URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Submission: On April 24 via api from US

Summary

This website contacted 25 IPs in 7 countries across 23 domains to perform 157 HTTP transactions. The main IP is 2606:4700:20::6818:1359, located in United States and belongs to CLOUDFLARENET, US. The main domain is appleinsider.com.
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on March 19th 2020. Valid for: 7 months.
This is the only time appleinsider.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
64 2606:4700:20:... 13335 (CLOUDFLAR...)
23 2a00:1450:400... 15169 (GOOGLE)
1 143.204.94.29 16509 (AMAZON-02)
2 199.232.53.140 54113 (FASTLY)
11 172.217.22.34 15169 (GOOGLE)
1 23.8.13.110 20940 (AKAMAI-ASN1)
2 3 152.199.21.35 15133 (EDGECAST)
2 2 2606:2800:233... 15133 (EDGECAST)
1 2.16.106.193 20940 (AKAMAI-ASN1)
2 2a00:1450:400... 15169 (GOOGLE)
6 2606:2800:234... 15133 (EDGECAST)
4 2a03:2880:f02... 32934 (FACEBOOK)
2 2a00:1450:400... 15169 (GOOGLE)
12 2a00:1450:400... 15169 (GOOGLE)
2 2606:4700:20:... 13335 (CLOUDFLAR...)
1 205.185.216.10 20446 (HIGHWINDS3)
8 2a00:1450:400... 15169 (GOOGLE)
2 2 108.62.116.116 30633 (LEASEWEB-...)
2 108.62.116.115 30633 (LEASEWEB-...)
4 2a03:2880:f12... 32934 (FACEBOOK)
2 23.77.210.70 20940 (AKAMAI-ASN1)
1 2.18.233.88 16625 (AKAMAI-AS)
1 2606:2800:233... 15133 (EDGECAST)
1 2a02:fa8:8806... 41041 (VCLK-EU-)
3 3 52.59.74.203 16509 (AMAZON-02)
3 5 18.156.0.31 16509 (AMAZON-02)
1 1 2a00:1288:110... 34010 (YAHOO-IRD)
1 1 91.228.74.217 27281 (QUANTCAST)
2 52.49.118.177 16509 (AMAZON-02)
1 1 104.244.42.8 13414 (TWITTER)
1 1 54.246.153.43 16509 (AMAZON-02)
157 25
Apex Domain
Subdomains
Transfer
66 appleinsider.com
appleinsider.com
photos5.appleinsider.com
forums.appleinsider.com
dtnspbid.appleinsider.com Failed
428 KB
24 googlesyndication.com
pagead2.googlesyndication.com
tpc.googlesyndication.com
182 KB
17 doubleclick.net
securepubads.g.doubleclick.net
googleads.g.doubleclick.net
268 KB
8 googletagservices.com
www.googletagservices.com
180 KB
7 twitter.com
platform.twitter.com
syndication.twitter.com
32 KB
6 yahoo.com
ups.analytics.yahoo.com
pr-bh.ybp.yahoo.com
5 KB
5 advertising.com
adserver.adtech.advertising.com
pixel.advertising.com
2 KB
4 facebook.com
www.facebook.com
280 B
4 backbeatmedia.com
bullseye.backbeatmedia.com
adserver1.backbeatmedia.com
2 KB
4 facebook.net
connect.facebook.net
257 KB
4 google.com
apis.google.com
adservice.google.com
68 KB
4 adtechus.com
adserver.adtechus.com
aka-cdn.adtechus.com
2 KB
4 adsrvr.org
js.adsrvr.org
match.adsrvr.org
insight.adsrvr.org
3 KB
3 google.de
adservice.google.de
517 B
2 tribalfusion.com
s.tribalfusion.com
2 KB
2 google-analytics.com
www.google-analytics.com
18 KB
2 redditstatic.com
www.redditstatic.com
651 B
1 quantserve.com
pixel.quantserve.com
843 B
1 dotomi.com
aol-match.dotomi.com
103 B
1 rackcdn.com
cd8ba0b44a15c10065fd-24461f391e20b7336331d5789078af53.ssl.cf1.rackcdn.com
2 KB
1 flashtalking.com
servedby.flashtalking.com
1 pro-market.net
ads.pro-market.net
2 KB
1 exponential.com
tags.expo9.exponential.com
14 KB
157 23
Domain Requested by
60 photos5.appleinsider.com appleinsider.com
securepubads.g.doubleclick.net
pagead2.googlesyndication.com
www.googletagservices.com
photos5.appleinsider.com
12 tpc.googlesyndication.com securepubads.g.doubleclick.net
tpc.googlesyndication.com
12 pagead2.googlesyndication.com appleinsider.com
pagead2.googlesyndication.com
securepubads.g.doubleclick.net
11 securepubads.g.doubleclick.net www.googletagservices.com
securepubads.g.doubleclick.net
appleinsider.com
8 www.googletagservices.com appleinsider.com
securepubads.g.doubleclick.net
6 googleads.g.doubleclick.net pagead2.googlesyndication.com
6 platform.twitter.com appleinsider.com
platform.twitter.com
5 ups.analytics.yahoo.com 3 redirects appleinsider.com
4 www.facebook.com appleinsider.com
connect.facebook.net
4 connect.facebook.net appleinsider.com
connect.facebook.net
3 pixel.advertising.com 3 redirects
3 forums.appleinsider.com appleinsider.com
photos5.appleinsider.com
forums.appleinsider.com
3 adserver.adtechus.com 2 redirects appleinsider.com
3 adservice.google.de www.googletagservices.com
3 appleinsider.com appleinsider.com
photos5.appleinsider.com
2 adservice.google.com www.googletagservices.com
2 match.adsrvr.org adserver.adtechus.com
js.adsrvr.org
2 s.tribalfusion.com tags.expo9.exponential.com
2 adserver1.backbeatmedia.com appleinsider.com
2 bullseye.backbeatmedia.com 2 redirects
2 www.google-analytics.com appleinsider.com
2 apis.google.com appleinsider.com
apis.google.com
2 adserver.adtech.advertising.com 2 redirects
2 www.redditstatic.com appleinsider.com
www.redditstatic.com
1 insight.adsrvr.org 1 redirects
1 syndication.twitter.com 1 redirects
1 pixel.quantserve.com 1 redirects
1 pr-bh.ybp.yahoo.com 1 redirects
1 aol-match.dotomi.com adserver.adtechus.com
1 aka-cdn.adtechus.com adserver.adtechus.com
1 cd8ba0b44a15c10065fd-24461f391e20b7336331d5789078af53.ssl.cf1.rackcdn.com appleinsider.com
1 servedby.flashtalking.com appleinsider.com
1 ads.pro-market.net appleinsider.com
1 tags.expo9.exponential.com appleinsider.com
1 js.adsrvr.org appleinsider.com
0 dtnspbid.appleinsider.com Failed ads.pro-market.net
157 36
Subject Issuer Validity Valid
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-03-19 -
2020-10-09
7 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
www.redditstatic.com
DigiCert SHA2 Secure Server CA
2020-04-06 -
2020-10-03
6 months crt.sh
*.google.de
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
*.expo9.exponential.com
DigiCert Secure Site ECC CA-1
2020-04-07 -
2021-07-07
a year crt.sh
*.adtechus.com
GeoTrust RSA CA 2018
2019-08-07 -
2021-08-07
2 years crt.sh
ads.pro-market.net
Let's Encrypt Authority X3
2020-03-26 -
2020-06-24
3 months crt.sh
*.apis.google.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
*.twimg.com
DigiCert SHA2 High Assurance Server CA
2019-11-12 -
2020-11-18
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2020-04-15 -
2020-07-14
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh
servedby.flashtalking.com
DigiCert SHA2 Secure Server CA
2019-02-08 -
2021-02-11
2 years crt.sh
www.backbeatmedia.com
Go Daddy Secure Certificate Authority - G2
2019-01-23 -
2021-03-24
2 years crt.sh
*.tribalfusion.com
DigiCert SHA2 Secure Server CA
2020-03-25 -
2021-06-24
a year crt.sh
*.ssl.cf1.rackcdn.com
DigiCert SHA2 Secure Server CA
2019-03-20 -
2020-06-18
a year crt.sh
aka-cdn.adtechus.com
DigiCert SHA2 Secure Server CA
2020-04-16 -
2022-05-17
2 years crt.sh
*.dotomi.com
GlobalSign RSA OV SSL CA 2018
2019-06-19 -
2021-08-31
2 years crt.sh
ups.analytics.yahoo.com
DigiCert SHA2 High Assurance Server CA
2020-02-13 -
2020-08-11
6 months crt.sh
*.google.com
GTS CA 1O1
2020-04-07 -
2020-06-30
3 months crt.sh

This page contains 24 frames:

Primary Page: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Frame ID: FEFBB9400815D95A74CED9BE411C5B1B
Requests: 107 HTTP requests in this frame

Frame: https://www.redditstatic.com/button/button1.html?url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Frame ID: A4EA92B7733399A904F66F91C2230863
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200422/r20190131/zrt_lookup.html
Frame ID: 1073FD2E83D6F12E047CCCE9EC2FA1EC
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssiMSRVUNFu6evPfYqH4kOEydQFTqR18_8pGWS3wPeLfbPy2XTCNQSHOzSozrZCc9QAyU_Oz2pQ52JauN4uApcBzpSphjiDGyUDkn7_uh7K6wReIeQRUUfLCCJqn7rX0VPtMda_OylzyltrTF60URkKV8wf4bcSNEi9ZMIVgZdGmgVe3D5evRdT2ybEdozC2J30rzksPd3I0JWNaqLmaue2orfrh-uMC8nyHt26HjpJEccqnYDHAoQIgt7PKGLwP0c&sai=AMfl-YR99RovLeKCBffoLp-YIOFP9_EZ7LPS6JD7wXi1zc3GUlqUElyIyqYE1ws5AfHaZJ43oLbxehINqBb9_f4jU0XDvqiCCJXQmLGFlCl-aQ&sig=Cg0ArKJSzGtgPGBsZgepEAE&urlfix=1&adurl=
Frame ID: C90A0BF10C06DCC1A2F47293B7B1D674
Requests: 15 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&h=160&slotname=4663193548&adk=911533265&adf=1328042817&w=700&lmt=1587767534&psa=0&guci=1.2.0.0.2.2.0.0&format=700x160&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767534780&bpp=25&bdt=466&idt=178&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=6427659969387&frm=20&pv=2&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=34905008712&dssz=29&mdo=0&mso=67108864&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=287&ady=2171&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=3&uci=a!3&btvi=1&fsb=1&xpc=MKEuD3FsQM&p=https%3A//appleinsider.com&dtd=188
Frame ID: 451BA9C6CCD62758E5C1C2A57034B941
Requests: 1 HTTP requests in this frame

Frame: https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvCD6iTN8q7ZKQPEx03QYd2U3W7QJGlQ-5qsriYoD7PW6R28dO_bHy2NxgcS9ej6RAitoOSr9m2UxkhQV1fCwsPoc2Adk7-3m0lk_NakGT1Q8xskHVMrjW_FpDKrqRBGqeeQXzGdhdtgzPjmSvg5Cm7IbtYLloejhxvRSg0Cv7W75LRSZG1VUaufyLVTNirXt8pyBOgVBn4jSWiFI9fxvrKk7jSRqHw4UtBIOxHlMBTEkjyepQR01a_sA0ywH7oJU47&sai=AMfl-YRAkUxcC8H373rO-_UP4ofP9OBauDo3aeJRJtHEpZClJFzVjehJA0h51B5uy96Vli9mnNbyoEH6rq2hyhV8aj13mgmiZnBHPCyHTgLP4A&sig=Cg0ArKJSzLFWIOEqTAyyEAE&urlfix=1&adurl=
Frame ID: 5448C08C6EB80D1AB98A74A1FDA4B594
Requests: 16 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=3749009951&adk=918026417&adf=3805360974&w=300&lmt=1587767535&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535003&bpp=3&bdt=689&idt=3&shv=r20200422&cbv=r20190131&ptt=5&saldr=sa&abxe=1&prev_fmts=700x160&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=558480138530&dssz=33&mdo=0&mso=67108864&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=951&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=4&uci=a!4&fsb=1&xpc=POQF44yLP4&p=https%3A//appleinsider.com&dtd=7
Frame ID: 28F73DB96AF81D597736D14B53403406
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=3169902014&adk=896146831&adf=3550264136&w=300&lmt=1587767535&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535611&bpp=1&bdt=1297&idt=2&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160&prev_slotnames=3749009951&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=142970915463766&dssz=39&mdo=0&mso=67109952&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=2144&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=5&uci=a!5&btvi=2&fsb=1&xpc=zto9wFQFzS&p=https%3A//appleinsider.com&dtd=4
Frame ID: 9031E2961B08D3854A1B06592AFD12A3
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Frame ID: 1B3770832142C3D6E2C31ED157F1CA5C
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=8864186447&adk=345433569&adf=3374712449&w=300&lmt=1587767535&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535643&bpp=1&bdt=1329&idt=0&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160%2C300x250&prev_slotnames=3749009951&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=142939334940057&dssz=42&mdo=0&mso=67109954&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=3934&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=6&uci=a!6&btvi=3&fsb=1&xpc=nk0qJYaEJV&p=https%3A//appleinsider.com&dtd=3
Frame ID: F8C4E3AE58E16E12F0207340FDE724D1
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&adk=1812271804&adf=3025194257&lmt=1587767535&plat=1%3A32776%2C2%3A32776%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1587767535651&bpp=2&bdt=1337&idt=2&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160%2C300x250%2C300x250&prev_slotnames=3749009951&nras=1&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=185029700943872&dssz=50&mdo=0&mso=67109954&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=6&uci=a!6&fsb=1&dtd=8
Frame ID: 2CD8F856FC329B553D75B09FB3676B96
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/widget_iframe.6787510241df65d128e2b60207ad4c25.html?origin=https%3A%2F%2Fappleinsider.com
Frame ID: 01880F4805A598494AF62AE99902875F
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df1fa654155028f8%26domain%3Dappleinsider.com%26origin%3Dhttps%253A%252F%252Fappleinsider.com%252Ff35025b3afe91dc%26relation%3Dparent.parent&container_width=236&href=http%3A%2F%2Fwww.facebook.com%2Fpages%2FAppleInsider%2F135590163123753&layout=button_count&locale=en_US&sdk=joey&send=false&show_faces=false&width=100
Frame ID: 256BB68850465A432CD26AF1F049170B
Requests: 1 HTTP requests in this frame

