-26.compute-1.amazonaws.com
Software
/ Express
Resource Hash
6204f4bc2cba8a356213f05f968d0954c8bb1b4278c565f9222b24fbb96a0ce5

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:34 GMT
Cache-Control
private, no-cache
Connection
keep-alive
X-Powered-By
Express
ETag
W/"1a3-x/vnBBETn3Q3TVi48qziMw"
Content-Length
419
Content-Type
text/javascript; charset=utf-8
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&t=1578833253558&de=17136225344&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&na=2043016114&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:33 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:33 GMT
5b27ee7e8c1abc4e7900000f
api.cnevids.com/v1/video_groups/
54 KB
10 KB
XHR
General
Full URL
https://api.cnevids.com/v1/video_groups/5b27ee7e8c1abc4e7900000f?endpoint=oo.arstechnica
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.173.145.106 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-173-145-106.compute-1.amazonaws.com
Software
nginx/1.14.1 /
Resource Hash
a386009b7010441f046b87ba766f8bde37ecf242d35bab76de81e8242573aaa9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/*
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:34 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
9302
X-XSS-Protection
1; mode=block
X-Request-Id
2f5dc716-ccd0-4371-bd78-2eda2e8a2086
X-Runtime
0.002988
X-Backend-Node
10.110.10.11
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
X-Frame-Options
SAMEORIGIN
ETag
W/"27af7f29c55ad8e1b81b495909139e14"
X-Download-Options
noopen
Vary
Accept-Encoding, Origin
Access-Control-Allow-Methods
GET, PUT, POST, DELETE, OPTIONS
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
/
polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/ Frame 6FB1
0
0
Document
General
Full URL
https://polarcdn-terrax.com/privacy/v1.0.0/html/optout/readwrite/
Requested by
Host: plugin.mediavoice.com
URL: https://plugin.mediavoice.com/plugin.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:4132 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

:method
GET
:authority
polarcdn-terrax.com
:scheme
https
:path
/privacy/v1.0.0/html/optout/readwrite/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

status
200
date
Sun, 12 Jan 2020 12:47:34 GMT
content-type
text/html; charset=utf-8
content-length
1242
set-cookie
__cfduid=d6e482fb93b63d726172425b5ff7638121578833254; expires=Tue, 11-Feb-20 12:47:34 GMT; path=/; domain=.polarcdn-terrax.com; HttpOnly; SameSite=Lax
vary
Accept-Encoding
access-control-allow-headers
Authorization
access-control-expose-headers
CF-IPCountry, X-Country, CF-Ray
cache-control
max-age=900
access-control-allow-origin
*
access-control-allow-methods
GET
timing-allow-origin
*
content-encoding
gzip
x-varnish
1717062078 1717056743
age
822
via
1.1 varnish
cf-cache-status
HIT
accept-ranges
bytes
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
553f3d5ddb01dfa9-FRA
b10882a1-8446-4e7d-bfb2-ce2c770ad910.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/
2 MB
48 KB
XHR
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/b10882a1-8446-4e7d-bfb2-ce2c770ad910.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FF8) /
Resource Hash
8504fb66992116b9e26f363f95e8d8336551065aab62eedaa737f567b0dd0fef

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:47:34 GMT
content-encoding
gzip
content-md5
wExhIhzCvAQwo9SPeiwzKA==
x-cache
HIT
status
200
content-length
48791
x-ms-lease-status
unlocked
last-modified
Thu, 09 Jan 2020 19:29:33 GMT
server
ECAcc (frc/8FF8)
etag
0x8D7953A41B6E7F1
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
1a59f38b-201e-00eb-2b33-c9261a000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:47:34 GMT
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
1013 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:05:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
2503
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Sun, 12 Jan 2020 13:05:51 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
528 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 12 Jan 2020 12:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
YXJzdGVjaG5pY2EuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/YXJzdGVjaG5pY2EuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833253334
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=29311
Date
Sun, 12 Jan 2020 12:47:41 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Sun, 12 Jan 2020 20:56:12 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
636 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1578833254092
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
page
t.skimresources.com/api/v2/
22 B
383 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/100098X1555750.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:49 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=44&t=1578833253558&de=17136225344&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=322&zMoatAllDataLoadTime=322&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=322&na=936921169&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:34 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:34 GMT
5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady92926620
player.cnevids.com/script/video/
63 KB
21 KB
Script
General
Full URL
https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady92926620
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/wp-content/themes/ars/assets/js/main-21927b84b8.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.13 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-13.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
543503d624bea2b1bf99cebc7728bf03a5a0d820f9db140a3dab3044c1f77632
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:34 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA50-C1
X-Cache
Miss from cloudfront
Status
200 OK
Connection
keep-alive
Content-Length
20742
X-XSS-Protection
1; mode=block
X-Request-Id
1817a047-1b04-4dbc-8582-5747912a9db1
X-Runtime
0.007190
X-Backend-Node
10.110.72.103
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"a723b17a63caa92eb5a79199551f7fff"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Content-Type
text/javascript; charset=utf-8
Via
1.1 ba77f90aac0ddbc2c4c2c02062fac762.cloudfront.net (CloudFront)
Cache-Control
max-age=0, private, must-revalidate
X-Amz-Cf-Id
6qO2rrelt0kn0gjGDFwhr5mueR5jtDA-q59ea1XupQMWvEfGvKB10Q==
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575930137/
17 KB
18 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
5c57a0f6d257ca6be9e6bcb6039fea214962c35b7b30fee3dcc112b8cec18d59

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:43:09 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
265
Edge-Cache-Tag
380278988686077832122293282495365645705,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
17267
X-Served-By
cache-fra19157-FRA
Last-Modified
Thu, 12 Dec 2019 14:30:32 GMT
Server
cloudinary
X-Timer
S1576161035.250963,VS0,VE102
ETag
"7cfa0c5590f779efc925bf7aee626a20"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
ktC09d6-E5EGxMzcoCMTa1z0AjilweVNtuieAhB6nlgFQuwdWXZRlw==
X-Cache-Hits
0
arstechnica_war-stories-war-stories-oddworld.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575385501/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1575385501/arstechnica_war-stories-war-stories-oddworld.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
e67634eb3e8ded1b35d409539a3dde4f53ae0a7b332c9713803e216996b70f25

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:46:53 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
41
Edge-Cache-Tag
516766467372198984987912344758962687175,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12630
X-Served-By
cache-hhn4070-HHN
Last-Modified
Tue, 03 Dec 2019 16:18:09 GMT
Server
cloudinary
X-Timer
S1575389916.400537,VS0,VE111
ETag
"7f0c64819a53ef4732059f6fc6df5c8a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
2JWiuxv28GC509AZTiv628lK9j3hsks4T1elDgM132KOdSlXbdiJUw==
X-Cache-Hits
0
arstechnica_game-judges-you-nintendo-s-corey-olcsvary-reviews-your-mario-maker-2-levels.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1574177299/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1574177299/arstechnica_game-judges-you-nintendo-s-corey-olcsvary-reviews-your-mario-maker-2-levels.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
09598ddbbeaf9f31b2ff6f67ffccb4711d144a3795b792be68a3a176ee6c9ebe

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 19 Nov 2019 20:11:51 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
2046911
Edge-Cache-Tag
601200027999543495375406924058855020374,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
12324
X-Request-Id
3ca40085f6e5d3edafc3958c405ea3f5
X-Served-By
cache-hhn4080-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 19 Nov 2019 20:11:45 GMT
Server
cloudinary
X-Timer
S1574194311.928279,VS0,VE165
ETag
"9034961dde2383da30356914e81e7950"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
Gyj7Gv1wpzRsNNdX4lyjf5j57obBYw2OXi59pAeBcK1cWyf2iXj5QA==
X-Cache-Hits
0
arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/
11 KB
12 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1573140819/arstechnica_unsolved-mysteries-bioware-answers-unsolved-mysteries-of-the-mass-effect-universe.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
Cloudinary /
Resource Hash
de24551bd4396fc8579b2d87ce01944553dd48fb52775d14373725a50efa0c37
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=604800
Via
1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
41
X-Cache
Hit from cloudfront
Date
Sun, 12 Jan 2020 12:46:53 GMT
Server-Timing
cloudinary;dur=112;start=2019-11-08T14:35:45.689Z,cld-id;desc=555a3491395f2119db357e871f2eced0,fastly;dur=0;total=205;start=2019-11-08T14:35:45.643Z;desc=MISS,rtt;dur=0
Content-Length
11417
X-Request-Id
555a3491395f2119db357e871f2eced0
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 08 Nov 2019 14:35:23 GMT
Server
Cloudinary
Cache-Control
public, max-age=300
ETag
"3e8509d06c6610d54babcac0d91e5d93"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Content-Length,Server-Timing
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
RazgvwWltTAGw8K2-YF6Qgk3cjfik-ADjlR8N8AHAGzzf7nrB9Bt9g==
arstechnica_war-stories-civilization.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1569003425/arstechnica_war-stories-civilization.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
1c7dcc8216c6f82da2998ceeac2523632c7f9bffe510824b6d082621201f2012

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:35:31 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
1691044
Edge-Cache-Tag
390602458176548494884398897259766670181,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16236
X-Request-Id
67d8bf4a783fe0fa98b0a9234b5a0ef1
X-Served-By
cache-fra19129-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 23 Sep 2019 11:27:54 GMT
Server
cloudinary
X-Timer
S1571682932.852315,VS0,VE1
ETag
"72002610618f7bf8bf0e52c760e39897"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
UH7WWoZJEqkJitdb1eBdi6i0Twd1JJTFaKfVdMBZZbp52I6P87GyOQ==
X-Cache-Hits
1
arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/
11 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1568662260/arstechnica_sitrep-dod-resets-ballistic-missile-interceptor-program.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7fc88c65d46e83b3f3e9f098f05fd639480332fc3718cd714725e2e4633af4e8

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 22:53:41 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
1682194
Edge-Cache-Tag
285695674967648002297586464606017083075,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
10793
X-Served-By
cache-hhn4061-HHN
Last-Modified
Tue, 17 Sep 2019 19:55:15 GMT
Server
cloudinary
X-Timer
S1571698422.888227,VS0,VE1
ETag
"0e1ff58ccf6d97759de3d774a7ff835a"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
lh_ZrrvugBx50qVGGvwFs3HwovkiqvidBJkTxd-hM4YHAKUAIcndrw==
X-Cache-Hits
1
arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1563202921/arstechnica_dead-cells-how-to-avoid-falling-to-your-death-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
5f760e6eaa1fd8e199a7135ae74692369612ff5de37b99eb63bcb8ee7d615568

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:46:53 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
41
Edge-Cache-Tag
512786565011436188602690990842551442357,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
16016
X-Request-Id
558da5101eeb1f1f
X-Served-By
cache-fra19150-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 19 Jul 2019 15:13:07 GMT
Server
cloudinary
X-Timer
S1563549194.385414,VS0,VE180
ETag
"4dba8e36b73a44cca8375175ae0e4b39"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
2Mia58IiztlxtTNty9PXyWltXZ2jdyHK61s2-4J8YaYfRo5ODNROww==
X-Cache-Hits
0
arstechnica_warframe-reviews.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1561556730/arstechnica_warframe-reviews.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
83a366075eb2387c6d9f848f42b08df0546027333eccf5813edf95ba45709be2

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 17 Sep 2019 00:57:16 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
409825722100045817936218917770258862228,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
14837
X-Request-Id
7761dd54fcd41be5
X-Served-By
cache-fra19174-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 27 Jun 2019 19:34:59 GMT
Server
cloudinary
X-Timer
S1568681836.778525,VS0,VE359
ETag
"1d90d6aef7585f963e1270a1a02a4dd4"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
7DCciRp1j0ZZNDsdHJyNp2gBWlB68WbGIUcjwJwdBrXDMCuUiF5zjg==
X-Cache-Hits
0
arstechnica_war-stories-subnautica.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559747425/arstechnica_war-stories-subnautica.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
20660a9ef7ec454c15b2dc62b3db084e0cc9f74c5bb6de71a96fb1a54aef00f8

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:46:53 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
41
Edge-Cache-Tag
384957005148579205807938476483146982592,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15222
X-Request-Id
f2d0c8a8b6cacafb
X-Served-By
cache-hhn4031-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 05 Jun 2019 17:40:02 GMT
Server
cloudinary
X-Timer
S1569954679.282219,VS0,VE1
ETag
"8c45b6c645caba59f4b14d3fbdc09062"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
9NCeU-8jDPI2X0pKULmv26JEcTMbmFvZPi85Z43twVO6CkZT1DD_Ng==
X-Cache-Hits
1
arstechnica_this-war-of-mine-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/
16 KB
17 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1559075831/arstechnica_this-war-of-mine-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
ec84902ae04cc118d965c577e2ece816abd594431ce66bcef1afd4f745e951fd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sat, 28 Sep 2019 00:51:21 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
580474366038461196493179311799260666459,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15985
X-Request-Id
662e5d211da189e0
X-Served-By
cache-fra19124-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 03 Jun 2019 18:11:08 GMT
Server
cloudinary
X-Timer
S1569631881.177610,VS0,VE1
ETag
"42bc7816573b81a73647b6f7123944c5"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
r4xkxi3RJkZDdWhS14AKF0QEIXf8Jxe4xgiIgH2PnlZgljk2DZfL-g==
X-Cache-Hits
1
arstechnica_obra-dinn-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1558373184/arstechnica_obra-dinn-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8574074952616e0a56e5b72d9634bff0a683d658d09804c10324293811606d22

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:46:53 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
41
Edge-Cache-Tag
433557846635605494688582207268998106147,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15609
X-Request-Id
2082b9f1905380c2
X-Served-By
cache-hhn4039-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 28 May 2019 17:36:10 GMT
Server
cloudinary
X-Timer
S1569956628.114128,VS0,VE1
ETag
"8becb0d5f4f7ff3e76e89c89871f465d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
RFQ1zQ4j7Apw_E9iQhSPh21H_iIZIYZsH8BdxgGBq3jqYPeTQsmAHA==
X-Cache-Hits
1
arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/
8 KB
9 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556912500/arstechnica_army-s-new-pistol-has-had-some-misfires.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
a91d62b47f02a7e638d1749e3791ac328b2dd89dac630578f76e65b1ed91ed89

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 01 Oct 2019 18:31:30 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
575077299308468417590234438077035908298,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
7863
X-Request-Id
fb1a99c2fef8f977
X-Served-By
cache-hhn4081-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Mon, 13 May 2019 19:11:27 GMT
Server
cloudinary
X-Timer
S1569954690.350307,VS0,VE549
ETag
"31902de995c98904a55c605571f06530"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
FW4NQKU3HmQUNhSjJDce1u0vJ8hc1bhYcGvwjPtK7pEDenne41LYCA==
X-Cache-Hits
0
arstechnica_war-stories-slay-the-spire-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1556741487/arstechnica_war-stories-slay-the-spire-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
f9d9e96c4439beeca49a1a10f9dffe6f5cd0b604d13aa13af170d0bc62d8ca1b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:46:53 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
41
Edge-Cache-Tag
515397136805965062020045600075132664421,404749671192515790889513374839386840902,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15634
X-Request-Id
006a2f92f979dc2f
X-Served-By
cache-fra19120-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 02 May 2019 18:45:52 GMT
Server
cloudinary
X-Timer
S1568941492.532075,VS0,VE1
ETag
"abee90e53f29ba0127fca9442ab50902"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
nJ-2VUHCsIuUT-IYNdMRWuRnKtzpgi-ak9lxmtUuFg6JTDFJyEqIGA==
X-Cache-Hits
1
arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/
15 KB
16 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1555359865/arstechnica_war-stories-amnesia-the-dark-descent-the-horror-facade.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
1defb6bc54a7ee9c066136908360e8455c23ee9ad0dec9924e7255d7948cd4be