Frame: https://www.facebook.com/plugins/like.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df227428274d66a%26domain%3Dappleinsider.com%26origin%3Dhttps%253A%252F%252Fappleinsider.com%252Ff35025b3afe91dc%26relation%3Dparent.parent&container_width=85&href=http%3A%2F%2Fappleinsider.com%2F%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&layout=button_count&locale=en_US&sdk=joey&send=false&show_faces=false&width=450
Frame ID: 5CBB33A1FC06D67C36009D7A5888E201
Requests: 1 HTTP requests in this frame

Frame: https://dtnspbid.appleinsider.com/engine?site=133097;size=1x1;e=0;dt=0;category=;kw=u4f%20rp8tn%20lajt%20nbl6m02aimqkavs%20jnamg%202j6u%20cw%20l9rhmk%20zp0ww6%2C%20jx15%20ubm0k;rnd=(1587767535756)
Frame ID: FF412D14ACA429B8385D0C7E62A0C2DC
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/follow_button.6787510241df65d128e2b60207ad4c25.en.html
Frame ID: 45C0EE6EC7C69A645BF38E3CB94EF7C6
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/widgets/tweet_button.6787510241df65d128e2b60207ad4c25.en.html
Frame ID: 60C43FFA81C7DE4694B197F31ECADBC8
Requests: 1 HTTP requests in this frame

Frame: https://platform.twitter.com/jot.html
Frame ID: 6B2E5D80264ED54DC811B3787D26D06F
Requests: 1 HTTP requests in this frame

Frame: https://match.adsrvr.org/track/upb/?adv=ax523nj&ref=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&upid=8i0zrrx&upv=1.1.0
Frame ID: 883094312C5700A3C8026F8AA6245303
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 81C459B5DF26E2ABC4CB88FD449CDBB0
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=1
Frame ID: B8E54A0DD2BA4CCBE30B2CB034E22B31
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: 334DB19EF0C9F35075DB877424780EC1
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=1
Frame ID: 36E837839309E20A00CFF58A6010EBBF
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Frame ID: DEC5797D83254A653777A794ABF013FB
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Overall confidence: 100%
Detected patterns
  • script /googletagservices\.com\/tag\/js\/gpt(?:_mobile)?\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/\/platform\.twitter\.com\/widgets\.js/i

Page Statistics

157
Requests

99 %
HTTPS

45 %
IPv6

23
Domains

36
Subdomains

25
IPs

7
Countries

1460 kB
Transfer

3754 kB
Size

11
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 36
  • https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;loc=100;target=_blank;misc=[TIMESTAMP];rdclick= HTTP 302
  • https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;cfp=1;rndc=1587767534;loc=100;target=_blank;misc=[TIMESTAMP];rdclick= HTTP 302
  • https://adserver.adtech.advertising.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;rdhost=adserver.adtechus.com;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick= HTTP 302
  • https://adserver.adtech.advertising.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;rdhost=adserver.adtechus.com;cfp=2;rndc=1587767534;loc=100;target=_blank;misc=[TIMESTAMP];rdclick= HTTP 302
  • https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;apid=1A72c76900-867b-11ea-8e77-127f7115e3c4;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
Request Chain 71
  • https://bullseye.backbeatmedia.com/bullseye/adserver/16829/1/viewJScript?pool=16821&type=13&rnd=468266789&zone=5000&optcode=false&redirect=ajs HTTP 302
  • https://adserver1.backbeatmedia.com/servlet/ajrotator/16829/1/viewJScript?optcode=false&pool=16821&redirect=ajs&rnd=468266789&type=13&zone=5000&keywords=platmac
Request Chain 77
  • https://bullseye.backbeatmedia.com/bullseye/adserver/16829/4/viewJScript?pool=16822&type=3158&zone=5000&optcode=false&rnd=1779856921&redirect=ajs HTTP 302
  • https://adserver1.backbeatmedia.com/servlet/ajrotator/16829/4/viewJScript?optcode=false&pool=16822&redirect=ajs&rnd=1779856921&type=3158&zone=5000&keywords=platmac
Request Chain 95
  • https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent= HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4 HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4&verify=true HTTP 302
  • https://pr-bh.ybp.yahoo.com/sync/adtech/1A72c76900-867b-11ea-8e77-127f7115e3c4?gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/56465/sync?uid=y-KpCosZl1lxku004tSknjM98jSaADtkwfWs_c&_origin=0&nsync=0 HTTP 302
  • https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-KpCosZl1lxku004tSknjM98jSaADtkwfWs_c&_origin=0&nsync=0&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4
Request Chain 96
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent= HTTP 302
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=3DNyB99udlLEMioBjWA-BNFhdgbENXdS32In8w2O HTTP 302
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=3DNyB99udlLEMioBjWA-BNFhdgbENXdS32In8w2O&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4 HTTP 302
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=3DNyB99udlLEMioBjWA-BNFhdgbENXdS32In8w2O&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4&verify=true
Request Chain 132
  • https://syndication.twitter.com/i/jot HTTP 302
  • https://platform.twitter.com/jot.html
Request Chain 138
  • https://insight.adsrvr.org/track/up?adv=ax523nj&ref=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&upid=8i0zrrx&upv=1.1.0 HTTP 302
  • https://match.adsrvr.org/track/upb/?adv=ax523nj&ref=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&upid=8i0zrrx&upv=1.1.0

157 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
appleinsider.com/articles/20/04/22/
66 KB
14 KB
Document
General
Full URL
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PHP/5.6.40
Resource Hash
d69d6513d59cb641aa2177fbb7a594a800eba5a300006a343091f80485b10dd9
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Frame-Options sameorigin

Request headers

:method
GET
:authority
appleinsider.com
:scheme
https
:path
/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Fri, 24 Apr 2020 22:32:14 GMT
content-type
text/html; charset=ISO-8859-1
set-cookie
__cfduid=dea10e828c44bbbc694abb81ecefe05401587767533; expires=Sun, 24-May-20 22:32:13 GMT; path=/; domain=.appleinsider.com; HttpOnly; SameSite=Lax PHPSESSID=e2ivss1echf5h3mbglv08ipdi4; path=/
x-powered-by
PHP/5.6.40
access-control-allow-origin
*
x-frame-options
sameorigin
content-security-policy
frame-ancestors 'self'
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragma
no-cache
content-language
en
vary
Accept-Encoding
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
5893476f0a4c074a-FRA
content-encoding
br
cf-request-id
024feaf9690000074acb048200000001
pg-tables.min.css
photos5.appleinsider.com/v9/css/
20 KB
4 KB
Stylesheet
General
Full URL
https://photos5.appleinsider.com/v9/css/pg-tables.min.css?1.1s
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a004a1e1897b4ad616693a4eab65317ac3f988ce9b565c9410e4ccad2698b75d

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
190180
status
200
cf-request-id
024feafaf10000074acb05a200000001
last-modified
Sat, 29 Feb 2020 16:12:15 GMT
server
cloudflare
etag
W/"5e5a8d5f-4ed2"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347718e28074a-FRA
expires
Wed, 29 Apr 2020 17:42:34 GMT
styles_screen.min.css
photos5.appleinsider.com/v9/css/
67 KB
13 KB
Stylesheet
General
Full URL
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
609d804e8434071e5e827b6f57f4b6632dbbcbe5cf1f38f32534b0d057dc2406

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
190180
status
200
cf-request-id
024feafaf10000074acb05b200000001
last-modified
Wed, 08 Apr 2020 17:41:28 GMT
server
cloudflare
etag
W/"5e8e0cc8-10be9"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347718e2a074a-FRA
expires
Wed, 29 Apr 2020 17:42:34 GMT
font-awesome.min.css
photos5.appleinsider.com/v9/css/font-awesome/css/
30 KB
7 KB
Stylesheet
General
Full URL
https://photos5.appleinsider.com/v9/css/font-awesome/css/font-awesome.min.css?1.1s
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
190180
status
200
cf-request-id
024feafaf10000074acb05c200000001
last-modified
Thu, 24 Aug 2017 21:40:04 GMT
server
cloudflare
etag
W/"599f47b4-7918"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347718e2b074a-FRA
expires
Wed, 29 Apr 2020 17:42:34 GMT
header-scripts-concat.min.js
photos5.appleinsider.com/v9/js/
147 KB
50 KB
Script
General
Full URL
https://photos5.appleinsider.com/v9/js/header-scripts-concat.min.js?1.04b
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c75ff778dc7fa1ae6f63bf9c38c8e44b5e68372c177c644fa80cb447d98963dd

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
45929
status
200
cf-request-id
024feafaf10000074acb05d200000001
last-modified
Thu, 10 Jan 2019 16:04:52 GMT
server
cloudflare
etag
W/"5c376d24-24ae7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347718e2c074a-FRA
expires
Fri, 01 May 2020 09:46:45 GMT
globals.min.js
photos5.appleinsider.com/v9/js/
344 B
339 B
Script
General
Full URL
https://photos5.appleinsider.com/v9/js/globals.min.js?1.04b
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8ebfa5a4cbc9a6decd900231243dff3817cca01815445b2ef7c57d4566052d17

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
90774
status
200
cf-request-id
024feafaf10000074acb05e200000001
last-modified
Thu, 10 Jan 2019 16:05:03 GMT
server
cloudflare
etag
W/"5c376d2f-158"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347718e30074a-FRA
expires
Thu, 30 Apr 2020 21:19:20 GMT
gpt.js
www.googletagservices.com/tag/js/
43 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
6aaedf56923a5cd37c3adae0eeb59b128749bb1f32cc95fe6262fd924c8caa5e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"496 / 172 of 1000 / last-modified: 1587741537"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
14373
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:14 GMT
wordmark.png
photos5.appleinsider.com/v9/images/
5 KB
5 KB
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/wordmark.png
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7933a59f0fc43321ff87c120333b3d52d84b00c3cbbec82830707ee1384a1081

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
45929
status
200
content-length
4773
cf-request-id
024feafc500000074acb072200000001
last-modified
Mon, 12 Mar 2018 13:13:48 GMT
server
cloudflare
etag
"5aa67d0c-12a5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ba09074a-FRA
expires
Fri, 01 May 2020 09:46:45 GMT
up_loader.1.1.0.js
js.adsrvr.org/
4 KB
2 KB
Script
General
Full URL
https://js.adsrvr.org/up_loader.1.1.0.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.94.29 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-143-204-94-29.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
0615974c40d602afdbf9759533e352bc17b0458c85aad6694b1a1ad20659625b

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 24 Apr 2020 01:22:28 GMT
Content-Encoding
gzip
Last-Modified
Mon, 13 Jan 2020 19:16:48 GMT
Server
AmazonS3
Age
83179
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/x-javascript
Via
1.1 9c7c26f5beeb09381cea450ea3581b37.cloudfront.net (CloudFront)
Connection
keep-alive
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA50-C1
X-Amz-Cf-Id
rni6w9V35d4vrDyT9PEz1N4AAxTFFIBOanc8ospNusyJbPbbPwyzLw==
youtube-share.png
photos5.appleinsider.com/v9/images/
1 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/youtube-share.png
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f9dbbe54c0e240ece8b2bf8feae7b8cbaa3576ed189690cb19d2ed1417ab7f56

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
134855
status
200
content-length
1479
cf-request-id
024feafc500000074acb073200000001
last-modified
Thu, 10 Jan 2019 16:22:18 GMT
server
cloudflare
etag
"5c37713a-5c7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ba0a074a-FRA
expires
Thu, 30 Apr 2020 09:04:39 GMT
rss-btn.png
photos5.appleinsider.com/v9/images/
1 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/rss-btn.png
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2c8cd99e22da503ed30653145d1d26935476e0a1e61fd74aa2d5d306894ab0e7

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
128548
status
200
content-length
1457
cf-request-id
024feafc500000074acb074200000001
last-modified
Mon, 12 Mar 2018 14:14:53 GMT
server
cloudflare
etag
"5aa68b5d-5b1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ba0d074a-FRA
expires
Thu, 30 Apr 2020 10:49:46 GMT
1x1-white.jpg
photos5.appleinsider.com/v9/images/
1 KB
1 KB
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/1x1-white.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fc45c9bc3995a79aedd4854afd4c148064b180bb08ad7a0c446166444f02a425