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Mon, 07 Oct 2019 00:15:38 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
587193118310891607619753694455047488726,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
15251
X-Request-Id
ef7e1facec7e168529f375bd4cbea7d4
X-Served-By
cache-fra19148-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 16 Apr 2019 18:59:19 GMT
Server
cloudinary
X-Timer
S1570407339.895634,VS0,VE1
ETag
"3e7cdc13e718680bf5e1efa64468b560"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
iqSibejiESS3l6oESSnG_exsEk51yBdfS9-t6BXrY5ygBLZPJKOTIA==
X-Cache-Hits
1
arstechnica_war-stories-c-and-c-tiberian-sun.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/
19 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1551193450/arstechnica_war-stories-c-and-c-tiberian-sun.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
27348ba4b98bd80f1038496ec5dea6ad865680540058fb085b8ca199b8aaf4c5

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:46:53 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
41
Edge-Cache-Tag
313687566273846460968749706722669918033,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
19022
X-Request-Id
2ea01f6ded9de79f77140806bd40dd67
X-Served-By
cache-hhn4061-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Wed, 27 Feb 2019 16:48:24 GMT
Server
cloudinary
X-Timer
S1571698422.931717,VS0,VE1
ETag
"fe52b9acd391d8bee8de15a0f429b377"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
CB1EpRV67WaKTDVOr1dfNatiAi6Lc7PoGNKsARtsx4iGRTEqQA8RIA==
X-Cache-Hits
1
arstechnica_army-s-next-vertical-lift-en-route.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/
5 KB
6 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550680609/arstechnica_army-s-next-vertical-lift-en-route.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4868ca91bcd0d492c501ec5b8d44ac78d3e1226977ae14ff598f5efe78751951

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:34 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
312535560964408758261298476626669868625,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
4867
X-Request-Id
fe742dfb60d64f44
X-Served-By
cache-fra19174-FRA
X-Cloud-Name
heru80fdn
Last-Modified
Thu, 21 Feb 2019 15:50:43 GMT
Server
cloudinary
X-Timer
S1569955629.612993,VS0,VE1
ETag
"90ad4d692f7209c01596b99729f26e7b"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
spxaFvHOOK5MmWP2D87nEE_MuslstpkjwbFNsB_9DFb7ZCIL3nUhdA==
X-Cache-Hits
1
arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/
18 KB
19 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1550244434/arstechnica_war-stories-blade-runner-skinjobs-voxels-and-future-noir.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
8b72952d3fd656ee6594f0d9735d928113ad1d590705b14f77abf75f1d4d5d69

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:46:53 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
41
Edge-Cache-Tag
292757494989914907279105994976263969890,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
18172
X-Request-Id
65d0ec09d8dc10d7
X-Served-By
cache-hhn4033-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 15 Feb 2019 15:34:33 GMT
Server
cloudinary
X-Timer
S1569864932.493447,VS0,VE1
ETag
"32f1b8954559c8d598e9861f5b8360b9"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
bYrDkwUUKODw6EHrm3NYoPTnYCTsRXen_USWPNLBAR-I0Vs0aREbDw==
X-Cache-Hits
1
arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1546889545/arstechnica_war-stories-dead-space-the-drag-tentacle.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
9933997608e86beaf1e7f7188a5c657cdad8ccd9d20eb7b1a46adaa83fa850ab

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 29 Sep 2019 19:46:47 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
1691401
Edge-Cache-Tag
561334743792169660751574031162860899763,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7393
X-Served-By
cache-hhn4021-HHN
Last-Modified
Tue, 08 Jan 2019 16:38:58 GMT
Server
cloudinary
X-Timer
S1569786407.023297,VS0,VE1
ETag
"17a6e4b5eb75eb12f5d8c89eb3d0ace8"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
SDawtdXGzdT6nRQzdXlvKL0ucIhqQwg_TWTlLx3B1oQENIWlxGijZA==
X-Cache-Hits
1
arstechnica_teach-the-controversy-flat-earthers.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/
10 KB
11 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1541592304/arstechnica_teach-the-controversy-flat-earthers.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
7364fcbb6c5d775f07816712af8a6419db99268f72c337a4977f706dc3423bb3

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:34 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
522150850958368321191235208678465217967,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
10595
X-Request-Id
7471ab14ec339916
X-Served-By
cache-hhn4072-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 09 Nov 2018 14:44:53 GMT
Server
cloudinary
X-Timer
S1568682417.187590,VS0,VE1
ETag
"6c0c4f8a9d61ed2b5863a8058c624a37"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
b-D8dyCcaH7vzMLrcMYMc1oeKextq-XlJxvZN9DHrTBsVc9mh1Ko5Q==
X-Cache-Hits
1
arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/
12 KB
13 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1537406983/arstechnica_delta-v-the-burgeoning-world-of-small-rockets-paul-allen-s-huge-plane-and-spacex-get-s-a-crucial-green-light.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
16f86804dd013db340fee4020a539d3e9d6e5a03d6841e431e50c428e99c26e8

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:34 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
389498626973997838808844380914497340413,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
12509
X-Request-Id
0bd74a520f3fd4442d0e3864480036d7
X-Served-By
cache-hhn4047-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 21 Sep 2018 16:51:30 GMT
Server
cloudinary
X-Timer
S1571148352.234298,VS0,VE1
ETag
"b9c502ffc902b60d0eb13698b37a945d"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
R_Ot4Hqua7E5ld6czw7B7LcWwTKFvkirj42V0Ir7_702WrAARRzv7g==
X-Cache-Hits
1
arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/
7 KB
8 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1522031130/arstechnica_chris-hadfield-explains-his-space-oddity-video.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
3ce7e824185893264ab44fbf8370a8f1262831c4c6c367b15f7d4f1e88fadc8c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Mon, 21 Oct 2019 18:06:57 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
1691846
Edge-Cache-Tag
294316597633303263276952824544497226127,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
7181
X-Served-By
cache-hhn4030-HHN
Last-Modified
Fri, 06 Jul 2018 12:23:22 GMT
Server
cloudinary
X-Timer
S1571681217.166304,VS0,VE1
ETag
"0549828edcecd339d8d10ebe6119de70"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
cryi4TCYqXuqVC6bDEfzFj0vMdoMK42lo7QyvS6vpNehwDhG1_aQZQ==
X-Cache-Hits
1
arstechnica_apollo-mission-episode-1.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/
14 KB
15 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1512424612/arstechnica_apollo-mission-episode-1.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
82cd1a97f81e5b63a621311be2993916eea0907b5eadd53bb6b280f4bb0f8391

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Fri, 18 Oct 2019 23:25:29 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
424632948265147424317824738369264083785,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
RefreshHit from cloudfront
Connection
keep-alive
Content-Length
14040
X-Request-Id
2ff68b9eab7ff221
X-Served-By
cache-hhn4068-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Tue, 05 Dec 2017 01:52:25 GMT
Server
cloudinary
X-Timer
S1571441129.284408,VS0,VE1
ETag
"ecc047c6eed3dc571a78eab647201220"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
kQqBBf8ouQmdQQBmESy03bivdL5jC066BGjz6ac2SojxrenbbxjIEg==
X-Cache-Hits
1
arstechnica_richard-garriot-war-stories.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/
14 KB
14 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_thescene.jpg,fl_progressive,g_center,h_169,q_80,w_300/v1513807048/arstechnica_richard-garriot-war-stories.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
4980853759711c8e9e2779239acd62e9e802fba38371763c65ecdd016a83fdbd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 03 Oct 2019 00:13:56 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
Edge-Cache-Tag
489732375708630852448407029403767769375,605383893367339607624947511135489672318,bd072c9835b885d44d7447102f8695ad
Status
200 OK
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
13885
X-Request-Id
0d55c092aa2005ad
X-Served-By
cache-hhn4044-HHN
X-Cloud-Name
heru80fdn
Last-Modified
Fri, 06 Jul 2018 19:56:42 GMT
Server
cloudinary
X-Timer
S1570061636.448358,VS0,VE1
ETag
"13d45a1733ad4d2f3ae707584d6a8a32"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2592000
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
bNn077ZdJyR1nOhJt26aeGAQS6-FTvdzuSse9LHFFtaRWG1VfYeCIw==
X-Cache-Hits
1
truncated
/
408 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c21029f21dc145723d40362da85504ee5a5bd33f5db6636beae3a01c7aba1fa2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml;charset=utf-8
bid
c.amazon-adsystem.com/e/dtb/
23 B
369 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pid=3Ty9flleI45Q5&cb=0&ws=1600x1200&v=7.45.00&t=1000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22300x250%22%2C%22300x600%22%5D%2C%22sn%22%3A%22rail%2Fdesktop%22%7D%2C%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22728x90%22%2C%22970x250%22%5D%2C%22sn%22%3A%22hero%2Fdesktop%22%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%7D&cfgv=0&gdprl=%7B%22status%22%3A%22cmp-timeout%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.242 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-242.fra50.r.cloudfront.net
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:34 GMT
via
1.1 a09186728c1bcdf0a561aedd92656804.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA50-C1
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
VPOxxm5roIiN0dREc67Dpm9ngR9tTNrEeeo2awUajovDwbWAiRJBFg==
publisher:getClientId
ampcid.google.de/v1/
3 B
457 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain

Response headers

date
Sun, 12 Jan 2020 12:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
/
infinityid.condenastdigital.com/
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/?rand=1578833254199
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.4.170.229 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-170-229.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
c68bf9b95d7826cd26f541ca4b9458f4245f8f326da06ae177ea835a022a9c07

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
transfer-encoding
chunked
content
4d.condenastdigital.com/
4 KB
2 KB
XHR
General
Full URL
https://4d.condenastdigital.com/content?url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.252.38 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-252-38.compute-1.amazonaws.com
Software
/
Resource Hash
24312ad4ad90fa02382145caec440792c9bdc7afa8c84bf5d00ba9c7eb3abfed

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:45 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A34.200Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=d41aee06-85d7-4f4c-a321-9a25cd9bdb21&uNw=1&uUq=1&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&pID=02e26017-e858-46f7-8e96-12f91b515b19&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22_out_of_page_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22out_of_page_0%22%2C%22outOfPage%22%3Atrue%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%221x1%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833254165%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22interstitial%22%5D%2C%22ctx_slot_type%22%3A%5B%22out_of_page%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22out_of_page_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:34 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A34.255Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4500&pSw=1600&pSh=1200&uID=d41aee06-85d7-4f4c-a321-9a25cd9bdb21&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&pID=02e26017-e858-46f7-8e96-12f91b515b19&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3Anull%2C%22campaignId%22%3Anull%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22native_xrail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22native_xrail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%222x2%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833254167%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22legacy%22%5D%2C%22ctx_slot_type%22%3A%5B%22native_xrail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22native_xrail_0%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%220%22%5D%2C%22amznp%22%3A%5B%220%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:34 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/
35 B
242 B
Other
General
Full URL
https://www.google-analytics.com/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:34 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-31997-1&cid=1006128056.1578833254&jid=279629182&gjid=1673014821&_gid=1844234117.1578833254&_u=aChAgUAjAAQC~&z=2005265160
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1006128056.1578833254&jid=279629182&_v=j79&z=2005265160
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1006128056.1578833254&jid=279629182&_v=j79&z=2005265160&slf_rd=1&random=3068067614
42 B
478 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1006128056.1578833254&jid=279629182&_v=j79&z=2005265160&slf_rd=1&random=3068067614
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:34 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:34 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-31997-1&cid=1006128056.1578833254&jid=279629182&_v=j79&z=2005265160&slf_rd=1&random=3068067614
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1578833253558&de=17136225344&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=_out_of_page_0&zMoatRendered=1&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=1&zMoatPageDataTargetingSet=1&zMoatSafetyTargetingSet=1&zMoatEmptySlot=1&zMoatNadoDataLoadTime=322&zMoatAllDataLoadTime=322&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=322&na=1534814662&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:34 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:34 GMT
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1578833254293&sessionId=e3ae945b-e26a-f18c-6e11-6ee5f867817c&url=arstechnica.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833253334
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.95 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:42 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
f5d8fb96fe9ab843a5ef6a8c2e7ec9cb
Content-Length
4
Expires
0
embed-api.json
player.cnevids.com/
6 KB
3 KB
Fetch
General
Full URL
https://player.cnevids.com/embed-api.json?videoId=5deac57938d0694c4b9da428&embedLocation=arstechnica
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady92926620
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.13 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-13.fra50.r.cloudfront.net
Software
nginx/1.14.1 /
Resource Hash
b49c714246c3fa6b1facb6654458807e74aa081a48b305b9c3d5afdd87563960
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:47:21 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
X-Amz-Cf-Pop
FRA50-C1
X-Cache
Hit from cloudfront
Status
200 OK
Access-Control-Max-Age
1728000
Connection
keep-alive
Content-Length
2094
X-XSS-Protection
1; mode=block
X-Request-Id
a2d0aaa8-83c9-40eb-b277-21f2e8ea9e14
X-Runtime
0.006525
X-Backend-Node
10.110.45.152
Referrer-Policy
strict-origin-when-cross-origin
Server
nginx/1.14.1
ETag
W/"c53cb124bf1f3d66ddedddd3aa8cb227"
X-Download-Options
noopen
Vary
Origin,Accept-Encoding
Access-Control-Allow-Methods
GET, OPTIONS
Content-Type
application/json; charset=utf-8
Via
1.1 a1098f0eeab192209962e3a9d76d0339.cloudfront.net (CloudFront)
Access-Control-Expose-Headers
Cache-Control
max-age=0, private, must-revalidate
Access-Control-Allow-Origin
*
X-Amz-Cf-Id
-R-lOqo-USXEcaF9uX4Fcczl01tEiu3bOj3gS2o0biiiNrdWXuG6wA==
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame EFEF
270 KB
92 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady92926620
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
c612786520975231822586a9890d1ce53d7106bdea13903c26dc36f37f7818b9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
93653
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:34 GMT
gpt_proxy.js
imasdk.googleapis.com/js/sdkloader/
66 KB
24 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/gpt_proxy.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady92926620
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b71308191586711362df7b836a1a7f50f70e460cb008d5f191d960b9247aeb4d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:39:59 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 08 Jan 2020 17:25:34 GMT
server
sffe
age
455
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
24583
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:54:59 GMT
player-style-3b3a013ac40046610e8f2fefe02c3b07.css
d2c8v52ll5s99u.cloudfront.net/player/ Frame EFEF
74 KB
12 KB
Stylesheet
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady92926620
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.73 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-73.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
596b76b93c7801ba85fb53f2f6e2281d4dbffc96ddc18bb056e8cb0e94be34fd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Fri, 14 Jun 2019 00:51:50 GMT
Content-Encoding
gzip
Age
18359744
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
11365
Last-Modified
Wed, 05 Jun 2019 16:03:54 GMT
Server
AmazonS3
ETag
"cff060eda5015972d532696ec91d375b"
Content-Type
text/css; charset=utf-8
Via
1.1 5f6905ea282e042ad3334bfed8a840ce.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
IzEWiksqTz_ozKVrSm86E8gqdcRFnnhwZm16rtRv7t4rlndzGm1UeQ==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
main-8acd27185b78ea8d8dde.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame EFEF
915 KB
230 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Requested by
Host: player.cnevids.com
URL: https://player.cnevids.com/script/video/5deac57938d0694c4b9da428.jsautoplay=0&muted=0&hasCompanion=0&adsDisabled=0&onReady=arsVideoModulePlayerReady92926620
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.73 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-73.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5c6c066d45fcff5eb73d9f8c6e7b2d756d46229d4c05a7b776054c71c05c70b4