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
45929
status
200
content-length
1129
cf-request-id
024feafc500000074acb075200000001
last-modified
Sat, 17 Dec 2016 03:20:25 GMT
server
cloudflare
etag
"5854aef9-469"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ba0e074a-FRA
expires
Fri, 01 May 2020 09:46:45 GMT
email-decode.min.js
appleinsider.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
830 B
Script
General
Full URL
https://appleinsider.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
vary
Accept-Encoding
last-modified
Tue, 21 Apr 2020 17:12:03 GMT
server
cloudflare
etag
W/"5e9f2963-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800, public
cf-ray
58934771ae64074a-FRA
cf-request-id
024feafb070000074acb060200000001
expires
Sun, 26 Apr 2020 22:32:14 GMT
button1.js
www.redditstatic.com/button/
1 KB
651 B
Script
General
Full URL
https://www.redditstatic.com/button/button1.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.53.140 Manchester, United Kingdom, ASN54113 (FASTLY, US),
Reverse DNS
Software
snooserv /
Resource Hash
fdc2e23dcb6a6ce8f2ada0e9933e7edbda5f15d450165c71482eb752c7c5ae24

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
age
18399883
x-cache
HIT, HIT
status
200
x-cache-hits
5, 391
content-length
353
x-served-by
cache-iad2145-IAD, cache-man4134-MAN
last-modified
Mon, 22 Sep 2014 16:25:05 GMT
server
snooserv
x-timer
S1587767535.629862,VS0,VE0
etag
"610788fd4961c058cee1869f473c374c"
vary
Accept-Encoding,Origin
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
accept-ranges
bytes
expires
Thu, 31 Dec 2037 23:59:59 GMT
pubads_impl_2020042001.js
securepubads.g.doubleclick.net/gpt/
171 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
sffe /
Resource Hash
0b810c6b83f3d55da4c3e345113ad863901ff3e382e04170817b853f761dd9f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Apr 2020 20:16:23 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
64174
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:14 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
175 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=appleinsider.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
108
x-xss-protection
0
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
107 KB
38 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0ee24571df9bff632625eece6598e8ae8c5749228a935cce27059ee7a4bd7a4a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
39074
x-xss-protection
0
server
cafe
etag
10571670388425089980
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Fri, 24 Apr 2020 22:32:14 GMT
1101-693-iphone-deals-april-2020-s.jpg
photos5.appleinsider.com/pricecropper/gallery/
6 KB
6 KB
Image
General
Full URL
https://photos5.appleinsider.com/pricecropper/gallery/1101-693-iphone-deals-april-2020-s.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
33aed91cd306543f3bbae9d2c97d82dbe934a633744a8c1621c1b62d57bd4d26

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
66004
status
200
content-length
6305
cf-request-id
024feafc500000074acb076200000001
last-modified
Fri, 17 Apr 2020 01:23:30 GMT
server
cloudflare
etag
"5e990512-18a1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ba0f074a-FRA
expires
Fri, 01 May 2020 04:12:10 GMT
32192-54889-apple-airpods-on-sale-s.jpg
photos5.appleinsider.com/gallery/
8 KB
8 KB
Image
General
Full URL
https://photos5.appleinsider.com/gallery/32192-54889-apple-airpods-on-sale-s.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a66eaa5cc3055c8996a60f52fe8ae9e3acb66c28572ad29ffcc18f5a73cdea86

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
229482
status
200
content-length
7763
cf-request-id
024feafc500000074acb077200000001
last-modified
Wed, 31 Jul 2019 23:37:35 GMT
server
cloudflare
etag
"5d42263f-1e53"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ba11074a-FRA
expires
Wed, 29 Apr 2020 06:47:32 GMT
1068-656-new-16-inch-macbook-pro-deals-s.jpg
photos5.appleinsider.com/pricecropper/gallery/
10 KB
10 KB
Image
General
Full URL
https://photos5.appleinsider.com/pricecropper/gallery/1068-656-new-16-inch-macbook-pro-deals-s.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fb1c316598b364784d389edcca67ed5f518c4bff116790f10520e9fbc8d7470b

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
45053
status
200
content-length
9803
cf-request-id
024feafc5d0000074acb07a200000001
last-modified
Fri, 15 Nov 2019 18:06:24 GMT
server
cloudflare
etag
"5dcee920-264b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ca2a074a-FRA
expires
Fri, 01 May 2020 10:01:21 GMT
1098-691-apple-2020-ipad-pro-deals-s.jpg
photos5.appleinsider.com/pricecropper/gallery/
12 KB
12 KB
Image
General
Full URL
https://photos5.appleinsider.com/pricecropper/gallery/1098-691-apple-2020-ipad-pro-deals-s.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9b28cc4b98ed1bf7f6317037e3bfba5da0aed06ab4cbd19698211ebebe16b07a

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
534347
status
200
content-length
11892
cf-request-id
024feafc5d0000074acb07b200000001
last-modified
Sat, 28 Mar 2020 17:53:27 GMT
server
cloudflare
etag
"5e7f8f17-2e74"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ca2d074a-FRA
expires
Sat, 25 Apr 2020 18:06:27 GMT
1099-692-2020-mac-mini-deal-s.jpg
photos5.appleinsider.com/pricecropper/gallery/
5 KB
6 KB
Image
General
Full URL
https://photos5.appleinsider.com/pricecropper/gallery/1099-692-2020-mac-mini-deal-s.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f72d8a26a430c46a0ef838c3a50854f9aa4729b6857b0abe4cb0d574cf99105d

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
531789
status
200
content-length
5594
cf-request-id
024feafc5d0000074acb07c200000001
last-modified
Sat, 28 Mar 2020 18:36:04 GMT
server
cloudflare
etag
"5e7f9914-15da"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ca2e074a-FRA
expires
Sat, 25 Apr 2020 18:49:05 GMT
1095-687-2020-mac-app-bundle-s.jpg
photos5.appleinsider.com/pricecropper/gallery/
12 KB
12 KB
Image
General
Full URL
https://photos5.appleinsider.com/pricecropper/gallery/1095-687-2020-mac-app-bundle-s.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ce0427df7bc9bb5782ed1244ade4a76ce03100773fce3b994a849eae0bb5f081

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
356726
status
200
content-length
11849
cf-request-id
024feafc5d0000074acb07d200000001
last-modified
Mon, 16 Mar 2020 19:16:25 GMT
server
cloudflare
etag
"5e6fd089-2e49"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ca30074a-FRA
expires
Mon, 27 Apr 2020 19:26:48 GMT
52541.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52541.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d2fe6b52e182e7ae4aa6e91266ece2b0235b2cdf85c4741ff83a1ee44267cb2b

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
619
status
200
content-length
2094
cf-request-id
024feafc660000074acb07e200000001
last-modified
Fri, 24 Apr 2020 22:18:45 GMT
server
cloudflare
etag
"5ea365c5-82e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773da44074a-FRA
expires
Fri, 01 May 2020 22:21:55 GMT
52540.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52540.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
dff7ae2e486fcbe31524da6c09f804ab533580a40cd7f3acac3e98a6f7e83a78

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
3379
status
200
content-length
1698
cf-request-id
024feafc690000074acb07f200000001
last-modified
Fri, 24 Apr 2020 21:35:02 GMT
server
cloudflare
etag
"5ea35b86-6a2"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773da53074a-FRA
expires
Fri, 01 May 2020 21:35:55 GMT
52396.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52396.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
19d5938090eef04f19f0992e5c34a6f3e24d3b9874c3c0c5f1e8a21af4765b7e

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
7443
status
200
content-length
2261
cf-request-id
024feafc690000074acb080200000001
last-modified
Fri, 24 Apr 2020 20:23:54 GMT
server
cloudflare
etag
"5ea34ada-8d5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773da54074a-FRA
expires
Fri, 01 May 2020 20:28:11 GMT
52539.jpg
photos5.appleinsider.com/article_thumbs/
1 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52539.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b13c44e7e7c3c31089ae75ed855bc68e7ad5e9ddd9f9a82c9f4ae200590c224a

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
8725
status
200
content-length
1392
cf-request-id
024feafc690000074acb081200000001
last-modified
Fri, 24 Apr 2020 20:03:46 GMT
server
cloudflare
etag
"5ea34622-570"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773da55074a-FRA
expires
Fri, 01 May 2020 20:06:49 GMT
52538.jpg
photos5.appleinsider.com/article_thumbs/
1 KB
1 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52538.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a680ea5775fa0f1666c19e50b7b8ea55b0bb71c656ef00949cdfae0da44fb64c

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
7554
status
200
content-length
1202
cf-request-id
024feafc690000074acb082200000001
last-modified
Fri, 24 Apr 2020 20:26:12 GMT
server
cloudflare
etag
"5ea34b64-4b2"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773da57074a-FRA
expires
Fri, 01 May 2020 20:26:20 GMT
show_ads.js
pagead2.googlesyndication.com/pagead/
80 KB
29 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_ads.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0d8cd460317496167bc0002647cbb2dec4d43a5e7e8adf5a1e828c64c3c8de19
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
30124
x-xss-protection
0
server
cafe
etag
14351396803876246905
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Fri, 24 Apr 2020 22:32:14 GMT
52535.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52535.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
54b8837f826a05ec0543119ba796100b3f3032cfcf4e805d20ed2ccc3be102a5

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
16195
status
200
content-length
2072
cf-request-id
024feafc7d0000074acb085200000001
last-modified
Fri, 24 Apr 2020 18:02:04 GMT
server
cloudflare
etag
"5ea3299c-818"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773fa8d074a-FRA
expires
Fri, 01 May 2020 18:02:19 GMT
52528.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52528.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
86689f27fee9cde9282f2f00921d1e14571189e183bec3f9f642f053f7126f01

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
31664
status
200
content-length
1606
cf-request-id
024feafc7d0000074acb086200000001
last-modified
Fri, 24 Apr 2020 13:40:50 GMT
server
cloudflare
etag
"5ea2ec62-646"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773fa8e074a-FRA
expires
Fri, 01 May 2020 13:44:30 GMT
47844.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/47844.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
8fd4dbc30a8fc301f2f2d28f551848d7b2a15e0f2c1ca5e21bcce00c6a4e5314

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
39147
status
200
content-length
2310
cf-request-id
024feafc7d0000074acb087200000001
last-modified
Fri, 24 Apr 2020 11:29:49 GMT
server
cloudflare
etag
"5ea2cdad-906"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773fa8f074a-FRA
expires
Fri, 01 May 2020 11:39:47 GMT
52525.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52525.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cb9777352d94c2f4c508971e96f263a1938d52646680a6d8d5cdd0be4f5256ce

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
37059
status
200
content-length
2070
cf-request-id
024feafc7d0000074acb088200000001
last-modified
Fri, 24 Apr 2020 12:11:39 GMT
server
cloudflare
etag
"5ea2d77b-816"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773fa90074a-FRA
expires
Fri, 01 May 2020 12:14:35 GMT
51989.jpg
photos5.appleinsider.com/article_thumbs/
3 KB
3 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/51989.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
30acae118f525c20fca5faec2d89b3585451402ce604ab6cfa2cd54a78b2d6a2

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
384963
status
200
content-length
2565
cf-request-id
024feafc7d0000074acb089200000001
last-modified
Tue, 17 Mar 2020 16:10:46 GMT
server
cloudflare
etag
"5e70f686-a05"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773fa91074a-FRA
expires
Mon, 27 Apr 2020 11:36:11 GMT
gazellesidebarmodule2016.jpg
photos5.appleinsider.com/
14 KB
15 KB
Image
General
Full URL
https://photos5.appleinsider.com/gazellesidebarmodule2016.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9f796fc7dbcf2009758003597b5ea499b548b487f77fd51f82a3b8a4f6bc0b43

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
45929
status
200
content-length
14749
cf-request-id
024feafca60000074acb08c200000001
last-modified
Thu, 05 Oct 2017 11:48:04 GMT
server
cloudflare
etag
"59d61bf4-399d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347743b0d074a-FRA
expires
Fri, 01 May 2020 09:46:45 GMT
tags.js
tags.expo9.exponential.com/tags/AppleInsider/ROS/
59 KB
14 KB
Script
General
Full URL
https://tags.expo9.exponential.com/tags/AppleInsider/ROS/tags.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.8.13.110 , Netherlands, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
a23-8-13-110.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
9d511747daa9512bf03b0531b118d11688de33838402ddffa56d8bb97ac6e195

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-function
151
x-reuse-index
2
etag
141782989078271163
vary
Accept-Encoding
p3p
CP="NOI DEVo TAIa OUR BUS"
status
200
cache-control
max-age=3600, private
last-modified
Tue, 03 Sep 2019 17:28:09 GMT
content-type
application/x-javascript
content-length
13994
expires
Fri, 24 Apr 2020 23:32:14 GMT
adorama-sidebar-2019-apple-hardware.jpg
photos5.appleinsider.com/price_guide/
42 KB
42 KB
Image
General
Full URL
https://photos5.appleinsider.com/price_guide/adorama-sidebar-2019-apple-hardware.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5dda6147e98ec6e66593eeee9766c0ed2122a70f008f84b2c5684f2fd89a8422

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
441276
status
200
content-length
42972
cf-request-id
024feafca60000074acb08d200000001
last-modified
Sun, 24 Mar 2019 18:59:15 GMT
server
cloudflare
etag
"5c97d383-a7dc"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347743b0e074a-FRA
expires
Sun, 26 Apr 2020 19:57:38 GMT
addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;apid=1A72c76900-867b-11ea-8e77-127f7115e3c4;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
adserver.adtechus.com/
Redirect Chain
  • https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
  • https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;cfp=1;rndc=1587767534;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
  • https://adserver.adtech.advertising.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;rdhost=adserver.adtechus.com;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
  • https://adserver.adtech.advertising.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;rdhost=adserver.adtechus.com;cfp=2;rndc=1587767534;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
  • https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;apid=1A72c76900-867b-11ea-8e77-127f7115e3c4;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
1 KB
2 KB
Script
General
Full URL
https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;apid=1A72c76900-867b-11ea-8e77-127f7115e3c4;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.21.35 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
Adtech Adserver /
Resource Hash
5447655249d39e67d9b96e58b0c0e578c4c3106c26d0d0dbef6ecb002203737e