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Tue, 07 Jan 2020 21:11:25 GMT
Content-Encoding
gzip
Age
401770
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
234924
Last-Modified
Tue, 07 Jan 2020 21:03:27 GMT
Server
AmazonS3
ETag
"fb0b5702877a9be5aaeeec5b6ba4c842"
Content-Type
application/javascript
Via
1.1 5f6905ea282e042ad3334bfed8a840ce.cloudfront.net (CloudFront)
Cache-Control
max-age=63072000, public
X-Amz-Cf-Pop
FRA50-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
ZTYYW0vlGkTVtqVbre3k6hLZLxFg84ilNGF9ngTmE1CKG6_T571a7Q==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/png
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1578833253558&de=17136225344&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=native_xrail_0&zMoatRendered=2&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=2&zMoatPageDataTargetingSet=2&zMoatSafetyTargetingSet=2&zMoatEmptySlot=2&zMoatNadoDataLoadTime=322&zMoatAllDataLoadTime=322&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=322&na=531925824&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:34 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:34 GMT
otBannerSdk.js
cdn.cookielaw.org/scripttemplates/5.9.0/
325 KB
78 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/otSDKStub.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FA5) /
Resource Hash
f7aa4714e096a10d27792f4c9f0f5a66d14c7e625d618bc2dcaa02c3b3113d0a

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:47:34 GMT
content-encoding
gzip
content-md5
ogbvarzU0fhMH1X6yZRgBg==
x-cache
HIT
status
200
content-length
80123
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:27 GMT
server
ECAcc (frc/8FA5)
etag
0x8D783317D662F3E
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
9bca7fc3-b01e-0066-3134-c96abc000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:47:34 GMT
location
geolocation.onetrust.com/cookieconsentpub/v1/geo/
197 B
511 B
Script
General
Full URL
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:10::6814:b844 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
70a6197fb7cca87ce2344481e863b24bf5eaf85735aebc0e14aecc5cadb8bbfb
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains; preload

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:34 GMT
content-encoding
gzip
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript
status
200
strict-transport-security
max-age=0; includeSubDomains; preload
cf-ray
553f3d612ae9977e-FRA
ptrack-v1.4.0-engagedtime-slots.js
d1z2jf7jlzjs58.cloudfront.net/code/
39 KB
16 KB
Script
General
Full URL
https://d1z2jf7jlzjs58.cloudfront.net/code/ptrack-v1.4.0-engagedtime-slots.js
Requested by
Host: d1z2jf7jlzjs58.cloudfront.net
URL: https://d1z2jf7jlzjs58.cloudfront.net/p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.33 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-33.fra2.r.cloudfront.net
Software
nginx /
Resource Hash
5c66cbe33a007920cdea231069727d9420e5e4a751378d2adb7777a03fe716bd

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Thu, 19 Sep 2019 21:16:07 GMT
Content-Encoding
gzip
Age
6875525
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Pragma
public
Last-Modified
Thu, 19 Sep 2019 16:47:30 GMT
Server
nginx
ETag
W/"5d83b122-9c0d"
Content-Type
application/x-javascript
Via
1.1 34f50889bc574f1edeb41dd758962a5b.cloudfront.net (CloudFront)
Cache-Control
max-age=315360000, public
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
42gYwE47ZPVUeQP3RQCOP2OL3_UhQu1IypYvBFAx4si59L781ex9nw==
Expires
Thu, 31 Dec 2037 23:55:55 GMT
/
srv-2020-01-12-12.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2020-01-12-12.pixel.parsely.com/plogger/?rand=1578833254661&plid=73474947&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%221ca8f45b-2d52-46ce-b0ca-59ce34d32337%22%2C%22parsely_site_uuid%22%3A%2248b94179-2cb0-42ef-b6b1-0ff8dc81984c%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&sref=&sts=1578833254659&slts=0&title=Iranian+hackers+have+been+%E2%80%9Cpassword+spraying%E2%80%9D+the+US+grid+%7C+Ars+Technica&date=Sun+Jan+12+2020+13%3A47%3A34+GMT%2B0100+(Central+European+Standard+Time)&action=pageview&pvid=93381589&u=48b94179-2cb0-42ef-b6b1-0ff8dc81984c
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.45.226.131 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-45-226-131.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:35 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
4d5d401c-e8fa-4920-838d-a6d667675e85
https://arstechnica.com/ Frame EFEF
31 B
0
Other
General
Full URL
blob:https://arstechnica.com/4d5d401c-e8fa-4920-838d-a6d667675e85
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7725538fe2f71147bffeba7452b434c826aef9009666cb4360c605d0b2a91d1d

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Length
31
Content-Type
application/javascript
en.json
cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/ef17d20e-0b37-40e7-a82c-27f698052aea/
76 KB
13 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/consent/b10882a1-8446-4e7d-bfb2-ce2c770ad910/ef17d20e-0b37-40e7-a82c-27f698052aea/en.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8FE9) /
Resource Hash
573cb4596b4aa1085e874238d858cf6addbb735b39f0ea15300eb49b8faf3f16

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:47:34 GMT
content-encoding
gzip
content-md5
q1rg3LZyxjhQPFrJLer4MQ==
x-cache
HIT
status
200
content-length
13236
x-ms-lease-status
unlocked
last-modified
Thu, 09 Jan 2020 19:29:40 GMT
server
ECAcc (frc/8FE9)
etag
0x8D7953A45A1D84F
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
8d14a958-201e-0005-0f29-c92c99000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:47:34 GMT
get
odb.outbrain.com/utils/
15 KB
9 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=http%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&srcUrl=http%3A%2F%2Ffeeds.arstechnica.com%2Farstechnica%2Findex%2F&settings=true&recs=true&widgetJSId=JS_1&key=NANOWDGT01&idx=0&version=1050109&apv=false&sig=hzyizUOH&format=vjapi&va=true&rand=88715&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cmpStat=1&ccpaStat=0&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833253334
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
090cade770eaa9db4a7959cf74ebc8d61c29d68bdae6d4b1eea3160d9b5515c8
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, FRA, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-traceid
ab505f7d216566f8632fd012b09c84dc
content-length
8855
x-served-by
cache-jfk8121-JFK, cache-fra19145-FRA
pragma
no-cache
x-timer
S1578833255.882526,VS0,VE175
date
Sun, 12 Jan 2020 12:47:35 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache
backend-ip
104.156.90.21
accept-ranges
bytes, bytes
x-cache-hits
0, 0
sf-ui-display-medium-webfont.woff2
d2c8v52ll5s99u.cloudfront.net/assets/fonts/ Frame EFEF
29 KB
30 KB
Font
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/assets/fonts/sf-ui-display-medium-webfont.woff2
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.73 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-73.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
d281c9d6bae645f3da6d2f0769a2cf0668709fd28e2021ce74821cdd8c7117b3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://d2c8v52ll5s99u.cloudfront.net/player/player-style-3b3a013ac40046610e8f2fefe02c3b07.css
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:47:39 GMT
Content-Encoding
gzip
X-Amz-Cf-Pop
FRA50-C1
X-Cache
RefreshHit from cloudfront
Access-Control-Max-Age
3000
Connection
keep-alive
Content-Length
29632
Via
1.1 bee9d99ac2913ec4167e166e6bdb691e.cloudfront.net (CloudFront)
Last-Modified
Mon, 26 Jun 2017 15:24:42 GMT
Server
AmazonS3
ETag
"7d18db04f980971f2a9c5026bbc34bed"
Vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/font-woff2
Access-Control-Allow-Origin
*
Cache-Control
max-age=63072000, public
Accept-Ranges
bytes
X-Amz-Cf-Id
FNqOcqqbM7bkBgVbvVwOLGMjx-G3PrKqCJloo6g2OepTZpVKIrlABw==
Expires
Tue, 01 Jan 2030 00:00:00 GMT
bridge3.358.1_en.html
imasdk.googleapis.com/js/core/ Frame C563
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.358.1_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.358.1_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
197105
date
Sat, 11 Jan 2020 23:00:00 GMT
expires
Sun, 10 Jan 2021 23:00:00 GMT
last-modified
Wed, 08 Jan 2020 17:21:14 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
49654
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame EFEF
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:35 GMT
integrator.js
adservice.google.com/adsid/ Frame EFEF
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=arstechnica.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/ Frame EFEF
126 KB
30 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
1ada5b4d0b63b06d2bd668cd7d6597689796da41a434a675cfdbd2a1bddf251a
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-24=":443"; ma=3600
content-length
30426
x-xss-protection
0
pragma
public
x-fb-debug
YcwGC/YiO1u69vGCxYAkwnOmRRthLTHwhkk9MGruRMWUurOXDDliC/bT8kouISQKr2n99Ra/XgOi2mmAmsgvwg==
x-fb-trip-id
194532234
date
Sun, 12 Jan 2020 12:47:35 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
comscore-min.js
d2c8v52ll5s99u.cloudfront.net/player/ Frame EFEF
38 KB
11 KB
Script
General
Full URL
https://d2c8v52ll5s99u.cloudfront.net/player/comscore-min.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.98.73 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-98-73.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
833a86642252016b29f08dd45ffd27f9e00ca237f28d8c5f0147a6e15d009377

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:43:54 GMT
Content-Encoding
gzip
Last-Modified
Wed, 24 May 2017 18:19:15 GMT
Server
AmazonS3
Age
222
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 5f6905ea282e042ad3334bfed8a840ce.cloudfront.net (CloudFront)
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA50-C1
Connection
keep-alive
X-Amz-Cf-Id
zmLtQQ-aMnh0zJVpmSUq9L2NBW2jKyuCXfvTtj-YX3aFikgw7iBdUA==
collect
www.google-analytics.com/r/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:35 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
infinityid
infinityid.condenastdigital.com/ Frame EFEF
36 B
1 KB
XHR
General
Full URL
https://infinityid.condenastdigital.com/infinityid
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.4.170.229 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-4-170-229.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
2a8f6095504cf17cec95ed33f3f2ecb85fe2eca48baa2307591159a8dcb13efd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
gzip
Server
nginx/1.15.8
vary
origin,accept-encoding
Content-Type
text/plain; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
Content-Length
56
track
capture.condenastdigital.com/ Frame EFEF
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-01-12T12%3A47%3A34.862Z&_c=&_t=Player%20Requested&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&pID=02e26017-e858-46f7-8e96-12f91b515b19&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame EFEF
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:05 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
30
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-hhn4040-HHN
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1575994072.752642,VS0,VE127
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
0BC1p3EOQpa4c_zCgfkq1LeDVyMnIMT6lAX9vuH6u38i_L2DEkjD7w==
X-Cache-Hits
0
otCMP.js
cdn.cookielaw.org/scripttemplates/5.9.0/
15 KB
5 KB
Script
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.9.0/otCMP.js
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F37) /
Resource Hash
a761b79faf8e1a8808729668853cac9dfbbcfa070fe3fc3814a5685abb16bb6e

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
gzip
content-md5
UlzILkh3IgsGXEj4KlzDaw==
x-cache
HIT
status
200
content-length
5080
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:33 GMT
server
ECAcc (frc/8F37)
etag
0x8D7833180B9A577
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
x-ms-request-id
2589f808-e01e-0057-2f3f-c9316b000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
expires
Sun, 12 Jan 2020 16:47:35 GMT
21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame EFEF
76 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.108 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-108.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Range
bytes=0-

Response headers

Date
Sun, 12 Jan 2020 03:13:46 GMT
Via
1.1 6fa33d47af6f4da7007689083cfe9b9c.cloudfront.net (CloudFront)
Last-Modified
Fri, 06 Dec 2019 21:47:42 GMT
Server
AmazonS3
Age
34433
ETag
"3c4c69d175578a2c5dcb4d064f187efb"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-1999682/1999683
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Content-Length
1999683
X-Amz-Cf-Id
0PZCiK8hqeao0wYC1Vamfx3sF3mcF6sCWQqnf07NRKAtAKW47am4tw==
21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame EFEF
16 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.108 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-108.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Range
bytes=0-

Response headers

Date
Sun, 12 Jan 2020 03:13:46 GMT
Via
1.1 2afacc6ad96dbba3f0b477cd95f16459.cloudfront.net (CloudFront)
Last-Modified
Fri, 06 Dec 2019 21:47:42 GMT
Server
AmazonS3
Age
34433
ETag
"3c4c69d175578a2c5dcb4d064f187efb"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 0-1999682/1999683
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Content-Length
1999683
X-Amz-Cf-Id
KD8mjePGSV8iqlOLl1E35kIzXHR-yIT5aghKEx_vmeTToB0AcwK5rQ==
ads
securepubads.g.doubleclick.net/gampad/
14 KB
8 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=313297302630897&correlator=959187204198244&output=ldjh&impl=fifs&adsid=NT&eid=21065354%2C21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars%2Crail%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=300x250%7C300x600&prev_scp=pos%3Drail%26ctx_slot_type%3Dsiderail%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dsiderail_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_He7NG7ZboLn_&cookie=ID%3D33ca58910c91b7cc%3AT%3D1578833253%3AS%3DALNI_MZz1haSCculP34CVY9Fd5CCGEhYYQ&cookie_enabled=1&bc=31&abxe=1&lmt=1578833255&dt=1578833255190&dlt=1578833253134&idt=543&frm=20&biw=1585&bih=1200&oid=3&adxs=1063&adys=370&adks=1483574547&ucis=3&ifi=3&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=46&icsg=140782585511936&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x250&ga_vid=1006128056.1578833254&ga_sid=1578833254&ga_hid=471057445&fws=516&ohw=300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
760f4e9ea90d4a3381141d4231a292e5e06b382b24b9a3fa6fac70c5bcc38bfb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
8331
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
ads
securepubads.g.doubleclick.net/gampad/
14 KB
8 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=313297302630897&correlator=959187204198244&output=ldjh&impl=fifs&adsid=NT&eid=21065354%2C21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars%2Chero%2Cinformation-technology%2Carticle%2C1&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5&prev_iu_szs=728x90%7C970x250%7C9x1%7C10x1&prev_scp=pos%3Dhero%26ctx_slot_type%3Dpost_nav%26ctx_slot_rn%3D0%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dpost_nav_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_He7NG7ZboLn_&cookie=ID%3D33ca58910c91b7cc%3AT%3D1578833253%3AS%3DALNI_MZz1haSCculP34CVY9Fd5CCGEhYYQ&cookie_enabled=1&bc=31&abxe=1&lmt=1578833255&dt=1578833255196&dlt=1578833253134&idt=543&frm=20&biw=1585&bih=1200&oid=3&adxs=0&adys=80&adks=2385402828&ucis=4&ifi=4&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=46&icsg=140782585511936&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x90&msz=1585x90&ga_vid=1006128056.1578833254&ga_sid=1578833254&ga_hid=471057445&fws=4&ohw=1585
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
b17c8ed9be4a0501b8f271d135f48b793414a1b4ab70c51c788f18fea08673c2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
8321
x-xss-protection
0
google-lineitem-id
-1
pragma
no-cache
server
cafe
google-creative-id
-1
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame EFEF
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-01-12T12%3A47%3A35.200Z&_c=Player%20Event&_t=Player%20Loaded&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale%2F&cId=5deac57938d0694c4b9da428&cKe=hobbies%2Crace%20car%2Crace%20cars%2Cracing&cPd=2019-12-10T16%3A00%3A00%2B00%3A00&cTi=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale&mDu=655&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pID=02e26017-e858-46f7-8e96-12f91b515b19&pWw=540&pWh=303.75&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&uId=d41aee06-85d7-4f4c-a321-9a25cd9bdb21&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%227a2672b%22%2C%22guid%22%3A%2296efb2f-5fe1-7fc4-717d-1192c52260cb%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3233.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3Anull%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:35 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
b82d4d85-cd4e-4a4b-893f-f2be177167cb
https://arstechnica.com/ Frame EFEF
5 KB
0
Other
General
Full URL
blob:https://arstechnica.com/b82d4d85-cd4e-4a4b-893f-f2be177167cb
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d5f3418a3fa657175d5341b5e032be036cb4d5818de5d1497f2175be5a7e3701

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Length
5463
Content-Type
application/javascript
21b60411-41b1-4740-8528-630500e6af3emanifest-ios.m3u8
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame EFEF
918 B
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3emanifest-ios.m3u8?videoIndex=0&requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.108 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-108.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
28a54fd477ae1a0ad0b5104a4bf2875d20b528c9bfaedf1afd863deef25813f1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 03:41:38 GMT
Via
1.1 999a435eb37a050d3de26fe63534c416.cloudfront.net (CloudFront)
Vary
Origin
Age
32761
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
918
Last-Modified
Fri, 06 Dec 2019 21:45:39 GMT
Server
AmazonS3
ETag
"b28fce536bde8d5b45f75f7b99f52cec"
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Access-Control-Allow-Origin
*
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
X-Amz-Cf-Id
md-DE4lLizudkYoFgHaQ52NCIyZYPE1WiDWaOsYxyTLJJ9FD6NazMQ==
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.205.63.26 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-205-63-26.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:47:35 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 4625
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833253334
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.250.44 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-44.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
gzip, deflate, br
Cookie
akacd_widgets_routing=3756286052~rv=24~id=75fd663589fb2a435fb8d26967b48a29; recs_3e3dbb9bc5220dea7f5e5022eaf60508=0B1925901673A2474727137A1600723307A2395358251A2612579688A2193560504ACD1; obuid=945e7066-125b-4ccc-a237-73eb08105ef5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

Accept-Ranges
bytes
Content-Type
text/html
ETag
"f01b8a7bd6b6de45f1ad36ce1d3a30cd:1577003167"
Last-Modified
Sun, 22 Dec 2019 08:23:47 GMT
Server
AkamaiNetStorage
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Sun, 12 Jan 2020 12:47:35 GMT
Content-Length
3524
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=d7eedf14f635af85ea3b5430a3e971b4_6817_1578833255010&tm=1150&eT=0&wRV=1050109&pVis=0&lsd=945e7066-125b-4ccc-a237-73eb08105ef5&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1578833253334
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.95 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:47:38 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
aab16d2c00b03ecd643a2c84963fb82c
Content-Length
30
eyJpdSI6IjlhOWUwMDAwYjBmMmFjNGNiOTY2NjI1NTczNDhjYjRiMzA1NTNiYTkyZDY3NjM4MTdiZTc4YzAyZDVkZTc0YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
3 KB
4 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjlhOWUwMDAwYjBmMmFjNGNiOTY2NjI1NTczNDhjYjRiMzA1NTNiYTkyZDY3NjM4MTdiZTc4YzAyZDVkZTc0YjMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ec4f9cb92382a86382d7d8be4447c7c97bcec7e8136cdbf4d88a11b2f64e9e30
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 14 Dec 2019 12:43:41 GMT
Date
Sun, 12 Jan 2020 12:47:38 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1665579
Connection
keep-alive
X-TraceId
8da260ed617c706404e41d77ada895ab
Timing-Allow-Origin
*
Content-Length
3478
eyJpdSI6ImRmNDU1MjljNmZiYTVjOTFjNzhkNzZhMjkyODcyNGVmMGI1YzA5Y2YyZmY0MjA0MDY5NWNmNDg0NTVmMDUyMDMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
5 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImRmNDU1MjljNmZiYTVjOTFjNzhkNzZhMjkyODcyNGVmMGI1YzA5Y2YyZmY0MjA0MDY5NWNmNDg0NTVmMDUyMDMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a489bdf1246e9a4ab79459787bad18f4d2e090c469bdced8fd537594e97921a4
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 11 Dec 2019 14:24:58 GMT
Date
Sun, 12 Jan 2020 12:47:38 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=884583
Connection
keep-alive
X-TraceId
4a50d9df44e93d36771d21d6d18e9808
Timing-Allow-Origin
*
Content-Length
5496
eyJpdSI6IjJiMTliY2ZmM2MzZGYxOTUzYjkyNDEzMWJlZjk2OTRhOTFjYTEwNmVhYTdlNmEwNTQ2ZGIzNzI1YjlkM2EzYTAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
6 KB
6 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjJiMTliY2ZmM2MzZGYxOTUzYjkyNDEzMWJlZjk2OTRhOTFjYTEwNmVhYTdlNmEwNTQ2ZGIzNzI1YjlkM2EzYTAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e6823aba66e9885db3c60247e0461762f2246d4ebc44150dc7992637439051a0
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 17 Dec 2019 10:27:46 GMT
Date
Sun, 12 Jan 2020 12:47:38 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1256671
Connection
keep-alive
X-TraceId
d57f9c03a7706fdf77501c074400d3d1
Timing-Allow-Origin
*
Content-Length
5740
eyJpdSI6IjE5YTJlYWIxYTlhM2Y2MGEzNzRhOTM5MWNiOWY4NDc5NGY2NTJmODkyNmY3NTEzMjFmZGUwMGEzYjUwMDQzMjQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
7 KB
8 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjE5YTJlYWIxYTlhM2Y2MGEzNzRhOTM5MWNiOWY4NDc5NGY2NTJmODkyNmY3NTEzMjFmZGUwMGEzYjUwMDQzMjQiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6f5aebe7d4b0b74dd9181c253fd19287f62da2f4c533eaacabd4ba881b6d7276
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 28 Dec 2019 22:31:54 GMT
Date
Sun, 12 Jan 2020 12:47:38 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2459126
Connection
keep-alive
X-TraceId
735e150f4bb552b163215d8a36fbf1c2
Timing-Allow-Origin
*
Content-Length
7490
eyJpdSI6IjkwODk2OWFjMjFjY2ExNGMzMWNmZTI5OGYwMWQ3NDlkMzU5YWU2NjY2YzhlNTA4ZjdkYzNiOTI3NDg3ZTYxMmMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
11 KB
11 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjkwODk2OWFjMjFjY2ExNGMzMWNmZTI5OGYwMWQ3NDlkMzU5YWU2NjY2YzhlNTA4ZjdkYzNiOTI3NDg3ZTYxMmMiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
df7fcbe0d702028274696ae19236eecc02f275caa61496f432d617a42bf0bfd9
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 28 Dec 2019 17:24:31 GMT
Date
Sun, 12 Jan 2020 12:47:39 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2462400
Connection
keep-alive
X-TraceId
10f1003bea703845a06daec085967c63
Timing-Allow-Origin
*
Content-Length
10964
eyJpdSI6IjY0ZjJhMThjMjBjZWE4ZjE1OWQwODNmMDUzMzhiNmExOTVkNWIzNWY0MDBmNmFlMTViMTlhOGQxN2VjNWIxMzAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
15 KB
15 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjY0ZjJhMThjMjBjZWE4ZjE1OWQwODNmMDUzMzhiNmExOTVkNWIzNWY0MDBmNmFlMTViMTlhOGQxN2VjNWIxMzAiLCJ3IjoxNDAsImgiOjEwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
95.100.198.32 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-100-198-32.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
08acacc9f1c2e2765826e137eeda67ce0693bbb30c820e26c7f5189a0f2d9878
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sun, 15 Dec 2019 18:17:24 GMT
Date
Sun, 12 Jan 2020 12:47:38 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1791375
Connection
keep-alive
X-TraceId
a7a3983c584311e253dbea74f5e849a4
Timing-Allow-Origin
*
Content-Length
15154
1663130473914833
connect.facebook.net/signals/config/ Frame EFEF
447 KB
113 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/1663130473914833?v=2.9.15&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
7ed50c95fbc229d3a9e94ad67a3eab19277f344e0fd228333390962b38998fd0
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-24=":443"; ma=3600
content-length
114918
x-xss-protection
0
pragma
public
x-fb-debug
u9Kz/zSnKfhDqmAeok43I5mYoUcz4ade6Zqf2GRUpC8lXy6NMs4wzwjCXNtWpGJRP7jP1Tc1Gj7BZpkuqvOzmA==
x-fb-trip-id
194532234
date
Sun, 12 Jan 2020 12:47:35 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame EFEF
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 12:47:05 GMT
Via
1.1 varnish, 1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
Age
33
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-hhn4040-HHN
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1575994072.752642,VS0,VE127
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
1yTraIk-j3XuKKPfflMqtjB5rE9GHIEzztfiUaR0DwGWwRmKN9gS-Q==
X-Cache-Hits
0
otFlat.json
cdn.cookielaw.org/scripttemplates/5.9.0/assets/
15 KB
3 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.9.0/assets/otFlat.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F0D) /
Resource Hash
c01d825e8f03f4125b38f630b84c7a88201c319b4f94e5a6a787cd86b89543f0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
gzip
content-md5
dxOB/be8nmsxf/Kih6JKlA==
x-cache
HIT
status
200
content-length
2826
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:25 GMT
server
ECAcc (frc/8F0D)
etag
0x8D783317BF2D096
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
e400951c-701e-0016-2844-c91978000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:47:35 GMT
otPcCenter.json
cdn.cookielaw.org/scripttemplates/5.9.0/assets/
75 KB
13 KB
Fetch
General
Full URL
https://cdn.cookielaw.org/scripttemplates/5.9.0/assets/otPcCenter.json
Requested by
Host: cdn.cookielaw.org
URL: https://cdn.cookielaw.org/scripttemplates/5.9.0/otBannerSdk.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.132.202 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECAcc (frc/8F41) /
Resource Hash
07a1bfbc0952fdf7ba7b4776d12b04ca9121c77a2a2fc884f3401617f4ba97c6

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

x-ms-blob-type
BlockBlob
date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
gzip
content-md5
ZKBNGH1g2s7/Loa8vBKjKA==
x-cache
HIT
status
200
content-length
13145
x-ms-lease-status
unlocked
last-modified
Tue, 17 Dec 2019 20:41:25 GMT
server
ECAcc (frc/8F41)
etag
0x8D783317C1616BC
vary
Accept-Encoding
content-type
application/json
access-control-allow-origin
*
x-ms-request-id
9037682c-701e-0156-4044-c976c3000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Length,Date,Transfer-Encoding
cache-control
max-age=14400
x-ms-version
2009-09-19
accept-ranges
bytes
expires
Sun, 12 Jan 2020 16:47:35 GMT
arstechnica_mini-4wd-racing.jpg
dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/ Frame EFEF
77 KB
78 KB
Image
General
Full URL
https://dwgyu36up6iuz.cloudfront.net/heru80fdn/image/upload/c_fill,d_placeholder_arstechnica.png,fl_progressive,g_face,h_450,q_80,w_800/v1575930137/arstechnica_mini-4wd-racing.jpg
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.197.104 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-197-104.fra2.r.cloudfront.net
Software
cloudinary /
Resource Hash
00e3bdc033f31eee3294bbfa68d03bc0968b4f86507e68ff9d19d9890039c89c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:05 GMT
Via
1.1 varnish, 1.1 1d67a4c00b06651cb6daa95ec3f21f9b.cloudfront.net (CloudFront)
Age
30
Edge-Cache-Tag
380278988686077832122293282495365645705,504486728181076666154556403696563473843,bd072c9835b885d44d7447102f8695ad
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
78622
X-Served-By
cache-hhn4040-HHN
Last-Modified
Tue, 10 Dec 2019 16:07:04 GMT
Server
cloudinary
X-Timer
S1575994072.752642,VS0,VE127
ETag
"bc88b9555531b7b8cfae6ecc1581a7f7"
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Amz-Cf-Id
kwVaMP9oGFi1IrMSqxyOjf5PLZgZ21vUJnRXqCzSsI_nK0C6-9X3Fg==
X-Cache-Hits
0
identity
api.rlcdn.com/api/
0
203 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope&cv=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA&ct=1
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.244.174.68 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
68.174.244.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Sun, 12 Jan 2020 12:47:39 GMT
via
1.1 google
alt-svc
clear
status
204
access-control-allow-methods
GET, OPTIONS
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
access-control-allow-headers
Cookie, Accept, Origin, Authorization, Content-Type
truncated
/
817 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db311174b0e3c340727b63c055cfb5b317808e909503e1bda11cc58af444f12b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Type
image/svg+xml
ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=79&profileId=154&cb=57122859630
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Sun, 12 Jan 2020 12:47:34 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
cygnus
as-sec.casalemedia.com/
66 B
966 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A52516002%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2233%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2231%22%2C%22siteID%22%3A%22375863%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%2254be3cce-66e0-4c9d-b6f2-35ccef539c2a%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222020-01-12T12%3A47%3A33%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1fd61e8b736f52690b9dbb380d0431e5897b9b70e51c6e31ff3e28a5fd999751

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Sun, 12 Jan 2020 12:47:38 GMT
placementbid.json
an.facebook.com/v2/
105 B
1 KB
XHR
General
Full URL
https://an.facebook.com/v2/placementbid.json?sdk=5.5.web&placementids%5B%5D=2038188213062675_2473096466238512&adformats%5B%5D=300x250&cachebuster=DJuu10tOty2FzdfiOasGPjKsDD5Q2h0CBaZ314WunisXKI7S6dXR2u7g&platform=2061185240785516&adapterver=2.1.0
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
f8ddecc5c36fd069bfede03f790e8404ef4075862f085a6931f6d2a1d2e54289
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

strict-transport-security
max-age=15552000; preload
content-encoding
br
x-content-type-options
nosniff
x-fb-an-errors
No bids
x-fb-an-request-id
3195487823434496215
status
200
alt-svc
h3-24=":443"; ma=3600
x-xss-protection
0
pragma
no-cache
x-fb-debug
U9NXh3UkD/0cm6s6Q8TmzfxGdFdYMr7hUxHgOZeyw8oqzVe8fxy1NA34mozHK+olsv8EfzHONV7slRDOZQR5tg==
x-frame-options
DENY
date
Sun, 12 Jan 2020 12:47:35 GMT
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
X-FB-AN-Request-ID, X-FB-AN-Errors, X-FB-AN-Bid-Count
cache-control
private, no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
261 B
744 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=15&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.20933450809237408&gdpr=1&gdpr_consent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA&alt_size_ids=10
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
068d4a78ebcd4e4ff42726b68fbb0dd23ee98e2dca97fb71d62f745ed6f10cc2

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:45 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=361
Content-Length
261
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cygnus
as-sec.casalemedia.com/
66 B
966 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A21229886%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%227%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%221%22%7D%2C%7B%22banner%22%3A%7B%22w%22%3A728%2C%22h%22%3A90%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%228%22%2C%22siteID%22%3A%22375847%22%7D%2C%22id%22%3A%222%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%2254be3cce-66e0-4c9d-b6f2-35ccef539c2a%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222020-01-12T12%3A47%3A33%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
68548a1ddb65e1d7af18a14221d8a57a3ef88bbaff5ea254019250e0957c2151

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Sun, 12 Jan 2020 12:47:38 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
260 B
743 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=2&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.8566012103127549&gdpr=1&gdpr_consent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA&alt_size_ids=57
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
0b6bc4793bc624200fd168eb8d13c3be5d4e4cf16bdcc4c5dc67af8e3d3ed2b5

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:45 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=482
Content-Length
260
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=79&profileId=154&cb=26721222755
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Sun, 12 Jan 2020 12:47:34 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 0C91
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Sun, 12 Jan 2020 12:32:39 GMT
expires
Mon, 11 Jan 2021 12:32:39 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
896
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/
76 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
ade8ffb528cb5f03a069e2d5136668f7515cb7108007267134eebb7c364add18
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578659119029161"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28668
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:35 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&m=0&ar=29bb202-clean&iw=81ef8f7&q=1&cb=0&cu=1578833253558&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=1943546367&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:35 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:35 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A35.500Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=d41aee06-85d7-4f4c-a321-9a25cd9bdb21&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&pID=02e26017-e858-46f7-8e96-12f91b515b19&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833255500%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:37 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
user
4d.condenastdigital.com/
67 B
428 B
XHR
General
Full URL
https://4d.condenastdigital.com/user?xid=de355ab6-defb-4438-be47-f183a6629537
Requested by
Host: pixel.condenastdigital.com
URL: https://pixel.condenastdigital.com/sparrow.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.252.38 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-252-38.compute-1.amazonaws.com
Software
/
Resource Hash
320ac641747818a2ba6bcdefb7e5ff424e10e2a3db471c99c56056e8576bf874