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
server
Adtech Adserver
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
status
200
cache-control
no-store, no-cache
content-type
application/x-javascript
content-length
1349
expires
Mon, 15 Jun 1998 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
server
nginx
status
302
p3p
CP="NOI DSP DEVa OUR BUS UNI COM NAV INT"
location
https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;apid=1A72c76900-867b-11ea-8e77-127f7115e3c4;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
cache-control
no-store, no-cache
content-length
0
expires
Mon, 15 Jun 1998 00:00:00 GMT
52430.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52430.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cdc7288c49f830d8025debd5e8e526a131695ae663bd07e537e5a29050e9b85b

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
16426
status
200
content-length
1718
cf-request-id
024feafca60000074acb08e200000001
last-modified
Fri, 17 Apr 2020 17:55:43 GMT
server
cloudflare
etag
"5e99ed9f-6b6"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347743b10074a-FRA
expires
Fri, 01 May 2020 17:58:28 GMT
52198.jpg
photos5.appleinsider.com/article_thumbs/
1 KB
1 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/52198.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
00d99e863f66a7b6453f6af6ccd5725f8487ea4396955f8bc8392ec0a9be9570

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
268556
status
200
content-length
1216
cf-request-id
024feafca60000074acb08f200000001
last-modified
Tue, 31 Mar 2020 19:54:54 GMT
server
cloudflare
etag
"5e83a00e-4c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347743b12074a-FRA
expires
Tue, 28 Apr 2020 19:56:18 GMT
51917.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/51917.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
35e015186cfb82698abf4a710e2cf33f9787d0c9fbc839af0822598adf8043a4

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
106929
status
200
content-length
1859
cf-request-id
024feafca60000074acb090200000001
last-modified
Thu, 12 Mar 2020 16:46:48 GMT
server
cloudflare
etag
"5e6a6778-743"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347743b14074a-FRA
expires
Thu, 30 Apr 2020 16:50:05 GMT
51523.jpg
photos5.appleinsider.com/article_thumbs/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/51523.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6c96a3e6041d3a80af714250300a851ef1095fc6ac2c42f7db1a688d82727d34

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
356996
status
200
content-length
1716
cf-request-id
024feafcb40000074acb094200000001
last-modified
Mon, 10 Feb 2020 19:14:18 GMT
server
cloudflare
etag
"5e41ab8a-6b4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347745b43074a-FRA
expires
Mon, 27 Apr 2020 19:22:18 GMT
48642.jpg
photos5.appleinsider.com/article_thumbs/
1 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/article_thumbs/48642.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f34d7d75f54f161e2acb82589aec79a1944c18f23b9a7e8d2ec2725e6a544f11

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
267954
status
200
content-length
1513
cf-request-id
024feafcb50000074acb095200000001
last-modified
Tue, 17 Mar 2020 20:02:22 GMT
server
cloudflare
etag
"5e712cce-5e9"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347745b45074a-FRA
expires
Tue, 28 Apr 2020 20:06:20 GMT
browser_selector.min.js
photos5.appleinsider.com/v9/js/
1 KB
625 B
Script
General
Full URL
https://photos5.appleinsider.com/v9/js/browser_selector.min.js?1.04b
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
32aacb45db50a6c1c47bac023d907b625e400b873b8f2baff72dbcbee4f1da35

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
45929
status
200
cf-request-id
024feafcb50000074acb096200000001
last-modified
Thu, 10 Jan 2019 16:10:40 GMT
server
cloudflare
etag
W/"5c376e80-428"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347745b46074a-FRA
expires
Fri, 01 May 2020 09:46:45 GMT
carousel.min.js
photos5.appleinsider.com/v9/js/
9 KB
2 KB
Script
General
Full URL
https://photos5.appleinsider.com/v9/js/carousel.min.js?1.04b
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
ff1da4d5922b719567f1d424e5a685a9ec216f42d301a09b3af70811ffa7f54d

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
45929
status
200
cf-request-id
024feafcb50000074acb097200000001
last-modified
Thu, 10 Jan 2019 16:10:54 GMT
server
cloudflare
etag
W/"5c376e8e-25a8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347745b47074a-FRA
expires
Fri, 01 May 2020 09:46:45 GMT
article.min.js
photos5.appleinsider.com/v9/js/
1 KB
639 B
Script
General
Full URL
https://photos5.appleinsider.com/v9/js/article.min.js?1.04b
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
099abdc7ccf1a018ef0bd31c490f5e901b015aea07d49d27cc452b4e38c250af

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
90552
status
200
cf-request-id
024feafcb50000074acb098200000001
last-modified
Thu, 10 Jan 2019 16:27:29 GMT
server
cloudflare
etag
W/"5c377271-53d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347745b49074a-FRA
expires
Thu, 30 Apr 2020 21:23:02 GMT
pg_new.min.js
photos5.appleinsider.com/v9/js/
4 KB
1 KB
Script
General
Full URL
https://photos5.appleinsider.com/v9/js/pg_new.min.js?1.04b
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
60c32c7518fe0526dbeb9d9c98fc62e433a7ad7d1753e03f01fdf1e8b0991765

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
cf-cache-status
HIT
age
65235
status
200
cf-request-id
024feafcb50000074acb099200000001
last-modified
Thu, 10 Jan 2019 16:28:10 GMT
server
cloudflare
etag
W/"5c37729a-1171"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
access-control-allow-origin
*
cache-control
max-age=604800
cf-ray
589347745b4b074a-FRA
expires
Fri, 01 May 2020 04:24:59 GMT
site-133097.js
ads.pro-market.net/ads/scripts/
3 KB
2 KB
Script
General
Full URL
https://ads.pro-market.net/ads/scripts/site-133097.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.16.106.193 , Ascension Island, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
a2-16-106-193.deploy.static.akamaitechnologies.com
Software
nginx/1.0.15 /
Resource Hash
66c526b170368d662a0398d214688a6bd90b1f13987405f99b7f92292ccae18b

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 24 Apr 2020 22:32:14 GMT
Content-Encoding
gzip
Last-Modified
Wed, 09 Sep 2015 10:15:33 GMT
Server
nginx/1.0.15
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400
Connection
keep-alive
Content-Length
1463
plusone.js
apis.google.com/js/
48 KB
19 KB
Script
General
Full URL
https://apis.google.com/js/plusone.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
0c763d7a97b77a30e3a372b33399781df13057447b31f4a8434018ca0425e84d
Security Headers
Name Value
Content-Security-Policy script-src 'report-sample' 'nonce-wf6+uqR49/kDk2BIpjhK7Q' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri /_/cspreport
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="This is not a P3P policy! See g.co/p3phelp for more info."
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
x-xss-protection
0
x-ua-compatible
IE=edge, chrome=1
server
ESF
x-frame-options
SAMEORIGIN
etag
"5f9d292e21463dcdac45eb1487faa3a1"
strict-transport-security
max-age=31536000
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=1800, stale-while-revalidate=1800
content-security-policy
script-src 'report-sample' 'nonce-wf6+uqR49/kDk2BIpjhK7Q' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri /_/cspreport
timing-allow-origin
*
expires
Fri, 24 Apr 2020 22:32:14 GMT
widgets.js
platform.twitter.com/
96 KB
29 KB
Script
General
Full URL
https://platform.twitter.com/widgets.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash
deb392febab4850ea24bd8516eed1b897991977ad63904261b9ffb21ccc66a4b

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 24 Apr 2020 22:32:14 GMT
Content-Encoding
gzip
Last-Modified
Tue, 07 Apr 2020 20:48:50 GMT
Server
ECS (fcn/40D2)
Age
1149
Etag
"bfee88d079c2668aea5525e2d719ba90+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=1800
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
29121
all.js
connect.facebook.net/en_US/
3 KB
2 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
a7e5973a2a507358db7c3ecc86707f691ffed8c1bcd38b6b47692475571b5a33
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
s4HjneNtQHPQlHHorEwfLw==
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
1780
etag
"979366154e36d193ee61955b54c0aeb1"
x-fb-debug
N5UEcSE26WV/9Xj2kPsLpcp3RyaATgo6JnaRzRABnSz/W0ECrAGbwsGUTNZriqZTTEsjdwCL58ZYf1GTcXqosQ==
x-fb-trip-id
1850256238
x-fb-content-md5
6013f70583f93f7b43163c4c8e35f4a2
x-frame-options
DENY
date
Fri, 24 Apr 2020 22:32:14 GMT, Fri, 24 Apr 2020 22:32:14 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=1200,stale-while-revalidate=3600
timing-allow-origin
*
expires
Fri, 24 Apr 2020 22:40:41 GMT
analytics.js
www.google-analytics.com/
44 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
eaf1b128b927ac2868755cb7366d35554255c8af362235afe270f9614f8c806d
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 06 Feb 2020 00:21:02 GMT
server
Golfe2
age
3220
date
Fri, 24 Apr 2020 21:38:34 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
18174
expires
Fri, 24 Apr 2020 23:38:34 GMT
fbevents.js
connect.facebook.net/en_US/
126 KB
30 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
5a91c6d3e635c0bd1551a53cf0769328132151a7732039170280d500dbcb4685
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
30466
x-xss-protection
0
pragma
public
x-fb-debug
WVYdsxQZ3hcGER6nqiDJFPtA+i47a/AVLVcqTG4Epe5Fswppv425gXlKo6mKUjETW+wiAGI4OQJoGfvm20SOYg==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Fri, 24 Apr 2020 22:32:14 GMT, Fri, 24 Apr 2020 22:32:14 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
id_backdrop.png
photos5.appleinsider.com/v9/images/
4 KB
4 KB
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/id_backdrop.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
21944549f0abe6d1fad6e2ff78ae7f2003b54a088f8c74fa2bb580f921cf2610

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
227876
status
200
content-length
4358
cf-request-id
024feafc550000074acb079200000001
last-modified
Thu, 03 Aug 2017 12:18:43 GMT
server
cloudflare
etag
"598314a3-1106"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ba16074a-FRA
expires
Wed, 29 Apr 2020 07:14:18 GMT
ads
securepubads.g.doubleclick.net/gampad/
11 KB
4 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=192160441551974&correlator=3120157331965257&output=ldjh&impl=fifs&adsid=NT&eid=21065952%2C21064169%2C21065139%2C21065392%2C21065401&vrg=2020042001&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200424&iu_parts=3714934%2CAI_LDR%2CAI_MREC%2CAI_WSKY&enc_prev_ius=%2F0%2F1%2C%2F0%2F2%2C%2F0%2F3&prev_iu_szs=728x90%7C970x90%2C300x250%2C160x600&cookie_enabled=1&bc=31&abxe=1&lmt=1587767534&dt=1587767534681&dlt=1587767534314&idt=343&frm=20&biw=1600&bih=1200&oid=3&adxs=578%2C-9%2C-9&adys=66%2C-9%2C-9&adks=3914823742%2C3436827314%2C868512357&ucis=1%7C2%7C3&ifi=1&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&dssz=14&icsg=42&std=0&csl=103&vis=1&dmc=8&scr_x=0&scr_y=0&psz=728x90%7C0x-1%7C0x-1&msz=728x90%7C0x-1%7C0x-1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&fws=0%2C2%2C2&ohw=0%2C0%2C0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
cafe /
Resource Hash
2619ad916e3b9dfeac0c33b0f277c66214e4566ff75531f091ee43b555108d2a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2,-2,-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
3653
x-xss-protection
0
google-lineitem-id
4729261408,4729261408,47413374
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
27103615854,27143036454,20041699614
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://appleinsider.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020042001.js
securepubads.g.doubleclick.net/gpt/
67 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js?21065952
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
sffe /
Resource Hash
4e84d85a31c26a182e31a0e7e97f1393690c5b5756a00201ca7752a253c79998
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Apr 2020 20:16:23 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
24855
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:14 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/
416 B
736 B
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=192160441551974&correlator=3120157331965257&output=ldjh&impl=fifs&adsid=NT&eid=21065952%2C21064169%2C21065139%2C21065392%2C21065401&vrg=2020042001&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200424&iu_parts=21752231759%2Cai_oustream_onsite&enc_prev_ius=%2F0%2F1&prev_iu_szs=1x1&cookie_enabled=1&bc=31&abxe=1&lmt=1587767534&dt=1587767534691&dlt=1587767534314&idt=343&frm=20&biw=1600&bih=1200&oid=3&adxs=-9&adys=-9&adks=1780018611&ucis=4&ifi=2&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&dssz=15&icsg=32810&std=0&csl=103&vis=1&dmc=8&scr_x=0&scr_y=0&psz=0x-1&msz=0x-1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&fws=2&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
cafe /
Resource Hash
dccead1439f8335f8951d84f1ff22eaa40007b8cc7ada33260e7fe4a4e723c16
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
226
x-xss-protection
0
google-lineitem-id
-2
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
-2
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://appleinsider.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
dd_triangle_off.png
photos5.appleinsider.com/v9/images/
128 B
289 B
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/dd_triangle_off.png
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
95bae970277d5cc5c8b1f5983220ec926d56b8a469cb124e98df741d49d4866f

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
134854
status
200
content-length
128
cf-request-id
024feafc6c0000074acb083200000001
last-modified
Thu, 03 Aug 2017 12:18:40 GMT
server
cloudflare
etag
"598314a0-80"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ea5e074a-FRA
expires
Thu, 30 Apr 2020 09:04:40 GMT
search_triangle_off.gif
photos5.appleinsider.com/v9/images/
117 B
277 B
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/search_triangle_off.gif
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a85bf375d1a16eef5e5685aebbe9421e65ab180c7df51db7497b75b2105632b6