Request headers

Accept
text/plain
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:45 GMT
content-encoding
gzip
transfer-encoding
chunked
Content-Type
application/json; charset=utf-8
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
Connection
keep-alive
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 008B
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Sun, 12 Jan 2020 12:32:39 GMT
expires
Mon, 11 Jan 2021 12:32:39 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
896
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=313297302630897&r=728x90%7C970x250%7C9x1%7C10x1&w=970&h=250
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:35 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A35.758Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=d41aee06-85d7-4f4c-a321-9a25cd9bdb21&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&pID=02e26017-e858-46f7-8e96-12f91b515b19&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833255758%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Sun, 12 Jan 2020 12:47:38 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Sun, 12 Jan 2020 12:47:38 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A36.696Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=d41aee06-85d7-4f4c-a321-9a25cd9bdb21&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&pID=02e26017-e858-46f7-8e96-12f91b515b19&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833255500%2C%22viewable%22%3A1578833256696%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A36.797Z&_t=slot_impression_viewable&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4600&pSw=1600&pSh=1200&uID=d41aee06-85d7-4f4c-a321-9a25cd9bdb21&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&pID=02e26017-e858-46f7-8e96-12f91b515b19&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833255758%2C%22viewable%22%3A1578833256797%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1578833253558&de=17136225344&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=siderail_0&zMoatRendered=3&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=3&zMoatPageDataTargetingSet=3&zMoatSafetyTargetingSet=3&zMoatEmptySlot=2&zMoatNadoDataLoadTime=322&zMoatAllDataLoadTime=322&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=322&na=1954791493&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.205.63.26 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-205-63-26.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:47:38 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
ads
pubads.g.doubleclick.net/gampad/ Frame EFEF
4 KB
2 KB
XHR
General
Full URL
https://pubads.g.doubleclick.net/gampad/ads?sz=640x480|480x70&iu=/3379/conde.ars/player/information-technology/article&ciu_szs=300x60&gdfp_req=1&env=vp&output=vmap&unviewed_position_start=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_He7NG7ZboLn_%26ctx_line_items%3D%26height%3D304%26muted%3D0%26right_rail%3D0%26sensitive%3D0%26width%3D540&correlator=959187204198244&description_url=https%3A%2F%2Fthescene.com%2Fwatch%2Farstechnica%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale&vid=5deac57938d0694c4b9da428&cmsid=1495&ppid=85ee44971c6f40acae49e5d41d213dc5
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
ea674592c261b461210dea3492933e7020950231f8d222f62c3c4433ee01c33a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:38 GMT
content-encoding
br
x-content-type-options
nosniff
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1109
x-xss-protection
0
google-lineitem-id
0
pragma
no-cache
server
cafe
google-creative-id
0
content-type
text/xml; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/ Frame EFEF
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-01-12T12%3A47%3A37.992Z&_c=timedOut&_t=gptData&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&pID=02e26017-e858-46f7-8e96-12f91b515b19&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dim1=%7B%22adBlocked%22%3Afalse%2C%22adUnits%22%3A%5B%223379%2Fconde.ars%2Finterstitial%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F2%22%2C%223379%2Fconde.ars%2Fmid-content%2Finformation-technology%2Farticle%2F1%22%2C%223379%2Fconde.ars.native%2Flegacy%2Finformation-technology%2Farticle%2F1%22%5D%2C%22embedLocation%22%3A%22arstechnica%22%2C%22error%22%3A%22%22%2C%22lineItems%22%3A%5B%5D%2C%22publicaEnabled%22%3Afalse%2C%22videoId%22%3A%225deac57938d0694c4b9da428%22%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
moatvideo.js
z.moatads.com/condenastjsvideocontent160527792519/ Frame EFEF
282 KB
95 KB
Script
General
Full URL
https://z.moatads.com/condenastjsvideocontent160527792519/moatvideo.js
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
630a22a3df3c99d429995d3ec480502a97ca958b14fbea98c2b072db3f2a2eae

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:38 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:11:55 GMT
Server
AmazonS3
x-amz-request-id
2D9DDE041397324A
ETag
"6c1a116700f737a304432db863def8fc"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21659
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
96602
x-amz-id-2
7996CqauFPmo/4OuySlZXzb7+zJr4RrvmpBKeLwD4lS1alpZrllbXaIG9unYOlvp6qkGwSYL6yk=
track
capture.condenastdigital.com/ Frame EFEF
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_o=cne&_ts=2020-01-12T12%3A47%3A38.183Z&_c=Video%20Ad&_t=Ad%20Call%20Made&app=playerservice&cBr=arstechnica&cCh=videos%2Fshow&cCu=https%3A%2F%2Fvideo.arstechnica.com%2Fwatch%2Fcustomizing-mini-4wd-racers-for-high-speeds-on-a-small-scale%2F&cId=5deac57938d0694c4b9da428&cKe=hobbies%2Crace%20car%2Crace%20cars%2Cracing&cPd=2019-12-10T16%3A00%3A00%2B00%3A00&cTi=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale&cTy=%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle&mDu=655&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pID=02e26017-e858-46f7-8e96-12f91b515b19&pWw=540&pWh=303.75&sID=90b52e19-c685-4ed0-9b19-03cf5ec2741a&uId=d41aee06-85d7-4f4c-a321-9a25cd9bdb21&xid=85ee4497-1c6f-40ac-ae49-e5d41d213dc5&dim1=%7B%22contentStartType%22%3A%22manual%22%2C%22doNotTrackSetting%22%3Anull%2C%22environment%22%3A%22oo%22%2C%22gitBranch%22%3A%22master%22%2C%22gitSha%22%3A%227a2672b%22%2C%22guid%22%3A%2296efb2f-5fe1-7fc4-717d-1192c52260cb%22%2C%22isMobile%22%3Afalse%2C%22isVerso%22%3Afalse%2C%22initialPlayerStartType%22%3A%22manual%22%2C%22persistent%22%3Afalse%2C%22playerDepth%22%3A3233.9375%2C%22playerType%22%3A%22video-continuous%22%2C%22playsOnPage%22%3A0%2C%22prerollPlayed%22%3Afalse%2C%22recAlgorithm%22%3Anull%2C%22recStrategy%22%3Anull%2C%22isRightRail%22%3Afalse%2C%22tabStatus%22%3A%22active%22%2C%22versoPageType%22%3A%22article%7Creport%22%2C%22videoViews%22%3A1%2C%22viewportStatus%22%3A%22OUT_OF_VIEWPORT%22%7D&dim2=%7B%22adBlocked%22%3Afalse%2C%22adId%22%3A%22%22%2C%22adType%22%3A%22%22%2C%22creativeId%22%3A%22%22%2C%22wrapperAdIds%22%3A%22%22%2C%22wrapperAdSystems%22%3A%22%22%2C%22dfpLineItem%22%3A%22%22%2C%22publicaEnabled%22%3Afalse%2C%22podIndex%22%3A%22%22%7D&videoViews=1&adId=&pageType=article%7Creport
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:38 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768.m3u8
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame EFEF
9 KB
1 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768.m3u8?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.108 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-108.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
95f4f5090eababa4dad68068640228a63058d9756f252d83669758464daf7e19

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 07:43:09 GMT
Content-Encoding
gzip
Vary
Origin
Age
18270
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 06 Dec 2019 21:49:50 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 999a435eb37a050d3de26fe63534c416.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C2
X-Amz-Cf-Id
syJsBveK12O51XPgLaDuwt8C2a7otRTibFK2FqlgDtyhCITLU9ptrw==
39242c78-1733-4b2f-94c6-96340c73caa5
https://arstechnica.com/ Frame EFEF
64 KB
0
Other
General
Full URL
blob:https://arstechnica.com/39242c78-1733-4b2f-94c6-96340c73caa5
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4b188a568fa90fa61d4bbe76dd6cf523abe65787e0ac3dc6b5c44db5e823685b

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Content-Length
65790
Content-Type
application/javascript
21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768-00001.ts
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame EFEF
737 KB
728 KB
XHR
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3efile-1422k-128-48000-768-00001.ts?requester=oo
Requested by
Host: d2c8v52ll5s99u.cloudfront.net
URL: https://d2c8v52ll5s99u.cloudfront.net/player/main-8acd27185b78ea8d8dde.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.108 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-108.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
86ca318ca88169e6206b93695ef6091e9fc42a1061344fdcfe78310390c83997

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

Date
Sun, 12 Jan 2020 07:47:12 GMT
Content-Encoding
gzip
Vary
Origin
Age
18027
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
Connection
keep-alive
Access-Control-Allow-Origin
*
Last-Modified
Fri, 06 Dec 2019 21:49:42 GMT
Server
AmazonS3
Access-Control-Max-Age
3000
Access-Control-Allow-Methods
GET, HEAD
Content-Type
application/x-mpegURL
Via
1.1 999a435eb37a050d3de26fe63534c416.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C2
X-Amz-Cf-Id
6Bwg6deP6XeAx4bvIjPNm-4E3yvAng0XsH3rt-XhuAJMZhGaNFfl3A==
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDENAST_PREBID_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1578833253558&de=100876776326&rx=105197337572&m=0&ar=29bb202-clean&iw=81ef8f7&q=2&cb=0&cu=1578833253558&ll=2&lm=0&ln=0&em=0&en=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&fd=1&ac=1&it=500&fs=173485&na=518477880&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=43&t=1578833253558&de=17136225344&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=post_nav_0&zMoatRendered=4&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=4&zMoatPageDataTargetingSet=4&zMoatSafetyTargetingSet=4&zMoatEmptySlot=2&zMoatNadoDataLoadTime=322&zMoatAllDataLoadTime=322&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=322&na=1678294434&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
ADTECH;apid=1Ab6e7f840-3539-11ea-a92b-12dccfef2018;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Ab6e7f840-3539-11ea-a92b-12dccfef2018;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Ab6e7f840-3539-11ea-a92b-12dccfef2018;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Ab6e7f840-3539-11ea-a92b-12dccfef2018;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Ab6e7f840-3539-11ea-a92b-12dccfef2018;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ab6e84b38-3539-11ea-a663-12c791b7f306;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Ab6e84b38-3539-11ea-a663-12c791b7f306;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Ab6e84b38-3539-11ea-a663-12c791b7f306;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Ab6e84b38-3539-11ea-a663-12c791b7f306;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Ab6e84b38-3539-11ea-a663-12c791b7f306;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ab710e5b6-3539-11ea-ab1f-127f7115e3c4;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Ab710e5b6-3539-11ea-ab1f-127f7115e3c4;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Ab710e5b6-3539-11ea-ab1f-127f7115e3c4;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Ab710e5b6-3539-11ea-ab1f-127f7115e3c4;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Ab710e5b6-3539-11ea-ab1f-127f7115e3c4;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ab6e89a5c-3539-11ea-9722-1249c31fdca2;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Ab6e89a5c-3539-11ea-9722-1249c31fdca2;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Ab6e89a5c-3539-11ea-9722-1249c31fdca2;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Ab6e89a5c-3539-11ea-9722-1249c31fdca2;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Ab6e89a5c-3539-11ea-9722-1249c31fdca2;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&cu=1578833253558&m=2466&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4636&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=81&an=0&gf=81&gg=0&ix=81&ic=81&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=81&bx=0&dj=1&im=0&in=0&pd=0&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=162&cd=0&ah=162&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1640183265&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=0&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=0&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=100876776326&rx=105197337572&cu=1578833253558&m=2710&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4636&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=0&ag=5&an=0&gf=5&gg=0&ix=5&ic=5&ez=1&aj=1&pg=100&pf=0&ib=0&cc=0&bw=5&bx=0&dj=1&im=0&in=0&pd=0&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9&cd=0&ah=9&am=0&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=787180007&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
ADTECH;apid=1Ab6e7f840-3539-11ea-a92b-12dccfef2018;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090783/0/-1/ADTECH;apid=1Ab6e7f840-3539-11ea-a92b-12dccfef2018;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255400;callback=window.headertag.AolHtb.adResponseCallbacks._8EvaORnK;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
55e762186fef302bce385e55909ca4f94c6972ff50cfa6a45a814a5a919cb6e7

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1750
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ab6e84b38-3539-11ea-a663-12c791b7f306;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090778/0/-1/ADTECH;apid=1Ab6e84b38-3539-11ea-a663-12c791b7f306;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255399;callback=window.headertag.AolHtb.adResponseCallbacks._RU12OgTa;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
2be3063d3fc0524cc65eb7a56cd3d857f6f496e3e53b6ee58be32eb9aa85e974

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1750
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ab6e89a5c-3539-11ea-9722-1249c31fdca2;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090770/0/-1/ADTECH;apid=1Ab6e89a5c-3539-11ea-9722-1249c31fdca2;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._i8XmtPr2;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
a3214f14c0b81257de23363310188c291cda410219bcf481120bd34687739544

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:38 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1751
expires
Mon, 15 Jun 1998 00:00:00 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&cu=1578833253558&m=3504&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4636&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1124&an=81&gi=1&gf=1124&gg=81&ix=1124&ic=1124&ez=1&ck=1124&kw=1003&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1124&bx=81&ci=1124&jz=1003&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1003&cd=162&ah=1003&am=162&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1958497945&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&cu=1578833253558&m=3505&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4636&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1124&an=1124&gi=1&gf=1124&gg=1124&ix=1124&ic=1124&ez=1&ck=1124&kw=1003&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1124&bx=1124&ci=1124&jz=1003&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1003&cd=1003&ah=1003&am=1003&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1502923137&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&cu=1578833253558&m=3506&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4636&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1124&an=1124&gi=1&gf=1124&gg=1124&ix=1124&ic=1124&ez=1&ck=1124&kw=1003&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1124&bx=1124&ci=1124&jz=1003&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=1003&cd=1003&ah=1003&am=1003&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1793422145&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=100876776326&rx=105197337572&cu=1578833253558&m=3708&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4636&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1004&an=5&gi=1&gf=1004&gg=5&ix=1004&ic=1004&ez=1&ck=1004&kw=804&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1004&bx=5&ci=1004&jz=804&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=804&cd=9&ah=804&am=9&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=241320858&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=5&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=2&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=100876776326&rx=105197337572&cu=1578833253558&m=3710&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4636&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1004&an=1004&gi=1&gf=1004&gg=1004&ix=1004&ic=1004&ez=1&ck=1004&kw=804&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1004&bx=1004&ci=1004&jz=804&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=804&cd=804&ah=804&am=804&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1332769539&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=37&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=3&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=100876776326&rx=105197337572&cu=1578833253558&m=3711&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4636&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=1004&an=1004&gi=1&gf=1004&gg=1004&ix=1004&ic=1004&ez=1&ck=1004&kw=804&aj=1&pg=100&pf=100&ib=0&cc=1&bw=1004&bx=1004&ci=1004&jz=804&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=804&cd=804&ah=804&am=804&rf=0&re=0&wb=1&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=466506789&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&i=CONDEVIDEOCONTENT1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=8&f=0&j=&t=1578833258539&de=690928237517&m=0&ar=0de3535428-clean&iw=cdb8c0c&q=5&cb=0&ym=0&cu=1578833258539&ll=2&lm=0&ln=1&r=0&em=0&en=0&d=Customizing%20Mini%204WD%20Racers%20For%20High%20Speeds%20On%20A%20Small%20Scale%3A%2F3379%2Fconde.ars%2Fplayer%2Finformation-technology%2Farticle%3Aundefined%3Aundefined&zMoatVideoId=5deac57938d0694c4b9da428&zMoatAP=-&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&zMoatDomain=arstechnica.com&zMoatSubdomain=arstechnica.com&gw=condenastjsvideocontent160527792519&fd=1&ac=1&it=500&ti=0&ih=1&fs=175595&na=1231394763&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:38 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:38 GMT
ADTECH;apid=1Ab710e5b6-3539-11ea-ab1f-127f7115e3c4;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090757/0/-1/ADTECH;apid=1Ab710e5b6-3539-11ea-ab1f-127f7115e3c4;cfp=1;rndc=1578833258;cmd=bid;cors=yes;v=2;misc=1578833255408;callback=window.headertag.AolHtb.adResponseCallbacks._Cdz1LNKd;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
94f417468d277aa96d405fbfe0251706d53d92feae06a3f87e90f6d5da371f7b