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
227876
status
200
content-length
117
cf-request-id
024feafc6c0000074acb084200000001
last-modified
Thu, 03 Aug 2017 12:18:37 GMT
server
cloudflare
etag
"5983149d-75"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773ea5f074a-FRA
expires
Wed, 29 Apr 2020 07:14:18 GMT
FranklinGothic-Cd.woff2
photos5.appleinsider.com/v9/typography/
22 KB
22 KB
Font
General
Full URL
https://photos5.appleinsider.com/v9/typography/FranklinGothic-Cd.woff2
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1259 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
eea14dd72a5af9c6ec62c6d83b3686f1050c9e34c1597aa4b7aa993c0c478b58

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
Origin
https://appleinsider.com

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
224569
status
200
content-length
22264
cf-request-id
024feafc7d0000d6b1d7230200000001
last-modified
Thu, 18 May 2017 20:37:19 GMT
server
cloudflare
etag
"591e05ff-56f8"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934773fdf7d6b1-FRA
expires
Wed, 29 Apr 2020 08:09:25 GMT
button1.html
www.redditstatic.com/button/ Frame A4EA
0
0
Document
General
Full URL
https://www.redditstatic.com/button/button1.html?url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Requested by
Host: www.redditstatic.com
URL: https://www.redditstatic.com/button/button1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.232.53.140 Manchester, United Kingdom, ASN54113 (FASTLY, US),
Reverse DNS
Software
snooserv /
Resource Hash

Request headers

:method
GET
:authority
www.redditstatic.com
:scheme
https
:path
/button/button1.html?url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
last-modified
Wed, 30 Jul 2014 19:09:19 GMT
etag
"ce91c4f683d32f8907f0e97f3fb93696"
expires
Thu, 31 Dec 2037 23:59:59 GMT
content-type
text/html
content-encoding
gzip
via
1.1 varnish 1.1 varnish
accept-ranges
bytes
date
Fri, 24 Apr 2020 22:32:14 GMT
age
198513
x-served-by
cache-dca17776-DCA, cache-man4134-MAN
x-cache
HIT, HIT
x-cache-hits
1, 1
x-timer
S1587767535.789912,VS0,VE0
vary
Accept-Encoding,Origin
server
snooserv
content-length
1709
sb_icon_priceguide.gif
photos5.appleinsider.com/v9/images/
337 B
499 B
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/sb_icon_priceguide.gif
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3a9e77f3f0e729a2781a56d0176333e7ef0b7b03dca8fa8afdff89dfad682373

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
227876
status
200
content-length
337
cf-request-id
024feafcbf0000074acb09a200000001
last-modified
Fri, 25 Aug 2017 01:33:35 GMT
server
cloudflare
etag
"599f7e6f-151"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347746b61074a-FRA
expires
Wed, 29 Apr 2020 07:14:18 GMT
list_triangle.gif
photos5.appleinsider.com/v9/images/
60 B
212 B
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/list_triangle.gif
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
91ef3f678b888c240152cd146bc9620f7c933da29321d9f06d67d3e6209d117a

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
134853
status
200
content-length
60
cf-request-id
024feafcbf0000074acb09b200000001
last-modified
Thu, 03 Aug 2017 12:18:28 GMT
server
cloudflare
etag
"59831494-3c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347746b63074a-FRA
expires
Thu, 30 Apr 2020 09:04:41 GMT
FranklinGothic-MedCd.woff2
photos5.appleinsider.com/v9/typography/
21 KB
21 KB
Font
General
Full URL
https://photos5.appleinsider.com/v9/typography/FranklinGothic-MedCd.woff2
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1259 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
d4ff92e1bae420055378432e31d9c5bf2aca02b41cc7f9ba9456d4c322899f88

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
Origin
https://appleinsider.com

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
cf-cache-status
HIT
age
219116
status
200
content-length
21844
cf-request-id
024feafca50000d6b1d7233200000001
last-modified
Thu, 18 May 2017 20:37:22 GMT
server
cloudflare
etag
"591e0602-5554"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347743e6ad6b1-FRA
expires
Wed, 29 Apr 2020 09:40:18 GMT
/
servedby.flashtalking.com/imp/8/55973;2214372;201;js;AppleInsidercom;300x250Ben/
0
0
Script
General
Full URL
https://servedby.flashtalking.com/imp/8/55973;2214372;201;js;AppleInsidercom;300x250Ben/?ftx=&fty=&ftadz=&ftscw=&ft_custom=&ftOBA=1&ft_agentEnv=0&ft_referrer=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&cachebuster=584077.8162509899
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
205.185.216.10 Phoenix, United States, ASN20446 (HIGHWINDS3, US),
Reverse DNS
map2.hwcdn.net
Software
/
Resource Hash

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200422/r20190131/
217 KB
82 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200422/r20190131/show_ads_impl_fy2019.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
5940cce884179e3fe35babb32a8dad574f56dd03d76e6189d9c4f31c9d778cf9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
83571
x-xss-protection
0
server
cafe
etag
1371397039064648979
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Fri, 24 Apr 2020 22:32:14 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200422/r20190131/ Frame 1073
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200422/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200422/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
test_cookie=CheckForPermission
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Thu, 23 Apr 2020 07:38:20 GMT
expires
Thu, 07 May 2020 07:38:20 GMT
content-type
text/html; charset=UTF-8
etag
4094386822458569044
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4444
x-xss-protection
0
cache-control
public, max-age=1209600
age
140034
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
all.js
connect.facebook.net/en_US/
387 KB
112 KB
Script
General
Full URL
https://connect.facebook.net/en_US/all.js?hash=166b801c0df89a3d61c30113af98f419&ua=modern_es6
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
8a718e33c8db4724281a088b140c8402138fac39969df136332dcda268d72e48
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Origin
https://appleinsider.com

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
content-md5
sKCmma6SSD/BUS/NNx7XXA==
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
114482
etag
"90185cfec4868e63b9dc45c54a6a7d56"
x-fb-debug
NMlxa6DaYKbYtpDyHUpVCJq5b4C6PZJsWeAwrfcSbW8APIMvPb1kfAIeHdi4+1fLIW75PU3uqMzqabqF1Q0F3A==
x-fb-trip-id
1850256238
x-fb-content-md5
c230b8333e4b8bba611f39a8586271c5
x-frame-options
DENY
date
Fri, 24 Apr 2020 22:32:14 GMT, Fri, 24 Apr 2020 22:32:14 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
X-FB-Content-MD5
cache-control
public,max-age=31536000,stale-while-revalidate=3600,immutable
timing-allow-origin
*
expires
Sat, 24 Apr 2021 22:20:41 GMT
collect
www.google-analytics.com/r/
35 B
104 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j81&a=592033712&t=pageview&_s=1&dl=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&ul=en-us&de=windows-1252&dt=Two%20Apple%20Mail%20vulnerabilities%20being%20used%20to%20target%20iPhone%2C%20iPad%20users&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IAhAAEAB~&jid=837877905&gjid=220673970&cid=426319040.1587767535&tid=UA-280331-5&_gid=1866757278.1587767535&_r=1&z=13579438
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:817::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:14 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
303691330110002
connect.facebook.net/signals/config/
447 KB
112 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/303691330110002?v=2.9.15&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f02d:12:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
f8fb185917173c639e9c7598722f056ce72deaf62b098294270f33e06016842f
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-27=":443"; ma=3600
content-length
114917
x-xss-protection
0
pragma
public
x-fb-debug
/hDN9116UeujNVNu4R52dYwAsMRmptTYqOvllTJbVjW9hMMhzCAFnbFAIrKaYJHG6OW5D+SB0UvkBMof0PO/bg==
x-fb-trip-id
1850256238
x-frame-options
DENY
date
Fri, 24 Apr 2020 22:32:14 GMT, Fri, 24 Apr 2020 22:32:14 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
view
securepubads.g.doubleclick.net/pcs/ Frame C90A
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjssiMSRVUNFu6evPfYqH4kOEydQFTqR18_8pGWS3wPeLfbPy2XTCNQSHOzSozrZCc9QAyU_Oz2pQ52JauN4uApcBzpSphjiDGyUDkn7_uh7K6wReIeQRUUfLCCJqn7rX0VPtMda_OylzyltrTF60URkKV8wf4bcSNEi9ZMIVgZdGmgVe3D5evRdT2ybEdozC2J30rzksPd3I0JWNaqLmaue2orfrh-uMC8nyHt26HjpJEccqnYDHAoQIgt7PKGLwP0c&sai=AMfl-YR99RovLeKCBffoLp-YIOFP9_EZ7LPS6JD7wXi1zc3GUlqUElyIyqYE1ws5AfHaZJ43oLbxehINqBb9_f4jU0XDvqiCCJXQmLGFlCl-aQ&sig=Cg0ArKJSzGtgPGBsZgepEAE&urlfix=1&adurl=
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:14 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:14 GMT
viewJScript
adserver1.backbeatmedia.com/servlet/ajrotator/16829/1/ Frame C90A
Redirect Chain
  • https://bullseye.backbeatmedia.com/bullseye/adserver/16829/1/viewJScript?pool=16821&type=13&rnd=468266789&zone=5000&optcode=false&redirect=ajs
  • https://adserver1.backbeatmedia.com/servlet/ajrotator/16829/1/viewJScript?optcode=false&pool=16821&redirect=ajs&rnd=468266789&type=13&zone=5000&keywords=platmac
2 KB
875 B
Script
General
Full URL
https://adserver1.backbeatmedia.com/servlet/ajrotator/16829/1/viewJScript?optcode=false&pool=16821&redirect=ajs&rnd=468266789&type=13&zone=5000&keywords=platmac
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.62.116.115 Springfield, United States, ASN30633 (LEASEWEB-USA-WDC-01, US),
Reverse DNS
adserver1.backbeatmedia.com
Software
nginx /
Resource Hash
b442b6ac5637acb08948cb4f5888a7f70ea2729e8fea13d9119ea03acee622c0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
gzip
server
nginx
front-end-https
on
p3p
policyref="http://adserver1.backbeatmedia.com/p3p/RotatorPolicyRef.xml", CP="NOI DSP COR CURa DEVa TAIa OUR SAMa NOR STP NAV STA LOC"
status
200
cache-control
private, max-age=0, no-cache, no-store
content-type
application/x-javascript
expires
Tue, 01 Jan 2000 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
server
nginx
status
302
front-end-https
on
location
https://adserver1.backbeatmedia.com:443/servlet/ajrotator/16829/1/viewJScript?optcode=false&pool=16821&redirect=ajs&rnd=468266789&type=13&zone=5000&keywords=platmac
cache-control
private, max-age=0, no-cache, no-store
content-length
0
expires
Tue, 01 Jan 2000 00:00:00 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame C90A
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e9da94ab296f88c3a9ff801d4fbd5c551d103db3440da42651ef0aef7e0f4601
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587573036175118"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28297
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:14 GMT
osd.js
www.googletagservices.com/activeview/js/current/
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2a902f3f6bb291138692567054de342c7482edfe90db9f3d2bab061351320386
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:14 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587573036175118"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27875
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:14 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 451B
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&h=160&slotname=4663193548&adk=911533265&adf=1328042817&w=700&lmt=1587767534&psa=0&guci=1.2.0.0.2.2.0.0&format=700x160&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767534780&bpp=25&bdt=466&idt=178&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=6427659969387&frm=20&pv=2&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=34905008712&dssz=29&mdo=0&mso=67108864&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=287&ady=2171&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=3&uci=a!3&btvi=1&fsb=1&xpc=MKEuD3FsQM&p=https%3A//appleinsider.com&dtd=188
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200422/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2892341250670811&output=html&h=160&slotname=4663193548&adk=911533265&adf=1328042817&w=700&lmt=1587767534&psa=0&guci=1.2.0.0.2.2.0.0&format=700x160&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767534780&bpp=25&bdt=466&idt=178&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&correlator=6427659969387&frm=20&pv=2&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=34905008712&dssz=29&mdo=0&mso=67108864&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=287&ady=2171&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=3&uci=a!3&btvi=1&fsb=1&xpc=MKEuD3FsQM&p=https%3A//appleinsider.com&dtd=188
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmX3M0U4MiNjoiaZPM_4yT6W-hIwJSWtMVnTi-CBOIyaDiusoMfnxLZBVIG
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Fri, 24 Apr 2020 22:32:15 GMT
server
cafe
content-length
20258
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
embed.js
forums.appleinsider.com//js/
13 KB
3 KB
Script
General
Full URL
https://forums.appleinsider.com//js/embed.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
cd872851125ba6270e1b3245a3af9817eb638999f3b64345974f150596dca268

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 26 Jan 2017 17:29:29 GMT
server
cloudflare
age
6871
etag
W/"3501-54702b105b040-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=18000
cf-ray
58934775bd90074a-FRA
cf-request-id
024feafd940000074acb0a7200000001
view
securepubads.g.doubleclick.net/pcs/ Frame 5448
0
0
Fetch
General
Full URL
https://securepubads.g.doubleclick.net/pcs/view?xai=AKAOjsvCD6iTN8q7ZKQPEx03QYd2U3W7QJGlQ-5qsriYoD7PW6R28dO_bHy2NxgcS9ej6RAitoOSr9m2UxkhQV1fCwsPoc2Adk7-3m0lk_NakGT1Q8xskHVMrjW_FpDKrqRBGqeeQXzGdhdtgzPjmSvg5Cm7IbtYLloejhxvRSg0Cv7W75LRSZG1VUaufyLVTNirXt8pyBOgVBn4jSWiFI9fxvrKk7jSRqHw4UtBIOxHlMBTEkjyepQR01a_sA0ywH7oJU47&sai=AMfl-YRAkUxcC8H373rO-_UP4ofP9OBauDo3aeJRJtHEpZClJFzVjehJA0h51B5uy96Vli9mnNbyoEH6rq2hyhV8aj13mgmiZnBHPCyHTgLP4A&sig=Cg0ArKJSzLFWIOEqTAyyEAE&urlfix=1&adurl=
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:15 GMT
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
private
content-type
image/gif
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
viewJScript
adserver1.backbeatmedia.com/servlet/ajrotator/16829/4/ Frame 5448
Redirect Chain
  • https://bullseye.backbeatmedia.com/bullseye/adserver/16829/4/viewJScript?pool=16822&type=3158&zone=5000&optcode=false&rnd=1779856921&redirect=ajs
  • https://adserver1.backbeatmedia.com/servlet/ajrotator/16829/4/viewJScript?optcode=false&pool=16822&redirect=ajs&rnd=1779856921&type=3158&zone=5000&keywords=platmac
2 KB
875 B
Script
General
Full URL
https://adserver1.backbeatmedia.com/servlet/ajrotator/16829/4/viewJScript?optcode=false&pool=16822&redirect=ajs&rnd=1779856921&type=3158&zone=5000&keywords=platmac
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
108.62.116.115 Springfield, United States, ASN30633 (LEASEWEB-USA-WDC-01, US),
Reverse DNS
adserver1.backbeatmedia.com
Software
nginx /
Resource Hash
adec685cadb9cee452220ed3b5256e5f827907b4280750520825cf084c02db0e

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
gzip
server
nginx
front-end-https
on
p3p
policyref="http://adserver1.backbeatmedia.com/p3p/RotatorPolicyRef.xml", CP="NOI DSP COR CURa DEVa TAIa OUR SAMa NOR STP NAV STA LOC"
status
200
cache-control
private, max-age=0, no-cache, no-store
content-type
application/x-javascript
expires
Tue, 01 Jan 2000 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
server
nginx
status
302
front-end-https
on
location
https://adserver1.backbeatmedia.com:443/servlet/ajrotator/16829/4/viewJScript?optcode=false&pool=16822&redirect=ajs&rnd=1779856921&type=3158&zone=5000&keywords=platmac
cache-control
private, max-age=0, no-cache, no-store
content-length
0
expires
Tue, 01 Jan 2000 00:00:00 GMT
osd_listener.js
www.googletagservices.com/activeview/js/current/ Frame 5448
74 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd_listener.js?cache=r20110914
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e9da94ab296f88c3a9ff801d4fbd5c551d103db3440da42651ef0aef7e0f4601
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587573036175118"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
28297
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:15 GMT
sb_icon_latesthl.gif
photos5.appleinsider.com/v9/images/
689 B
819 B
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/sb_icon_latesthl.gif
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5a9f2a69e3173ce4355b32d9fb5197247ac736d557bfbd51c84a96e5e213e901

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
cf-cache-status
HIT
age
134853
status
200
content-length
689
cf-request-id
024feafd990000074acb0a8200000001
last-modified
Thu, 03 Aug 2017 12:18:33 GMT
server
cloudflare
etag
"59831499-2b1"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934775cd9d074a-FRA
expires
Thu, 30 Apr 2020 09:04:41 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 28F7
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=3749009951&adk=918026417&adf=3805360974&w=300&lmt=1587767535&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535003&bpp=3&bdt=689&idt=3&shv=r20200422&cbv=r20190131&ptt=5&saldr=sa&abxe=1&prev_fmts=700x160&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=558480138530&dssz=33&mdo=0&mso=67108864&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=951&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=4&uci=a!4&fsb=1&xpc=POQF44yLP4&p=https%3A//appleinsider.com&dtd=7
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200422/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=3749009951&adk=918026417&adf=3805360974&w=300&lmt=1587767535&guci=1.2.0.0.2.2.0.0&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535003&bpp=3&bdt=689&idt=3&shv=r20200422&cbv=r20190131&ptt=5&saldr=sa&abxe=1&prev_fmts=700x160&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=558480138530&dssz=33&mdo=0&mso=67108864&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=951&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=4&uci=a!4&fsb=1&xpc=POQF44yLP4&p=https%3A//appleinsider.com&dtd=7
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmX3M0U4MiNjoiaZPM_4yT6W-hIwJSWtMVnTi-CBOIyaDiusoMfnxLZBVIG
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Fri, 24 Apr 2020 22:32:15 GMT
server
cafe
content-length
200
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
/
www.facebook.com/tr/
44 B
249 B
Image
General
Full URL
https://www.facebook.com/tr/?id=303691330110002&ev=PageView&dl=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&rl=&if=false&ts=1587767535059&sw=1600&sh=1200&v=2.9.15&r=stable&ec=0&o=30&fbp=fb.1.1587767535058.1673387955&it=1587767534888&coo=false&rqm=GET
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT, Fri, 24 Apr 2020 22:32:15 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-27=":443"; ma=3600
content-length
44
expires
Fri, 24 Apr 2020 22:32:15 GMT
displayAd.js
s.tribalfusion.com/
679 B
821 B
Script
General
Full URL
https://s.tribalfusion.com/displayAd.js?dver=0.8&th=8720513786
Requested by
Host: tags.expo9.exponential.com
URL: https://tags.expo9.exponential.com/tags/AppleInsider/ROS/tags.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.77.210.70 , Netherlands, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
a23-77-210-70.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7177684374feacedcf7794573c6f3fe51b15c7ce0e531e25e455a416415312d8

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
gzip
x-function
153
x-reuse-index
44
vary
Accept-Encoding
p3p
CP="NOI DEVo TAIa OUR BUS"
status
200
cache-control
private
last-modified
Tue, 04 Apr 2017 05:09:56 GMT
content-type
application/x-javascript
content-length
332
expires
Thu, 23 Jul 2020 22:32:15 GMT
jquery.appear.js
forums.appleinsider.com/js/library/
1 KB
791 B
Script
General
Full URL
https://forums.appleinsider.com/js/library/jquery.appear.js
Requested by
Host: photos5.appleinsider.com
URL: https://photos5.appleinsider.com/v9/js/header-scripts-concat.min.js?1.04b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
fae99115f3157b9b3dbca9ebdbf689d7d8b790de1b18f9f7bc2371059bcbfb51

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Mon, 22 Aug 2016 07:51:55 GMT
server
cloudflare
age
6872
etag
W/"5c7-53aa45265bcc0-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=18000
cf-ray
589347766eb0074a-FRA
cf-request-id
024feafdff0000074acb0ab200000001
embed.css
forums.appleinsider.com/applications/dashboard/design/
1 KB
582 B
Stylesheet
General
Full URL
https://forums.appleinsider.com/applications/dashboard/design/embed.css
Requested by
Host: forums.appleinsider.com
URL: https://forums.appleinsider.com//js/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
62cfe66953f23f1199ecf39301c83f0e7665967adb41e7527b01c83be3ac6a2d

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Thu, 26 Jan 2017 17:01:32 GMT
server
cloudflare
age
6871
etag
W/"59f-547024d10b300-gzip"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=18000
cf-ray
589347766eb3074a-FRA
cf-request-id
024feafe000000074acb0ac200000001
progress.gif
cd8ba0b44a15c10065fd-24461f391e20b7336331d5789078af53.ssl.cf1.rackcdn.com/images/
1 KB
2 KB
Image
General
Full URL
https://cd8ba0b44a15c10065fd-24461f391e20b7336331d5789078af53.ssl.cf1.rackcdn.com/images/progress.gif
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.233.88 , Ascension Island, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-18-233-88.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
0db4c4e8b18f8b97a2e31c6c9a73165c0aa88ef219b33bb4bc59fc633fba9aa8

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 24 Apr 2020 22:32:15 GMT
Last-Modified
Wed, 23 Nov 2016 17:18:59 GMT
X-Trans-Id
txb68eced819244e44a7831-005e81bd30dfw1
ETag
ad257c9da4a8da0364ad3ad9908ebb7e
Content-Type
image/png
X-Timestamp
1479921538.92466
Cache-Control
public, max-age=173078
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1284
Expires
Sun, 26 Apr 2020 22:36:53 GMT
j.ad
s.tribalfusion.com/
423 B
806 B
Script
General
Full URL
https://s.tribalfusion.com/j.ad?flashVer=0&ver=1.28&th=8720513786&tagKey=1016110424&site=appleinsider&adSpace=ros&center=1&size=300x250&env=display&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&f=0&p=7459440&tKey=aSmneM3WnCPVfG4PUZbpWTOXaZbPVcmcbs&a=1&adContainerId=richmedia_2&rnd=7457432
Requested by
Host: tags.expo9.exponential.com
URL: https://tags.expo9.exponential.com/tags/AppleInsider/ROS/tags.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.77.210.70 , Netherlands, ASN20940 (AKAMAI-ASN1, EU),
Reverse DNS
a23-77-210-70.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
840dda9350b05523e4b89181044ead329a29421b30ebca38812d73ebc9d5b290

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
gzip
x-function
101
x-reuse-index
994
vary
Accept-Encoding
p3p
CP="NOI DEVo TAIa OUR BUS"
status
200
cache-control
private, no-cache, no-store, proxy-revalidate
content-type
application/x-javascript; charset=utf-8
content-length
293
expires
0
/
www.facebook.com/tr/
0
31 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundaryx9maAkVl5lYF0lgH

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
date
Fri, 24 Apr 2020 22:32:15 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://appleinsider.com
access-control-allow-credentials
true
alt-svc
h3-27=":443"; ma=3600
content-length
0
ads
googleads.g.doubleclick.net/pagead/ Frame 9031
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=3169902014&adk=896146831&adf=3550264136&w=300&lmt=1587767535&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535611&bpp=1&bdt=1297&idt=2&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160&prev_slotnames=3749009951&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=142970915463766&dssz=39&mdo=0&mso=67109952&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=2144&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=5&uci=a!5&btvi=2&fsb=1&xpc=zto9wFQFzS&p=https%3A//appleinsider.com&dtd=4
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200422/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=3169902014&adk=896146831&adf=3550264136&w=300&lmt=1587767535&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535611&bpp=1&bdt=1297&idt=2&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160&prev_slotnames=3749009951&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=142970915463766&dssz=39&mdo=0&mso=67109952&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=2144&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=5&uci=a!5&btvi=2&fsb=1&xpc=zto9wFQFzS&p=https%3A//appleinsider.com&dtd=4
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmX3M0U4MiNjoiaZPM_4yT6W-hIwJSWtMVnTi-CBOIyaDiusoMfnxLZBVIG
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Fri, 24 Apr 2020 22:32:15 GMT
server
cafe
content-length
201
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
sb_icon_forums.gif
photos5.appleinsider.com/v9/images/
323 B
453 B
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/sb_icon_forums.gif
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3fd9a89a65c9ac72637f3d0293db2ae79f0a53f891119b8d2fcade3cf0c5abb2

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
cf-cache-status
HIT
age
45929
status
200
content-length
323
cf-request-id
024feb00090000074acb0b9200000001
last-modified
Thu, 03 Aug 2017 12:18:33 GMT
server
cloudflare
etag
"59831499-143"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934779ac04074a-FRA
expires
Fri, 01 May 2020 09:46:46 GMT
comments-bubble.png
photos5.appleinsider.com/v9/images/
2 KB
2 KB
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/comments-bubble.png
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e5e711216829cddb78525cf041f5d8439a78f6c07f656ec8ab492692092a8c66

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
cf-cache-status
HIT
age
175053
status
200
content-length
1661
cf-request-id
024feb00090000074acb0ba200000001
last-modified
Thu, 03 Aug 2017 12:18:40 GMT
server
cloudflare
etag
"598314a0-67d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934779ac05074a-FRA
expires
Wed, 29 Apr 2020 21:54:42 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 1B37
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Fri, 24 Apr 2020 22:15:23 GMT
expires
Sat, 24 Apr 2021 22:15:23 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
1012
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=gpt_sz&pvsid=192160441551974&r=160x600&w=160&h=600&a=0
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
extFile1.js
aka-cdn.adtechus.com/apps/431/Ad9760175St3Sz170Sq26082475V2Id1/
51 B
149 B
Script
General
Full URL
https://aka-cdn.adtechus.com/apps/431/Ad9760175St3Sz170Sq26082475V2Id1/extFile1.js
Requested by
Host: adserver.adtechus.com
URL: https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;apid=1A72c76900-867b-11ea-8e77-127f7115e3c4;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:233:df9:e694:9b00:53f:3b95 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frc/8F38) /
Resource Hash
7e2a1e7e9092f6d130df694949bc58974fa861daef783a496aef424f9a362f0d