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:39 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1751
expires
Mon, 15 Jun 1998 00:00:00 GMT
21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/ Frame EFEF
78 KB
0
Media
General
Full URL
https://dp8hsntg6do36.cloudfront.net/5deac57938d0694c4b9da428/21b60411-41b1-4740-8528-630500e6af3ethumbs.mp4
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.108 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-108.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Range
bytes=65536-

Response headers

Date
Sun, 12 Jan 2020 03:13:46 GMT
Via
1.1 27f665df26bde4a7226480b4a2890ff9.cloudfront.net (CloudFront)
Last-Modified
Fri, 06 Dec 2019 21:47:42 GMT
Server
AmazonS3
Age
34433
ETag
"3c4c69d175578a2c5dcb4d064f187efb"
X-Cache
Hit from cloudfront
Content-Type
video/mp4
Content-Range
bytes 65536-1999682/1999683
Connection
keep-alive
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Content-Length
1934147
X-Amz-Cf-Id
iCWH5wxXQT1VbImQQulY_uSaoGXkDXesgllEC9HOvhiBblceYceeqA==
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&cu=1578833253558&m=7528&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4745&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5148&an=1124&gi=1&gf=5148&gg=1124&ix=5148&ic=5148&ez=1&ck=1124&kw=1003&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5148&bx=1124&ci=1124&jz=1003&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5028&cd=1003&ah=5028&am=1003&rf=0&re=1&ft=2510&fv=0&fw=2510&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1002153865&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:41 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:41 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&cu=1578833253558&m=7730&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4745&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5349&an=5148&gi=1&gf=5349&gg=5148&ix=5349&ic=5349&ez=1&ck=1124&kw=1003&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5349&bx=5148&ci=1124&jz=1003&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=5229&cd=5028&ah=5229&am=5028&rf=0&re=1&ft=2711&fv=2510&fw=2510&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1580813640&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:41 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:41 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=0&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=4&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=100876776326&rx=105197337572&cu=1578833253558&m=7730&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4745&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=5025&an=1004&gi=1&gf=5025&gg=1004&ix=5025&ic=5025&ez=1&ck=1004&kw=804&aj=1&pg=100&pf=100&ib=0&cc=1&bw=5025&bx=1004&ci=1004&jz=804&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=4828&cd=804&ah=4828&am=804&rf=0&re=1&ft=2711&fv=0&fw=2711&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1911525427&cs=0
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:41 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:41 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A41.961Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=c6baa932-7957-4dc5-b407-7d4affd1f2d7&uNw=1&uUq=1&pID=363dcbf1-3365-4a2b-b3e3-4cbcf2e2a5ce&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833255758%2C%22viewable%22%3A1578833256797%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1578833261961%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:42 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.205.63.26 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-205-63-26.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:47:44 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
/
srv-2020-01-12-12.pixel.parsely.com/plogger/
43 B
229 B
Image
General
Full URL
https://srv-2020-01-12-12.pixel.parsely.com/plogger/?rand=1578833265161&plid=73474947&idsite=arstechnica.com&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&urlref=&screen=1600x1200%7C1600x1200%7C24&data=%7B%22parsely_uuid%22%3A%221ca8f45b-2d52-46ce-b0ca-59ce34d32337%22%2C%22parsely_site_uuid%22%3A%2248b94179-2cb0-42ef-b6b1-0ff8dc81984c%22%7D&sid=1&surl=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&sref=&sts=1578833265161&slts=0&date=Sun+Jan+12+2020+13%3A47%3A45+GMT%2B0100+(Central+European+Standard+Time)&action=heartbeat&inc=5&tt=4900&pvid=93381589&u=48b94179-2cb0-42ef-b6b1-0ff8dc81984c
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.45.226.131 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-45-226-131.compute-1.amazonaws.com
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:37 GMT
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A45.339Z&_t=slot_loaded&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=c6baa932-7957-4dc5-b407-7d4affd1f2d7&sID=28682060-7f55-4ada-8506-f29614aa374e&pID=363dcbf1-3365-4a2b-b3e3-4cbcf2e2a5ce&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4660981638%2C%22campaignId%22%3A2443012271%2C%22creativeId%22%3Anull%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Atrue%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Atrue%2C%22isRefresh%22%3Afalse%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3Anull%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%220%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833255500%2C%22viewable%22%3A1578833256696%2C%22viewport%22%3A%22%22%2C%22impression%22%3A1578833265339%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%220%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D
Requested by
Host: arstechnica.com
URL: https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:45 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
collect
www.google-analytics.com/r/
35 B
102 B
Other
General
Full URL
https://www.google-analytics.com/r/collect
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:45 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
access-control-allow-origin
https://arstechnica.com
content-type
image/gif
status
200
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A45.693Z&_t=pageview&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=c6baa932-7957-4dc5-b407-7d4affd1f2d7&sID=28682060-7f55-4ada-8506-f29614aa374e&pID=363dcbf1-3365-4a2b-b3e3-4cbcf2e2a5ce&uDt=desktop&_o=ars-technica&_c=general&xID=de355ab6-defb-4438-be47-f183a6629537&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:45 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&cu=1578833253558&m=12554&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4745&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=10173&an=5349&gi=1&gf=10173&gg=5349&ix=10173&ic=10173&ez=1&ck=1124&kw=1003&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10173&bx=5349&ci=1124&jz=1003&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=10054&cd=5229&ah=10054&am=5229&rf=0&re=1&ft=5021&fv=2711&fw=2510&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=441453279&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:46 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:46 GMT
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=1&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=5&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=100876776326&rx=105197337572&cu=1578833253558&m=12755&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4745&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=10051&an=5025&gi=1&gf=10051&gg=5025&ix=10051&ic=10051&ez=1&ck=1004&kw=804&aj=1&pg=100&pf=100&ib=0&cc=1&bw=10051&bx=5025&ci=1004&jz=804&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=9853&cd=4828&ah=9853&am=4828&rf=0&re=1&ft=5021&fv=2711&fw=2711&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=1768588678&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:46 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:46 GMT
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.205.63.26 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-205-63-26.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:47:46 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
events
wren.condenastdigital.com/1.0/conde/
0
732 B
Other
General
Full URL
https://wren.condenastdigital.com/1.0/conde/events?topic=wren.events.ads&api_key=d3Jlbg
Requested by
Host: cdn.arstechnica.net
URL: https://cdn.arstechnica.net/cns/ars-technica.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.205.63.26 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-205-63-26.compute-1.amazonaws.com
Software
nginx/1.15.8 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=15768000; preload
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

Date
Sun, 12 Jan 2020 12:47:50 GMT
strict-transport-security
max-age=15768000; preload
x-content-type-options
nosniff
Server
nginx/1.15.8
x-download-options
noopen
x-frame-options
DENY
Content-Type
image/gif
access-control-allow-origin
https://arstechnica.com
access-control-expose-headers
WWW-Authenticate,Server-Authorization
cache-control
no-cache
access-control-allow-credentials
true
Connection
keep-alive
vary
origin
x-xss-protection
1; mode=block
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=9&q=3&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=-&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=7&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=600&w=300&rm=1&fy=1062.5&gp=370&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=260371661276&rx=105197337572&cu=1578833253558&m=17406&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=370&lb=4745&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=15025&an=10173&gi=1&gf=15025&gg=10173&ix=15025&ic=15025&ez=1&ck=1124&kw=1003&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15025&bx=10173&ci=1124&jz=1003&dj=1&im=1&in=1&pd=1&nb=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=1%3A1%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14906&cd=10054&ah=14906&am=10054&rf=0&re=1&ft=5021&fv=5021&fw=2510&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=794632118&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:50 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:50 GMT
track
capture.condenastdigital.com/
48 B
48 B
Image
General
Full URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A51.197Z&_t=timespent&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=b333ce65-2933-4001-9193-feb32e71d00a&uNw=1&uUq=1&pID=f26dc4d6-e240-4631-b3c6-bfc4d2f3a016&uDt=desktop&dim1=v1.0.25_iframe_query&_o=ars-technica&_c=general&xID=de355ab6-defb-4438-be47-f183a6629537&_v=5000&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.173.157.53 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-173-157-53.compute-1.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Sun, 12 Jan 2020 12:47:51 GMT
Connection
keep-alive
Content-Length
48
Content-Type
image/gif
pixel.gif
px.moatads.com/
43 B
409 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=25&q=2&hp=1&wf=1&kq=1&lo=1&uk=null&pk=1&wk=1&rk=1&tk=1&ak=https%3A%2F%2Ftpc.googlesyndication.com%2Fsafeframe%2F1-0-37%2Fhtml%2Fcontainer.html&i=CONDENAST_PREBID_HEADER1&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8CL6k%24)m3*%5B%605*mF%40%23b%3DhjdbEW%3C7bNC%3ElaKc%2C%26WLRax%269RHrOCFxBoocF)uhFAkD%3Dv%3Cy%5Dv%5BLy*hgMcpk%3FqFm%5Dm%22%2Bx%7Co%3Ee%7CwR3yC%7CQ%7DGE%3Dh%2CqkG%24xt!9rmPSI.%24ki)sV~1HmDkx2KD5pf5%5BG%5BZFZ8R6tbK0pH%23bU%24(9N%2CNJJ)%2CW%2FKo7FY&qp=00000&is=hBBnjB7GsBpBBBPY2CEBsCybBqw776Kqi7gBooCvBOCiCOB6sCqGBgiBBs0fW0glMfcxnBBBkB0BYBny6BsNBmB0ziw7pCr6yC6rO24xXmYyBdfEC2BBBBBjzmBktCP97GBBBGwRmmEBBBBBBBBBBBnaBW35CeFaBBBpx0OFiBBBT5392tavKc5KCdzzFs7nBBBBBBBBRcQyRBBBCpjOBBBBBBBBBTLF6GfC6Jn7O0EYkCBB0IofRfBBPCxB7UBbjtBbBBC0dL9TRhq8K55G96Lo0eIRTzBiqeuSBBBBBB&iv=7&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&confidence=2&pcode=condenastprebidheader987326845656&ql=&qo=0&vf=1&vg=100&bq=11&g=6&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&h=250&w=970&rm=1&fy=307.5&gp=0&gu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&id=1&f=0&j=&t=1578833253558&de=100876776326&rx=105197337572&cu=1578833253558&m=17809&ar=29bb202-clean&iw=81ef8f7&cb=0&ll=2&lm=0&ln=0&gh=1&xx=undefined%3A875484570224&td=1&lk=undefined&lb=4745&le=1&ch=0&vv=1&vw=1%3A0%3A0&vp=100&vx=100%3A-%3A-&as=1&ag=15104&an=10051&gi=1&gf=15104&gg=10051&ix=15104&ic=15104&ez=1&ck=1004&kw=804&aj=1&pg=100&pf=100&ib=0&cc=1&bw=15104&bx=10051&ci=1004&jz=804&dj=1&im=1&in=1&pd=1&nb=1&el=1&em=0&en=0&st=1&su=1&of=1&oz=1&oe=0%3A0%3A0%3Anull%3A-1%3Anull%3A-1%3Anull%3A-1&bu=14906&cd=9853&ah=14906&am=9853&rf=0&re=1&ft=5021&fv=5021&fw=2711&wb=2&cl=0&at=0&d=4660981638%3A2443012271%3A4884048123%3A138273356291&bo=conde.ars&bd=1&gw=condenastprebidheader987326845656&hv=findIframeAds&ab=2&ac=1&fd=1&kt=strict&it=500&fz=1&oq=1&ot=ff&zMoatJS=3%3A-&tc=0&fs=173485&na=791360350&cs=0
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:51 GMT
Last-Modified
Fri, 20 May 2016 15:16:00 GMT
Server
Apache
ETag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
Content-Type
image/gif
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
Expires
Sun, 12 Jan 2020 12:47:51 GMT
bid
c.amazon-adsystem.com/e/dtb/
23 B
370 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pid=JpeLJpY2tbPNa&cb=1&ws=1600x1200&v=7.45.00&t=1000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22300x600%22%5D%2C%22sn%22%3A%22rail%2Fdesktop%22%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%7D&cfgv=0&gdpre=1&gdprc=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA&gdprl=%7B%22status%22%3A%22cmp-success%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.242 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-242.fra50.r.cloudfront.net
Software
Server /
Resource Hash
89b4aa9e9bf8516c2ab7b5134f65d47b02071637259a14c9f60dccc207e05ce4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:55 GMT
via
1.1 a09186728c1bcdf0a561aedd92656804.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA50-C1
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
gxNbosD2LmLJqNdz7pjcV_5R4P_fqUfTxWR2cESaL7ep-NXlWlxSPA==
cygnus
as-sec.casalemedia.com/
66 B
478 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A40997178%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A300%2C%22h%22%3A600%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%2234%22%2C%22siteID%22%3A%22375864%22%7D%2C%22id%22%3A%221%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%2254be3cce-66e0-4c9d-b6f2-35ccef539c2a%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222020-01-12T12%3A47%3A33%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
39ee887394d9d34d11adfbd93e2f879ce63afc865024e4c88a3e36860e0b046c

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:55 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Sun, 12 Jan 2020 12:47:55 GMT
fastlane.json
fastlane.rubiconproject.com/a/api/
241 B
724 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=10&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.04580457505616842&gdpr=1&gdpr_consent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
4fe19ab38fe16a6d0ae762229ae786311080c4c019de1b62fcb311583962e1b6

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:55 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=154
Content-Length
241
Expires
Wed, 17 Sep 1975 21:32:10 GMT
ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:55 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:55 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=79&profileId=154&cb=90760165953
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Sun, 12 Jan 2020 12:47:54 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
bid
c.amazon-adsystem.com/e/dtb/
23 B
370 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3035&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&pid=nA8AvgwztTbCR&cb=2&ws=1600x1200&v=7.45.00&t=1000&slots=%5B%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22970x250%22%5D%2C%22sn%22%3A%22hero%2Fdesktop%22%7D%5D&pj=%7B%22si_section%22%3A%22information-technology%22%7D&cfgv=0&gdpre=1&gdprc=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA&gdprl=%7B%22status%22%3A%22cmp-success%22%7D
Requested by
Host: c.amazon-adsystem.com
URL: https://c.amazon-adsystem.com/aax2/apstag.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.90.242 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-90-242.fra50.r.cloudfront.net
Software
Server /
Resource Hash
5d7c7d25a0da74c0dd466120c3c09bd94cb982fc66ebc4a78675339f37323bf5

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:55 GMT
via
1.1 a09186728c1bcdf0a561aedd92656804.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
FRA50-C1
status
200
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://arstechnica.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
l0EwSHrKCSQw5zqEeU6ffXiSt6O0cMWZjV-Qu7JbzPamaD20LZplcw==
fastlane.json
fastlane.rubiconproject.com/a/api/
241 B
724 B
XHR
General
Full URL
https://fastlane.rubiconproject.com/a/api/fastlane.json?account_id=11850&size_id=57&p_pos=btf&rp_floor=0.01&rf=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&p_screen_res=1600x1200&site_id=217438&zone_id=1070068&kw=rp.fastlane&tk_flint=index&rand=0.3818951952205707&gdpr=1&gdpr_consent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_128_GCM
Server
69.173.144.143 Frankfurt am Main, Germany, ASN26667 (RUBICONPROJECT - The Rubicon Project, Inc., US),
Reverse DNS
Software
RAS 2.4 /
Resource Hash
fb5653f2672f6db1bbdc53ec75f9b9af9284dec39c2cf3f4b31dfcbbfc28b6b8

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:55 GMT
Server
RAS 2.4
Vary
Accept-Encoding
P3P
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Access-Control-Allow-Credentials
true
Connection
Keep-Alive
Content-Type
application/json
Keep-Alive
timeout=5, max=462
Content-Length
241
Expires
Wed, 17 Sep 1975 21:32:10 GMT
cygnus
as-sec.casalemedia.com/
66 B
478 B
XHR
General
Full URL
https://as-sec.casalemedia.com/cygnus?v=7.2&s=321388&fn=headertag.IndexExchangeHtb.adResponseCallback&r=%7B%22id%22%3A74417024%2C%22site%22%3A%7B%22page%22%3A%22https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial%22%7D%2C%22imp%22%3A%5B%7B%22banner%22%3A%7B%22w%22%3A970%2C%22h%22%3A250%2C%22topframe%22%3A1%7D%2C%22ext%22%3A%7B%22sid%22%3A%229%22%2C%22siteID%22%3A%22375848%22%7D%2C%22id%22%3A%221%22%7D%5D%2C%22ext%22%3A%7B%22source%22%3A%22ixwrapper%22%7D%2C%22user%22%3A%7B%22eids%22%3A%5B%7B%22source%22%3A%22adserver.org%22%2C%22uids%22%3A%5B%7B%22id%22%3A%2254be3cce-66e0-4c9d-b6f2-35ccef539c2a%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID%22%7D%7D%2C%7B%22id%22%3A%22FALSE%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_LOOKUP%22%7D%7D%2C%7B%22id%22%3A%222020-01-12T12%3A47%3A33%22%2C%22ext%22%3A%7B%22rtiPartner%22%3A%22TDID_CREATED_AT%22%7D%7D%5D%7D%5D%2C%22ext%22%3A%7B%22consent%22%3A%22BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA%22%7D%7D%2C%22regs%22%3A%7B%22ext%22%3A%7B%22gdpr%22%3A1%7D%7D%7D
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
32b51c5dab34097e39e33ad027f1a96439e7d78e071af0f817d9d6570b454915

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:55 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
text/javascript
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
86
Expires
Sun, 12 Jan 2020 12:47:55 GMT
ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_Nuzv...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;eucon...
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks....
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:55 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:55 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
cdb
bidder.criteo.com/
0
145 B
XHR
General
Full URL
https://bidder.criteo.com/cdb?ptv=79&profileId=154&cb=57595394174
Requested by
Host: static.criteo.net
URL: https://static.criteo.net/js/ld/publishertag.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
178.250.0.165 , France, ASN44788 (ASN-CRITEO-EUROPE, FR),
Reverse DNS
Software
Finatra /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
204
date
Sun, 12 Jan 2020 12:47:54 GMT
access-control-allow-credentials
true
server
Finatra
access-control-allow-origin
https://arstechnica.com
timing-allow-origin
*
vary
Origin
ADTECH;apid=1Ac134dd18-3539-11ea-af36-12bf237d14d4;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;apid=1Ac134dd18-3539-11ea-af36-12bf237d14d4;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;apid=1Ac134dd18-3539-11ea-af36-12bf237d14d4;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:55 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;apid=1Ac134dd18-3539-11ea-af36-12bf237d14d4;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:55 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;apid=1Ac134dd18-3539-11ea-af36-12bf237d14d4;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ac10b4a52-3539-11ea-b33a-12a8bb4804a8;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/
Redirect Chain
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks....
  • https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;apid=1Ac10b4a52-3539-11ea-b33a-12a8bb4804a8;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=...
0
-1 B
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;apid=1Ac10b4a52-3539-11ea-b33a-12a8bb4804a8;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:55 GMT
server
nginx
access-control-allow-origin
https://arstechnica.com
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;apid=1Ac10b4a52-3539-11ea-b33a-12a8bb4804a8;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
302
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:55 GMT
server
nginx
status
302
location
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;apid=1Ac10b4a52-3539-11ea-b33a-12a8bb4804a8;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ac10b4a52-3539-11ea-b33a-12a8bb4804a8;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090755/0/-1/ADTECH;apid=1Ac10b4a52-3539-11ea-b33a-12a8bb4804a8;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275210;callback=window.headertag.AolHtb.adResponseCallbacks._BCl3R2VA;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
d4a0214af63389676942d8f30445684adcba5ab0d08c9eea1d5295d1d21e0064

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:56 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1750
expires
Mon, 15 Jun 1998 00:00:00 GMT
ADTECH;apid=1Ac134dd18-3539-11ea-af36-12bf237d14d4;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtD...
adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/
2 KB
2 KB
XHR
General
Full URL
https://adserver-us.adtech.advertising.com/pubapi/3.0/10920.1/5090762/0/-1/ADTECH;apid=1Ac134dd18-3539-11ea-af36-12bf237d14d4;cfp=1;rndc=1578833275;cmd=bid;cors=yes;v=2;misc=1578833275198;callback=window.headertag.AolHtb.adResponseCallbacks._elK4OuHU;gdpr=1;euconsent=BOtDtYJOtDtYJAcABBDEC2AAAAAtFrv_f_73_8_uXf9_NuzvOv_j_ef93VW8brYvcAvzhY9d_u_Uzxc4m_0vRc9ycgx85cprGsoxQ7KasG-VGgd_bt__3ziX9ohP6wkcprz33bEw-KgAAAAAAAAAAA
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.22.24 , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
4857a05ad0ca331f1942b5328a8c9349dff62aa093b7a39d030958ef4eb6f686

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Sun, 12 Jan 2020 12:47:56 GMT
server
Adtech Adserver
status
200
access-control-allow-methods
POST,GET,HEAD,OPTIONS
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
access-control-allow-origin
https://arstechnica.com
cache-control
no-store, no-cache
access-control-allow-credentials
true
content-type
text/javascript
content-length
1750
expires
Mon, 15 Jun 1998 00:00:00 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:56 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Sun, 12 Jan 2020 12:47:56 GMT
headerstats
as-sec.casalemedia.com/
0
339 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=321388&u=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&v=3
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183973-1558632223658.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.210.249.164 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-249-164.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Sun, 12 Jan 2020 12:47:56 GMT
Server
Apache
Content-Type
text/plain
Access-Control-Allow-Origin
https://arstechnica.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Sun, 12 Jan 2020 12:47:56 GMT
ads
securepubads.g.doubleclick.net/gampad/
23 KB
7 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=313297302630897&correlator=959187204198244&output=ldjh&impl=fifs&adsid=NT&eid=21065354%2C21064550&vrg=2019121002&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200112&iu_parts=3379%2Cconde.ars%2Chero%2Cinformation-technology%2Carticle%2C1%2Crail&enc_prev_ius=0%2F1%2F2%2F3%2F4%2F5%2C0%2F1%2F6%2F3%2F4%2F5&prev_iu_szs=970x250%2C300x600&rcs=1%2C1&prevtoss=19_20&prev_scp=pos%3Dhero%26ctx_slot_type%3Dpost_nav%26ctx_slot_rn%3D1%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dpost_nav_0%7Cpos%3Drail%26ctx_slot_type%3Dsiderail%26ctx_slot_rn%3D1%26m_mv%3DslotNoHistData%26m_gv%3DslotNoHistData%26amznbid%3D2%26amznp%3D2%26pos_instance%3D1%26ctx_slot_instance%3D0%26ctx_slot_name%3Dsiderail_0&eri=1&cust_params=m_data%3D1%26m_safety%3Dsafe%26m_categories%3Dmoat_safe%26m_mv%3DnoHistData%26m_gv%3DnoHistData%26env_device_type%3Ddesktop%26ctx_template%3Darticle%26ctx_page_channel%3Dinformation-technology%26env_server%3Dproduction%26ctx_cns_version%3D6.31.8%26ctx_page_slug%3Diranian-hackers-have-been-password-spraying-the-us-grid%26cnt_tags%3Diran%252Cmagnallium%252Cutilities%26cnt_platform%3Dwordpress%26cnt_copilotid%3D%26vnd_4d_cached%3D0%26vnd_4d_ctx_topics%3D%26vnd_4d_ctx_entities%3D%26vnd_4d_ctx_keywords%3D%26vnd_4d_usr_topics%3D%26vnd_prx_segments%3D300003%252C112200%252C121100%252C131100%252C112216%252C210000%252C210012%252C240000%252C240002%252C240003%252C240004%252C240001%252C240005%252C240006%252C240007%252C240008%252C240009%252C240011%252C240012%252C240013%252C240014%252C240017%252C240015%252C240016%252Cqx7745%252Cwmhp4i%252Cdcxr0c%252C2hkgm5%252Cap05we%252Cfdf1wd%252C65f9pd%252Cuas8ja%252C_He7NG7ZboLn_&cookie_enabled=1&bc=31&abxe=1&lmt=1578833276&dt=1578833276244&dlt=1578833253134&idt=543&frm=20&biw=1585&bih=1200&oid=3&adxs=308%2C1063&adys=0%2C370&adks=1644569416%2C1251128775&ucis=5%7C6&ifi=5&u_tz=60&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F%3Futm_brand%3Darstechnica%26utm_source%3Dtwitter%26utm_social-type%3Downed%26utm_medium%3Dsocial&dssz=47&icsg=140782585511936&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=1585x90%7C300x250&msz=1585x-1%7C300x-1&ga_vid=1006128056.1578833254&ga_sid=1578833254&ga_hid=471057445&fws=4%2C516&ohw=1585%2C300
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.210.2 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s07-in-f2.1e100.net
Software
cafe /
Resource Hash
72870f1bdfb3b1f9507ee23353cf22e446a29ee555ec3bb24ccf0c7ac0731b9a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
Origin
https://arstechnica.com

Response headers

date
Sun, 12 Jan 2020 12:47:56 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
6608
x-xss-protection
0
google-lineitem-id
5261083409,5199899035
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
138299373273,138291344651
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://arstechnica.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame E42A
0
0

window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200108/r20110914/client/ Frame E42A
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200108/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:05:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
333724
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1233
x-xss-protection
0
server
cafe
etag
5112019540083599776
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 22 Jan 2020 16:05:52 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame E42A
74 KB
0
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578659119029161"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28349
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:56 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame E42A
296 KB
0
Script
General
Full URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
23.210.250.213 , Netherlands, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-250-213.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 12 Jan 2020 12:47:56 GMT
Content-Encoding
gzip
Last-Modified
Fri, 10 Jan 2020 16:11:57 GMT
Server
AmazonS3
x-amz-request-id
4447554FBF6531FE
ETag
"497a3e560b6e918fde1d611b0c060cf8"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=21668
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
101078
x-amz-id-2
dxIfef6FAjTB2rC8aZkd7v/1jMXYGecuZVhE0FON22Q7mHWiUPwy0Ca2ilSbBN3G+FNTkZZVMRA=
13802164650470484383
tpc.googlesyndication.com/simgad/ Frame E42A
140 KB
140 KB
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13802164650470484383
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 02 Jan 2020 20:21:37 GMT
x-content-type-options
nosniff
age
836779
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
142877
x-xss-protection
0
last-modified
Thu, 02 Jan 2020 20:07:10 GMT
server
sffe
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 01 Jan 2021 20:21:37 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame B18C
0
0

window_focus_fy2019.js
tpc.googlesyndication.com/pagead/js/r20200108/r20110914/client/ Frame B18C
3 KB
1 KB
Script
General
Full URL
https://tpc.googlesyndication.com/pagead/js/r20200108/r20110914/client/window_focus_fy2019.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Wed, 08 Jan 2020 16:05:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
333724
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
1233
x-xss-protection
0
server
cafe
etag
5112019540083599776
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=1209600
timing-allow-origin
*
expires
Wed, 22 Jan 2020 16:05:52 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame B18C
74 KB
0
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Sun, 12 Jan 2020 12:47:56 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1578659119029161"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
28349
x-xss-protection
0
expires
Sun, 12 Jan 2020 12:47:56 GMT
moatad.js
z.moatads.com/condenastdfp9588492144/ Frame B18C
0
0

13007471370533844857
tpc.googlesyndication.com/simgad/ Frame B18C
64 KB
0
Image
General
Full URL
https://tpc.googlesyndication.com/simgad/13007471370533844857
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2019121002.js?21065354
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:819::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Fri, 10 Jan 2020 01:27:01 GMT
x-content-type-options
nosniff
age
213655
x-dns-prefetch-control
off
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
270251
x-xss-protection
0
last-modified
Fri, 18 Oct 2019 16:06:44 GMT
server
sffe
content-type
image/gif
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 09 Jan 2021 01:27:01 GMT
pixel.gif
px.moatads.com/
0
0