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
content-encoding
gzip
last-modified
Sat, 18 Apr 2020 00:44:42 GMT
server
ECAcc (frc/8F38)
age
596853
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript
status
200
cache-control
max-age=608400
accept-ranges
bytes
content-length
61
expires
Fri, 01 May 2020 23:32:15 GMT
current
aol-match.dotomi.com/match/bounce/
0
103 B
Image
General
Full URL
https://aol-match.dotomi.com/match/bounce/current?networkId=60&version=1&nuid=1A72c76900-867b-11ea-8e77-127f7115e3c4&gdpr=1&gdpr_consent=&rurl=https%3A%2F%2Fpixel.advertising.com%2Fups%2F55853%2Fsync%3Fuid%3D%24UID%26_origin%3D0%26gdpr%3D1%26gdpr_consent%3D
Requested by
Host: adserver.adtechus.com
URL: https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;apid=1A72c76900-867b-11ea-8e77-127f7115e3c4;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:fa8:8806:12::1400 , Sweden, ASN41041 (VCLK-EU-, SE),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
204
pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
cache-control
no-cache, private, max-age=0, no-store
server
nginx
expires
0
sync
ups.analytics.yahoo.com/ups/56465/
Redirect Chain
  • https://pixel.advertising.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4
  • https://ups.analytics.yahoo.com/ups/56465/sync?_origin=0&redir=true&gdpr=1&gdpr_consent=&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4&verify=true
  • https://pr-bh.ybp.yahoo.com/sync/adtech/1A72c76900-867b-11ea-8e77-127f7115e3c4?gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/56465/sync?uid=y-KpCosZl1lxku004tSknjM98jSaADtkwfWs_c&_origin=0&nsync=0
  • https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-KpCosZl1lxku004tSknjM98jSaADtkwfWs_c&_origin=0&nsync=0&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4
0
1 KB
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-KpCosZl1lxku004tSknjM98jSaADtkwfWs_c&_origin=0&nsync=0&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
18.156.0.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-156-0-31.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://appleinsider.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 24 Apr 2020 22:32:16 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

status
302
date
Fri, 24 Apr 2020 22:32:16 GMT
location
https://ups.analytics.yahoo.com/ups/56465/sync?uid=y-KpCosZl1lxku004tSknjM98jSaADtkwfWs_c&_origin=0&nsync=0&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4
content-length
0
strict-transport-security
max-age=31536000
p3p
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
sync
ups.analytics.yahoo.com/ups/55965/
Redirect Chain
  • https://pixel.quantserve.com/pixel/p-NcBg8UA4xqUFp.gif?idmatch=0&gdpr=1&gdpr_consent=
  • https://pixel.advertising.com/ups/55965/sync?_origin=0&gdpr=1&uid=3DNyB99udlLEMioBjWA-BNFhdgbENXdS32In8w2O
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=3DNyB99udlLEMioBjWA-BNFhdgbENXdS32In8w2O&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4
  • https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=3DNyB99udlLEMioBjWA-BNFhdgbENXdS32In8w2O&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4&verify=true
0
977 B
Image
General
Full URL
https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=3DNyB99udlLEMioBjWA-BNFhdgbENXdS32In8w2O&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4&verify=true
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
18.156.0.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-156-0-31.eu-central-1.compute.amazonaws.com
Software
ATS/7.1.2.106 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 24 Apr 2020 22:32:16 GMT
Server
ATS/7.1.2.106
Connection
keep-alive
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV

Redirect headers

Date
Fri, 24 Apr 2020 22:32:16 GMT
Server
ATS/7.1.2.106
Age
0
Strict-Transport-Security
max-age=31536000
P3P
CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Location
https://ups.analytics.yahoo.com/ups/55965/sync?_origin=0&gdpr=1&uid=3DNyB99udlLEMioBjWA-BNFhdgbENXdS32In8w2O&apid=1A72c76900-867b-11ea-8e77-127f7115e3c4&verify=true
Connection
keep-alive
Content-Length
0
generic
match.adsrvr.org/track/cmf/
70 B
264 B
Image
General
Full URL
https://match.adsrvr.org/track/cmf/generic?ttd_pid=aoladtech&gdpr=1&gdpr_consent=
Requested by
Host: adserver.adtechus.com
URL: https://adserver.adtechus.com/addyn%7C3.0%7C10339.1%7C4664514%7C0%7C170%7CADTECH;apid=1A72c76900-867b-11ea-8e77-127f7115e3c4;cfp=1;rndc=1587767535;loc=100;target=_blank;misc=[TIMESTAMP];rdclick=
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.49.118.177 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-49-118-177.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
8d70b3e6badb6973663b398d297bb32eaedd08826a1af98d0a1cfce5324ffce0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:15 GMT
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
status
200
cache-control
private,no-cache, must-revalidate
content-type
image/gif
content-length
70
scissors_16x16.png
photos5.appleinsider.com/price_guide/
766 B
945 B
Image
General
Full URL
https://photos5.appleinsider.com/price_guide/scissors_16x16.png
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
753633444c7106ac229d63aef581aa570680dac656d1a9df777e80956762c1a2

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
cf-cache-status
HIT
age
45560
status
200
content-length
766
cf-request-id
024feb00170000074acb0bc200000001
last-modified
Mon, 26 Sep 2016 11:12:42 GMT
server
cloudflare
etag
"57e902aa-2fe"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934779bc2e074a-FRA
expires
Fri, 01 May 2020 09:52:55 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame F8C4
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=8864186447&adk=345433569&adf=3374712449&w=300&lmt=1587767535&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535643&bpp=1&bdt=1329&idt=0&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160%2C300x250&prev_slotnames=3749009951&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=142939334940057&dssz=42&mdo=0&mso=67109954&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=3934&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=6&uci=a!6&btvi=3&fsb=1&xpc=nk0qJYaEJV&p=https%3A//appleinsider.com&dtd=3
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200422/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2892341250670811&output=html&h=250&slotname=8864186447&adk=345433569&adf=3374712449&w=300&lmt=1587767535&psa=0&guci=1.2.0.0.2.2.0.0&format=300x250&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&flash=0&wgl=1&adsid=NT&dt=1587767535643&bpp=1&bdt=1329&idt=0&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160%2C300x250&prev_slotnames=3749009951&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=142939334940057&dssz=42&mdo=0&mso=67109954&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=999&ady=3934&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=0&fc=640&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8208&bc=31&ifi=6&uci=a!6&btvi=3&fsb=1&xpc=nk0qJYaEJV&p=https%3A//appleinsider.com&dtd=3
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmX3M0U4MiNjoiaZPM_4yT6W-hIwJSWtMVnTi-CBOIyaDiusoMfnxLZBVIG
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Fri, 24 Apr 2020 22:32:15 GMT
server
cafe
content-length
197
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
footer_bg_white.gif
photos5.appleinsider.com/v9/images/
36 B
160 B
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/footer_bg_white.gif
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6ad12ef3571a24158876144a08353251f56c3b9415a041bfd246a85a0422723a

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
cf-cache-status
HIT
age
45929
status
200
content-length
36
cf-request-id
024feb00260000074acb0bd200000001
last-modified
Thu, 03 Aug 2017 12:18:41 GMT
server
cloudflare
etag
"598314a1-24"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934779dc52074a-FRA
expires
Fri, 01 May 2020 09:46:46 GMT
footer_triangle_up.gif
photos5.appleinsider.com/v9/images/
72 B
209 B
Image
General
Full URL
https://photos5.appleinsider.com/v9/images/footer_triangle_up.gif
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3498becffb4e2d62b0806ced4e079bf1f9aa80f6532f57f3e28c3601525f3c7c

Request headers

Referer
https://photos5.appleinsider.com/v9/css/styles_screen.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
cf-cache-status
HIT
age
577239
status
200
content-length
72
cf-request-id
024feb00270000074acb0bf200000001
last-modified
Thu, 03 Aug 2017 12:18:41 GMT
server
cloudflare
etag
"598314a1-48"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
58934779dc55074a-FRA
expires
Sat, 25 Apr 2020 06:11:36 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 2CD8
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-2892341250670811&output=html&adk=1812271804&adf=3025194257&lmt=1587767535&plat=1%3A32776%2C2%3A32776%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1587767535651&bpp=2&bdt=1337&idt=2&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160%2C300x250%2C300x250&prev_slotnames=3749009951&nras=1&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=185029700943872&dssz=50&mdo=0&mso=67109954&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=6&uci=a!6&fsb=1&dtd=8
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200422/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-2892341250670811&output=html&adk=1812271804&adf=3025194257&lmt=1587767535&plat=1%3A32776%2C2%3A32776%2C8%3A134250504%2C9%3A134250504%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&ea=0&flash=0&pra=7&wgl=1&adsid=NT&dt=1587767535651&bpp=2&bdt=1337&idt=2&shv=r20200422&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=700x160%2C300x250%2C300x250&prev_slotnames=3749009951&nras=1&correlator=6427659969387&frm=20&pv=1&ga_vid=426319040.1587767535&ga_sid=1587767535&ga_hid=592033712&ga_fc=0&iag=0&icsg=185029700943872&dssz=50&mdo=0&mso=67109954&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1585&bih=1200&scr_x=0&scr_y=0&oid=3&psts=AKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8%2CAKB7eCKtCC1NwDs2GB_QIuWdn0hhpjLdDc6O_L41K6YEih70JSBb2dQO1i2vsxR-29p8&pvsid=192160441551974&rx=0&eae=2&fc=896&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=6&uci=a!6&fsb=1&dtd=8
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
IDE=AHWqTUmX3M0U4MiNjoiaZPM_4yT6W-hIwJSWtMVnTi-CBOIyaDiusoMfnxLZBVIG
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
date
Fri, 24 Apr 2020 22:32:15 GMT
server
cafe
content-length
0
x-xss-protection
0
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
widget_iframe.6787510241df65d128e2b60207ad4c25.html
platform.twitter.com/widgets/ Frame 0188
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/widget_iframe.6787510241df65d128e2b60207ad4c25.html?origin=https%3A%2F%2Fappleinsider.com
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/419A) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
5650
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Fri, 24 Apr 2020 22:32:15 GMT
Etag
"9fa476ae827f556d5b037fe43632370d+gzip"
Last-Modified
Tue, 07 Apr 2020 20:47:48 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/419A)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
5825
like.php
www.facebook.com/plugins/ Frame 256B
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df1fa654155028f8%26domain%3Dappleinsider.com%26origin%3Dhttps%253A%252F%252Fappleinsider.com%252Ff35025b3afe91dc%26relation%3Dparent.parent&container_width=236&href=http%3A%2F%2Fwww.facebook.com%2Fpages%2FAppleInsider%2F135590163123753&layout=button_count&locale=en_US&sdk=joey&send=false&show_faces=false&width=100
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=166b801c0df89a3d61c30113af98f419&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df1fa654155028f8%26domain%3Dappleinsider.com%26origin%3Dhttps%253A%252F%252Fappleinsider.com%252Ff35025b3afe91dc%26relation%3Dparent.parent&container_width=236&href=http%3A%2F%2Fwww.facebook.com%2Fpages%2FAppleInsider%2F135590163123753&layout=button_count&locale=en_US&sdk=joey&send=false&show_faces=false&width=100
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
fr=08yiVbg5QQJ4hmHUi..Beo2jv...1.0.Beo2jv.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
4kiwI5sj6WzrHU7OMXcK04vGkYET7q6YBst1MUnzXy2QX0dqrWq5f1KJ/nPb+0QLA1wkpvN8AQH6Y3w4YIKLJA==
date
Fri, 24 Apr 2020 22:32:15 GMT Fri, 24 Apr 2020 22:32:15 GMT
alt-svc
h3-27=":443"; ma=3600
like.php
www.facebook.com/plugins/ Frame 5CBB
0
0
Document
General
Full URL
https://www.facebook.com/plugins/like.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df227428274d66a%26domain%3Dappleinsider.com%26origin%3Dhttps%253A%252F%252Fappleinsider.com%252Ff35025b3afe91dc%26relation%3Dparent.parent&container_width=85&href=http%3A%2F%2Fappleinsider.com%2F%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&layout=button_count&locale=en_US&sdk=joey&send=false&show_faces=false&width=450
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/all.js?hash=166b801c0df89a3d61c30113af98f419&ua=modern_es6
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f12d:83:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
Strict-Transport-Security max-age=15552000; preload
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.facebook.com
:scheme
https
:path
/plugins/like.php?app_id=&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter.php%3Fversion%3D46%23cb%3Df227428274d66a%26domain%3Dappleinsider.com%26origin%3Dhttps%253A%252F%252Fappleinsider.com%252Ff35025b3afe91dc%26relation%3Dparent.parent&container_width=85&href=http%3A%2F%2Fappleinsider.com%2F%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&layout=button_count&locale=en_US&sdk=joey&send=false&show_faces=false&width=450
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
fr=08yiVbg5QQJ4hmHUi..Beo2jv...1.0.Beo2jv.
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
cache-control
private, no-cache, no-store, must-revalidate
pragma
no-cache
strict-transport-security
max-age=15552000; preload
content-encoding
br
timing-allow-origin
*
content-security-policy
default-src * data: blob: 'self';script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;block-all-mixed-content;upgrade-insecure-requests;
vary
Accept-Encoding
x-content-type-options
nosniff
x-xss-protection
0
expires
Sat, 01 Jan 2000 00:00:00 GMT
content-type
text/html; charset="utf-8"
x-fb-debug
GtGY8NCHJ01+/tczUczpTbjECX4C44eTEu/YV5RhzFkbkT34HXF8IDOvUYQzzjS36oDrwHHoMzJWkeu4vzR1Ag==
date
Fri, 24 Apr 2020 22:32:15 GMT Fri, 24 Apr 2020 22:32:15 GMT
alt-svc
h3-27=":443"; ma=3600
engine
dtnspbid.appleinsider.com/ Frame FF41
0
0

cb=gapi.loaded_0
apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.ebk8EhJxLu4.O/m=plusone/rt=j/sv=1/d=1/ed=1/am=wQE/rs=AGLTcCP6GuLd1aTsaaFO6Zp_Rjnyu1Wv5g/
141 KB
49 KB
Script
General
Full URL
https://apis.google.com/_/scs/apps-static/_/js/k=oz.gapi.en_US.ebk8EhJxLu4.O/m=plusone/rt=j/sv=1/d=1/ed=1/am=wQE/rs=AGLTcCP6GuLd1aTsaaFO6Zp_Rjnyu1Wv5g/cb=gapi.loaded_0
Requested by
Host: apis.google.com
URL: https://apis.google.com/js/plusone.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
cf37b78fd604e647f57bec664ab832197cdee0e87ed3c16bb8ae3f428c9554a8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 20 Apr 2020 06:38:51 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 07 Apr 2020 19:43:27 GMT
server
sffe
age
402804
vary
Accept-Encoding, Origin
content-type
text/javascript; charset=UTF-8
status
200
cache-control
public, immutable, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
50286
x-xss-protection
0
expires
Tue, 20 Apr 2021 06:38:51 GMT
button.93a0c25c2d2f3081c705c98c2d9dec0e.js
platform.twitter.com/js/
7 KB
3 KB
Script
General
Full URL
https://platform.twitter.com/js/button.93a0c25c2d2f3081c705c98c2d9dec0e.js
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash
cef013ba053c40f6bfa36baf6b11dca3426b1697bb52bec0902a4746f5f7d169