track
capture.condenastdigital.com/
0
0

track
capture.condenastdigital.com/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
securepubads.g.doubleclick.net
URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvNPu4asZA47_7Kb272iKnelXyBV8BfCxKxxN9-H2XV618tOFtzAXo170BMevJ5ZT93W6j3ni3Y7uuJ-f7mfrXB1ItWBs6GU0PAFEtuLDHMUBWaumfRqanremyvnKx1M1Efj40Ajvj3gBLUA0YeBZlzN55wFtUBeCwUvsVLNt-UykecjQ1vpHwLjKHesRLQ4ljmxKvg7dpwGRJE9otc4suazWRhHIkH2BvWj1PVa-nAHe5LFXf8Q40HuaFqnFWo4lnEGXvI0H5EoZogmSPkyukfnOfAwpHGz5ETtYtX9BlkR1F6Rw&sai=AMfl-YTCbHSHo7fFfjdSaj1zXb5NSR1vTpWbCL53Jlv1OzUds7CENt2tATUuyDNeO0e_WDgS0r4TUMgG6nvxvU8h8b4TuHT9cKqkopS3uIVk&sig=Cg0ArKJSzCcRq0qFMUmREAE&adurl=
Domain
securepubads.g.doubleclick.net
URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssl6LRWB7CGSDEXDyaRuySObfadZepk3Uf3GJT_LhBB1z1cWyyqnXodHKlVcZ9OuAKdrTKrHfiZu5d-Q7wcRSu9ZjiRS-0hKgff_lcAVg8fTSahkx_h8JL7W1qOZmmpGpo2OGP6_Szv8IreEzdsGjhrxZ2tE1dlAMntPSVWnudxD7qY1MhpuMzO9aEsp1yTsEcraM4BX86Hq78cfKsr2L5qWURL6Qi_tx8scceBSkNyRJW3GrX_ATrn2AZnNmuq_vAsGlLsIjSLgXBzo6Wb2R1SkDXT7mjc2T9InqyYuRwcD44sHg&sai=AMfl-YQNxU74c_tBdHjDmhi_CEET65iMZaNXC3q1I5FX2p5JDhVnCcn3xTcbxl7kkeVmT8AL-ZiF2PyVXphJFKkU5HTuBNwKyR-bPC_Io4h-&sig=Cg0ArKJSzARfevp91KCqEAE&adurl=
Domain
z.moatads.com
URL
https://z.moatads.com/condenastdfp9588492144/moatad.js
Domain
px.moatads.com
URL
https://px.moatads.com/pixel.gif?e=43&t=1578833253558&de=17136225344&d=CONDENAST_PREBID_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=29bb202-clean&iw=81ef8f7&zMoatDfpSlotId=post_nav_0&zMoatRendered=5&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=5&zMoatPageDataTargetingSet=5&zMoatSafetyTargetingSet=5&zMoatEmptySlot=2&zMoatNadoDataLoadTime=322&zMoatAllDataLoadTime=322&bo=arstechnica.com&bd=arstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&ac=1&bq=11&f=0&zn=0&if=322&na=1813159492&cs=0
Domain
capture.condenastdigital.com
URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A56.664Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e625bf48-b52c-4da0-8e56-5b74145d6135&uNw=1&uUq=1&pID=1f603be2-9135-4239-87a7-61abac9cd1a6&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=de355ab6-defb-4438-be47-f183a6629537&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Fhero%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4811219922%2C%22campaignId%22%3A2644550089%2C%22creativeId%22%3A138299373273%2C%22elementId%22%3A%22post_nav_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Atrue%2C%22isFirstImpressionViewable%22%3Afalse%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Atrue%2C%22isFirstMoneyImpressionViewable%22%3Afalse%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Atrue%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5261083409%2C%22name%22%3A%22post_nav_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%221%22%2C%22sizes%22%3A%22970x250%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833276664%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22hero%22%5D%2C%22ctx_slot_type%22%3A%5B%22post_nav%22%5D%2C%22ctx_slot_rn%22%3A%5B%221%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22post_nav_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability
Domain
capture.condenastdigital.com
URL
https://capture.condenastdigital.com/track?_ts=2020-01-12T12%3A47%3A56.670Z&_t=slot_rendered&cBr=Ars%20Technica&cKe=Iran%7CMagnallium%7Cutilities&cCh=information%20technology&cTi=Iranian%20hackers%20have%20been%20%E2%80%9Cpassword%20spraying%E2%80%9D%20the%20US%20grid&cTy=article%7Creport&cTp=ALLBRANDS_70%2C%20ALLBRANDS_7%2C%20ALLBRANDS_63%2C%20ALLBRANDS_38%2C%20ALLBRANDS_31%2C%20ALLBRANDS_283%2C%20ALLBRANDS_274%2C%20ALLBRANDS_258%2C%20ALLBRANDS_167%2C%20ALLBRANDS_134%2C%20ALLBRANDS_88%2C%20ALLBRANDS_34%2C%20ALLBRANDS_282%2C%20ALLBRANDS_27%2C%20ALLBRANDS_221%2C%20ALLBRANDS_210%2C%20ALLBRANDS_182%2C%20ALLBRANDS_162&cTpw=0.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.34522987132419053%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677%2C%200.14299876326468677&cEnt=dragos%2C%20iranian%2C%20us%2C%20hacker%2C%20iran%2C%20page%20layout%2C%20magnallium%2C%20vpn%2C%20password%2C%20andy%20greenberg%2C%20blackout%2C%20electric%20grid%2C%20general%20qasem%20soleimani%2C%20parisite%2C%20wired.com%2C%20microsoft%2C%20industrial%20control%20system%2C%20lee%2C%20joe%20slowik%2C%20john%20hultquist&cEnw=1%2C%200.9948814740636635%2C%200.993834808488321%2C%200.867972460651954%2C%200.797578388434278%2C%200.6757588854164678%2C%200.6721388482679548%2C%200.5932158592747869%2C%200.5599606313111571%2C%200.5463281960338536%2C%200.5446415036461565%2C%200.5218636787380018%2C%200.508151505482784%2C%200.49947373170459813%2C%200.48667455412573274%2C%200.4864466489493094%2C%200.4853001682566736%2C%200.4477203657351927%2C%200.4451035055823759%2C%200.39094876976574355&cCu=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&cCl=1054&cId=1642389&cPd=2020-01-12T12%3A05%3A31.000%2B00%3A00&ccS=web&cPv=all&pHr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid&pRt=referral&pHp=%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pRr=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2020%2F01%2Firanian-hackers-have-been-password-spraying-the-us-grid%2F&pWw=1600&pWh=1200&pPw=1600&pPh=4700&pSw=1600&pSh=1200&uID=e625bf48-b52c-4da0-8e56-5b74145d6135&pID=1f603be2-9135-4239-87a7-61abac9cd1a6&uDt=desktop&dim1=%7B%22channel%22%3A%22information-technology%22%2C%22device%22%3A%22desktop%22%2C%22server%22%3A%22production%22%2C%22template%22%3A%22article%22%2C%22version%22%3A%226.31.8%22%7D&_o=ars-technica&_c=cns_ads&xID=de355ab6-defb-4438-be47-f183a6629537&dim2=%7B%22adUnitPath%22%3A%223379%2Fconde.ars%2Frail%2Finformation-technology%2Farticle%2F1%22%2C%22advertiserId%22%3A4552798968%2C%22campaignId%22%3A2615518737%2C%22creativeId%22%3A138291344651%2C%22elementId%22%3A%22siderail_0%22%2C%22instance%22%3A%220%22%2C%22isBackfill%22%3Afalse%2C%22isEmpty%22%3Afalse%2C%22isFirstImpression%22%3Afalse%2C%22isFirstImpressionViewable%22%3Atrue%2C%22isFirstRequested%22%3Afalse%2C%22isFirstMoneyImpression%22%3Afalse%2C%22isFirstMoneyImpressionViewable%22%3Atrue%2C%22isFirstMoneyRequested%22%3Afalse%2C%22isRefresh%22%3Atrue%2C%22keywords%22%3A%7B%22tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cm%22%3A%5B%5D%2C%22platform%22%3A%5B%22wordpress%22%5D%2C%22copilotid%22%3A%22%22%7D%2C%22lineItemId%22%3A5199899035%2C%22name%22%3A%22siderail_0%22%2C%22outOfPage%22%3Afalse%2C%22requestNumber%22%3A%221%22%2C%22sizes%22%3A%22300x600%22%2C%22slug%22%3A%22iranian-hackers-have-been-password-spraying-the-us-grid%22%7D&dim3=%7B%22footerStart%22%3A1578833253242%2C%22headerStart%22%3A1578833253222%2C%22navigationStart%22%3A1578833252700%2C%22pubAdsReady%22%3A1578833253684%2C%22injected%22%3A1578833276670%2C%22viewable%22%3A%22%22%2C%22viewport%22%3A%22%22%2C%22impression%22%3A%22%22%7D&dim4=%7B%22pos%22%3A%5B%22rail%22%5D%2C%22ctx_slot_type%22%3A%5B%22siderail%22%5D%2C%22ctx_slot_rn%22%3A%5B%221%22%5D%2C%22m_mv%22%3A%5B%22noHistData%22%5D%2C%22m_gv%22%3A%5B%22noHistData%22%5D%2C%22amznbid%22%3A%5B%222%22%5D%2C%22amznp%22%3A%5B%222%22%5D%2C%22pos_instance%22%3A%5B%221%22%5D%2C%22ctx_slot_instance%22%3A%5B%220%22%5D%2C%22ctx_slot_name%22%3A%5B%22siderail_0%22%5D%2C%22m_data%22%3A%5B%221%22%5D%2C%22m_safety%22%3A%5B%22safe%22%5D%2C%22m_categories%22%3A%5B%22moat_safe%22%5D%2C%22env_device_type%22%3A%5B%22desktop%22%5D%2C%22ctx_template%22%3A%5B%22article%22%5D%2C%22ctx_page_channel%22%3A%5B%22information-technology%22%5D%2C%22env_server%22%3A%5B%22production%22%5D%2C%22ctx_cns_version%22%3A%5B%226.31.8%22%5D%2C%22ctx_page_slug%22%3A%5B%22iranian-hackers-have-been-password-spraying-the-us-grid%22%5D%2C%22cnt_tags%22%3A%5B%22iran%22%2C%22magnallium%22%2C%22utilities%22%5D%2C%22cnt_platform%22%3A%5B%22wordpress%22%5D%2C%22cnt_copilotid%22%3A%5B%22%22%5D%2C%22vnd_4d_cached%22%3A%5B%220%22%5D%2C%22vnd_4d_ctx_topics%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_entities%22%3A%5B%22%22%5D%2C%22vnd_4d_ctx_keywords%22%3A%5B%22%22%5D%2C%22vnd_4d_usr_topics%22%3A%5B%22%22%5D%2C%22vnd_prx_segments%22%3A%5B%22300003%22%2C%22112200%22%2C%22121100%22%2C%22131100%22%2C%22112216%22%2C%22210000%22%2C%22210012%22%2C%22240000%22%2C%22240002%22%2C%22240003%22%2C%22240004%22%2C%22240001%22%2C%22240005%22%2C%22240006%22%2C%22240007%22%2C%22240008%22%2C%22240009%22%2C%22240011%22%2C%22240012%22%2C%22240013%22%2C%22240014%22%2C%22240017%22%2C%22240015%22%2C%22240016%22%2C%22qx7745%22%2C%22wmhp4i%22%2C%22dcxr0c%22%2C%222hkgm5%22%2C%22ap05we%22%2C%22fdf1wd%22%2C%2265f9pd%22%2C%22uas8ja%22%2C%22_He7NG7ZboLn_%22%5D%7D&cKh=dragos%2Ciranian%2Cus%2Chacker%2Ciran%2Celectric%20utility%2Cpage%20layout%2Cmagnallium%2Cstate-sponsored%20group%2Cvulnerability

Verdicts & Comments Add Verdict or Comment

140 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| ars object| dataLayer object| googletag object| cns object| sparrowQueue object| cnBus function| moatYieldReady object| _perfRefForUserTimingPolyfill object| __core-js_shared__ object| core object| fastdom object| BOOMR_mq object| regeneratorRuntime object| apstag object| headertag object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken boolean| apstagLOADED object| Twig object| Arrive function| FPCountdown function| $ function| jQuery function| moment function| UAParser function| purl function| twig function| EvEmitter function| imagesLoaded function| easydropdown function| m function| transitionEnd string| $queryString function| arsVideoModulePlayerReady92926620 object| CN object| __SKIM_JS_GLOBAL__ object| skimlinksAPI object| _cne function| __cmp object| PolarConde object| NATIVEADS object| NATIVEADS_QUEUE object| Criteo function| headertag_render object| rubicontag object| google_tag_manager function| postscribe object| ActionButton string| hash undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| pxSrc undefined| px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_2684051 object| Moat#PML#26#1.2 boolean| Moat#EVA object| moatPrebidApi boolean| include string| referrer object| urlParams string| queryString string| fullUrl string| myParam string| GoogleAnalyticsObject function| ga string| b object| h function| getVisitNumCustom number| d number| google_srt undefined| google_measure_js_timing boolean| google_noFetch number| __google_ad_urls_id function| gotSegmentData number| google_unique_id object| gaGlobal object| PARSELY object| SparrowConfigV2 object| criteo_pubtag object| NATIVEADS_STORE object| OneTrustStub string| OnetrustActiveGroups string| OptanonActiveGroups function| OptanonWrapper object| google_tag_data object| gaplugins object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater boolean| ab_isEventListenerAddedForWidgetVisible_action-button-react-iframe function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| __google_ad_urls object| SparrowCache function| Sparrow boolean| sparrowInitialize object| _4d object| sparrow object| gaData object| otStubData object| _google_rum_ns_ object| google_persistent_state_async number| google_global_correlator object| closure_lm_653993 object| google function| jsonFeed object| Optanon object| OneTrust object| closure_lm_87414 object| otIabModule object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired undefined| ad function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| google_image_requests function| arrive function| unbindArrive function| leave function| unbindLeave

8 Cookies

Domain/Path Name / Value
tpc.googlesyndication.com/ Name: kxcongstar_data
Value: user%3Ausxin65cs%3B_user%3A1594385262114%3Bkuid%3ANKUDGKJK%3B_kuid%3A1594385262114%3Bvisits%3A1%3B_visits%3A1578870000000
arstechnica.com/ Name: GED_PLAYLIST_ACTIVITY
Value: W3sidSI6IjZFYkoiLCJ0c2wiOjE1Nzg4MzMyNjUsIm52IjowLCJ1cHQiOjE1Nzg4MzMyNTQsImx0IjoxNTc4ODMzMjU0fV0.
.arstechnica.com/ Name: _parsely_visitor
Value: {%22id%22:%2248b94179-2cb0-42ef-b6b1-0ff8dc81984c%22%2C%22session_count%22:1%2C%22last_session_ts%22:1578833265161}
.arstechnica.com/ Name: sID
Value: 28682060-7f55-4ada-8506-f29614aa374e
arstechnica.com/ Name: pID
Value: 363dcbf1-3365-4a2b-b3e3-4cbcf2e2a5ce
arstechnica.com/ Name: CN_su
Value: 48617b65-cd35-4706-b6fe-b968b7a2d1ea
.arstechnica.com/ Name: _parsely_session
Value: {%22sid%22:1%2C%22surl%22:%22https://arstechnica.com/information-technology/2020/01/iranian-hackers-have-been-password-spraying-the-us-grid/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social%22%2C%22sref%22:%22%22%2C%22sts%22:1578833265161%2C%22slts%22:0}
arstechnica.com/ Name: CN_sp
Value: c6baa932-7957-4dc5-b407-7d4affd1f2d7

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src https: data: 'unsafe-inline' 'unsafe-eval'; child-src https: data: blob:; connect-src https: data: blob:; font-src https: data:; img-src https: data:; media-src blob: data: https:; object-src https:; script-src https: data: blob: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline'; block-all-mixed-content; upgrade-insecure-requests
Strict-Transport-Security max-age=300
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

4d.condenastdigital.com
adserver-us.adtech.advertising.com
adservice.google.com
adservice.google.de
ampcid.google.com
ampcid.google.de
an.facebook.com
api.cnevids.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
arstechnica.com
as-sec.casalemedia.com
bidder.criteo.com
c.amazon-adsystem.com
capture.condenastdigital.com
cdn.arstechnica.net
cdn.cookielaw.org
cdn.mediavoice.com
connect.facebook.net
d1z2jf7jlzjs58.cloudfront.net
d2c8v52ll5s99u.cloudfront.net
dp8hsntg6do36.cloudfront.net
dwgyu36up6iuz.cloudfront.net
embed.actionbutton.co
fastlane.rubiconproject.com
geolocation.onetrust.com
images.outbrainimg.com
imasdk.googleapis.com
infinityid.condenastdigital.com
js-sec.indexww.com
log.outbrainimg.com
match.adsrvr.org
mb.moatads.com
mcdp-nydc1.outbrain.com
mid.rkdms.com
odb.outbrain.com
p.skimresources.com
pagead2.googlesyndication.com
pixel.condenastdigital.com
player.cnevids.com
plugin.mediavoice.com
polarcdn-terrax.com
prod-native.actionbutton.co
pubads.g.doubleclick.net
px.moatads.com
r.skimresources.com
s.skimresources.com
s0.2mdn.net
securepubads.g.doubleclick.net
segment-data.zqtk.net
srv-2020-01-12-12.config.parsely.com
srv-2020-01-12-12.pixel.parsely.com
static.criteo.net
stats.g.doubleclick.net
t.skimresources.com
tcheck.outbrainimg.com
tpc.googlesyndication.com
widgets.outbrain.com
wren.condenastdigital.com
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
z.moatads.com
capture.condenastdigital.com
px.moatads.com
securepubads.g.doubleclick.net
z.moatads.com
13.224.197.104
13.224.197.33
13.225.78.108
13.225.78.8
143.204.101.13
143.204.101.55
143.204.90.242
143.204.98.73
151.101.112.239
151.101.14.2
151.139.128.10
152.195.132.202
152.199.22.24
178.250.0.165
178.250.2.130
205.234.175.175
216.58.210.2
23.210.249.164
23.210.250.213
23.210.250.44
2600:9000:2156:9200:11:8cf6:b500:93a1
2606:4700:10::6814:b844
2606:4700::6811:4132
2606:4700::6813:da83
2a00:1450:4001:800::2006
2a00:1450:4001:800::200e
2a00:1450:4001:808::200e
2a00:1450:4001:809::2002
2a00:1450:4001:809::200e
2a00:1450:4001:80b::2002
2a00:1450:4001:819::2001
2a00:1450:4001:81a::2003
2a00:1450:4001:81b::200a
2a00:1450:4001:81c::2004
2a00:1450:4001:821::2008
2a00:1450:400c:c00::9d
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f02d:e:face:b00c:0:2
3.10.124.206
34.231.252.38
35.173.145.106
35.190.40.172
35.190.59.101
35.201.67.47
35.244.174.68
50.31.169.131
52.205.63.26
52.4.170.229
52.45.226.131
52.6.38.26
54.154.203.64
54.173.157.53
54.76.0.5
64.202.112.95
69.173.144.143
95.100.198.32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