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 24 Apr 2020 22:32:15 GMT
Content-Encoding
gzip
Last-Modified
Tue, 07 Apr 2020 20:47:38 GMT
Server
ECS (fcn/40D2)
Age
5650
Etag
"0745fc0bb127ba13d716d66761b4628d+gzip"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=315360000
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Content-Length
2298
carousel-1.json
appleinsider.com/carousel/
3 KB
1 KB
XHR
General
Full URL
https://appleinsider.com/carousel/carousel-1.json
Requested by
Host: photos5.appleinsider.com
URL: https://photos5.appleinsider.com/v9/js/header-scripts-concat.min.js?1.04b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PHP/5.6.40
Resource Hash
65780635a9639d082655beb028bebba2631f54b3ad59dcbfb1bfb6e13e2ed878
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Frame-Options sameorigin

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
br
cf-cache-status
DYNAMIC
x-powered-by
PHP/5.6.40
status
200
cf-request-id
024feb010c0000074acb0c8200000001
pragma
no-cache
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
sameorigin
content-type
application/json; charset=ISO-8859-1
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-security-policy
frame-ancestors 'self'
cf-ray
5893477b4eb9074a-FRA
expires
Thu, 19 Nov 1981 08:52:00 GMT
overlay.png
photos5.appleinsider.com/v9/css/images/
935 B
1 KB
Image
General
Full URL
https://photos5.appleinsider.com/v9/css/images/overlay.png
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
951d9e308515beef8fd5bbc9ce5207591b2394bdcf943f9084ad91537422360f

Request headers

Referer
https://photos5.appleinsider.com/v9/css/pg-tables.min.css?1.1s
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:15 GMT
cf-cache-status
HIT
age
44771
status
200
content-length
935
cf-request-id
024feb01120000074acb0c9200000001
last-modified
Tue, 16 May 2017 15:29:37 GMT
server
cloudflare
etag
"591b1ae1-3a7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477b5ec8074a-FRA
expires
Fri, 01 May 2020 10:06:04 GMT
gpt.js
www.googletagservices.com/tag/js/ Frame C90A
42 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
730dfc9f32fe24e2918795c0340c98abcaadcdbfc07b8ee5f95f24b923e82b27
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"496 / 467 of 1000 / last-modified: 1587741537"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
14357
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:16 GMT
truncated
/ Frame C90A
216 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
84936e0d1a688ef7d22e17d4a231394f05cc80e1d139c844b1f5a1cbf1653dcf

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
gpt.js
www.googletagservices.com/tag/js/ Frame 5448
43 KB
14 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
b2c28b28e2e7b0fa1289078a05f3a82fb13455e3684528db35de939685621ffc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"496 / 851 of 1000 / last-modified: 1587741481"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
14373
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:16 GMT
truncated
/ Frame 5448
218 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
88fc27a3e58e955db977bc6d3e9639cc1dd3f92001a9f0e744615b7d4435af24

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
35475-65151-Mail-Zero-Days-l.jpg
photos5.appleinsider.com/gallery/
26 KB
26 KB
Image
General
Full URL
https://photos5.appleinsider.com/gallery/35475-65151-Mail-Zero-Days-l.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5759a12892fced9fdc5f5679756911254c1def670e12cf334c12c1f2ab9269f4

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
198498
status
200
content-length
26888
cf-request-id
024feb01c30000074acb0ce200000001
last-modified
Wed, 22 Apr 2020 14:49:33 GMT
server
cloudflare
etag
"5ea0597d-6908"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477c68dc074a-FRA
expires
Wed, 29 Apr 2020 15:23:57 GMT
35475-65150-Mail-ZeroDay-m.jpg
photos5.appleinsider.com/gallery/
29 KB
29 KB
Image
General
Full URL
https://photos5.appleinsider.com/gallery/35475-65150-Mail-ZeroDay-m.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7dc913c9f6a60f855054fa5a95215a88b6043164f10949d217f85b2c6eae6095

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
65657
status
200
content-length
29743
cf-request-id
024feb01c30000074acb0cf200000001
last-modified
Wed, 22 Apr 2020 14:49:32 GMT
server
cloudflare
etag
"5ea0597c-742f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477c68dd074a-FRA
expires
Fri, 01 May 2020 04:17:59 GMT
follow_button.6787510241df65d128e2b60207ad4c25.en.html
platform.twitter.com/widgets/ Frame 45C0
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/follow_button.6787510241df65d128e2b60207ad4c25.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
5648
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Fri, 24 Apr 2020 22:32:16 GMT
Etag
"c2363f5812c1738fa9b412c4c3a76a27+gzip"
Last-Modified
Tue, 07 Apr 2020 20:47:39 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40D2)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
13813
tweet_button.6787510241df65d128e2b60207ad4c25.en.html
platform.twitter.com/widgets/ Frame 60C4
0
0
Document
General
Full URL
https://platform.twitter.com/widgets/tweet_button.6787510241df65d128e2b60207ad4c25.en.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

Content-Encoding
gzip
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
5650
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Fri, 24 Apr 2020 22:32:16 GMT
Etag
"19c3039cfd5675cf5859e70ff1c2f6e3+gzip"
Last-Modified
Tue, 07 Apr 2020 20:47:45 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40D2)
Vary
Accept-Encoding
X-Cache
HIT
Content-Length
12395
integrator.js
adservice.google.de/adsid/ Frame C90A
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=appleinsider.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame C90A
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=appleinsider.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020042302.js
securepubads.g.doubleclick.net/gpt/ Frame C90A
237 KB
85 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
sffe /
Resource Hash
0b3678d81937a06cba82b9b8d1b69a6e60c1133246d9798e681bf3908aa390bc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 23 Apr 2020 17:07:14 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
87243
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:16 GMT
integrator.js
adservice.google.de/adsid/ Frame 5448
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=appleinsider.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/ Frame 5448
109 B
171 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=appleinsider.com
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:824::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
104
x-xss-protection
0
pubads_impl_2020042001.js
securepubads.g.doubleclick.net/gpt/ Frame 5448
171 KB
63 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
sffe /
Resource Hash
0b810c6b83f3d55da4c3e345113ad863901ff3e382e04170817b853f761dd9f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Apr 2020 20:16:23 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
64174
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:16 GMT
magickeyboardipadpro_carousel.jpg
photos5.appleinsider.com/
9 KB
9 KB
Image
General
Full URL
https://photos5.appleinsider.com/magickeyboardipadpro_carousel.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c5f09d5735985c1c3a9b656f78627f1f8d553cd37160c268871835abc1797d6

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
171267
status
200
content-length
9054
cf-request-id
024feb029c0000074acb0ea200000001
last-modified
Wed, 22 Apr 2020 22:52:25 GMT
server
cloudflare
etag
"5ea0caa9-235e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477dcc1b074a-FRA
expires
Wed, 29 Apr 2020 22:57:49 GMT
35273-64635-apple-airpods-deals-carousel-o.jpg
photos5.appleinsider.com/gallery/
14 KB
14 KB
Image
General
Full URL
https://photos5.appleinsider.com/gallery/35273-64635-apple-airpods-deals-carousel-o.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f5885310e0561b9b32fd315e633ee119e34bd71c290ea0fc1efc5d43cf6281c8

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
175869
status
200
content-length
14455
cf-request-id
024feb029c0000074acb0eb200000001
last-modified
Wed, 08 Apr 2020 21:34:21 GMT
server
cloudflare
etag
"5e8e435d-3877"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477dcc1c074a-FRA
expires
Wed, 29 Apr 2020 21:41:07 GMT
iphonese2020white_carousel.jpg
photos5.appleinsider.com/
4 KB
4 KB
Image
General
Full URL
https://photos5.appleinsider.com/iphonese2020white_carousel.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9dc4b53f18850d514306cb794e6a5c79f3b344d976803ff9c4117d48e2a4fc3b

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
171011
status
200
content-length
3737
cf-request-id
024feb029c0000074acb0ec200000001
last-modified
Wed, 22 Apr 2020 22:56:57 GMT
server
cloudflare
etag
"5ea0cbb9-e99"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477dcc1d074a-FRA
expires
Wed, 29 Apr 2020 23:02:05 GMT
logitechcomboreview_carousel.jpg
photos5.appleinsider.com/
11 KB
12 KB
Image
General
Full URL
https://photos5.appleinsider.com/logitechcomboreview_carousel.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e270323694d52d9c58f033c07dc6253709012115fbe5e63024c52e64984aa54e

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
157372
status
200
content-length
11634
cf-request-id
024feb029c0000074acb0ed200000001
last-modified
Thu, 23 Apr 2020 02:41:30 GMT
server
cloudflare
etag
"5ea1005a-2d72"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477dcc1f074a-FRA
expires
Thu, 30 Apr 2020 02:49:24 GMT
mbashadow_carousel.jpg
photos5.appleinsider.com/
7 KB
7 KB
Image
General
Full URL
https://photos5.appleinsider.com/mbashadow_carousel.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
3b906225468ae2ba8bd2bc3b8465b551452b8733b84b87fd50459c4a3e19070a

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
66005
status
200
content-length
6775
cf-request-id
024feb029c0000074acb0ee200000001
last-modified
Fri, 17 Apr 2020 02:19:13 GMT
server
cloudflare
etag
"5e991221-1a77"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477dcc21074a-FRA
expires
Fri, 01 May 2020 04:12:11 GMT
iphonese2020_carousel.jpg
photos5.appleinsider.com/
4 KB
4 KB
Image
General
Full URL
https://photos5.appleinsider.com/iphonese2020_carousel.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
f4f65218d1d90f9d80acacbd33c35afc2a5d3e416a5932f5e22f65487b0b6e47

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
153671
status
200
content-length
3998
cf-request-id
024feb029c0000074acb0ef200000001
last-modified
Thu, 16 Apr 2020 03:47:58 GMT
server
cloudflare
etag
"5e97d56e-f9e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477dcc23074a-FRA
expires
Thu, 30 Apr 2020 03:51:05 GMT
truedepth_carousel.jpg
photos5.appleinsider.com/
11 KB
12 KB
Image
General
Full URL
https://photos5.appleinsider.com/truedepth_carousel.jpg
Requested by
Host: appleinsider.com
URL: https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7c9d541169f8c51d9775f61241048f460538225be97e1f3a06aac686b7fd4254

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
cf-cache-status
HIT
age
171458
status
200
content-length
11644
cf-request-id
024feb02f80000074acb100200000001
last-modified
Tue, 17 Oct 2017 02:30:48 GMT
server
cloudflare
etag
"59e56b58-2d7c"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
5893477e5d26074a-FRA
expires
Wed, 29 Apr 2020 22:54:38 GMT
jot.html
platform.twitter.com/ Frame 6B2E
Redirect Chain
  • https://syndication.twitter.com/i/jot
  • https://platform.twitter.com/jot.html
0
0
Document
General
Full URL
https://platform.twitter.com/jot.html
Requested by
Host: platform.twitter.com
URL: https://platform.twitter.com/widgets.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:234:46c:e8b:1e2f:2bd:694 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECS (fcn/40D2) /
Resource Hash

Request headers

Host
platform.twitter.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
personalization_id="v1_XOnEVZrVrCc5ugTx2kylUg=="
Upgrade-Insecure-Requests
1
Origin
https://appleinsider.com
Content-Type
application/x-www-form-urlencoded
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Accept-Ranges
bytes
Access-Control-Allow-Methods
GET
Access-Control-Allow-Origin
*
Age
5650
Cache-Control
public, max-age=315360000
Content-Type
text/html; charset=utf-8
Date
Fri, 24 Apr 2020 22:32:16 GMT
Etag
"d9592a6c704736fa4da218d4357976dd"
Last-Modified
Tue, 07 Apr 2020 20:48:49 GMT
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
Server
ECS (fcn/40D2)
X-Cache
HIT
Content-Length
80

Redirect headers

status
302 302 Found
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
content-length
0
content-type
text/html;charset=utf-8
date
Fri, 24 Apr 2020 22:32:16 GMT
expires
Tue, 31 Mar 1981 05:00:00 GMT
last-modified
Fri, 24 Apr 2020 22:32:16 GMT
location
https://platform.twitter.com/jot.html
pragma
no-cache
server
tsa_o
strict-transport-security
max-age=631138519
x-connection-hash
bdcb3934a4226f602be2bb49e6e427fa
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-response-time
115
x-transaction
00be12cf005322a3
x-tsa-request-body-time
3
x-twitter-response-tags
BouncerCompliant
x-xss-protection
0
ads
securepubads.g.doubleclick.net/gampad/ Frame C90A
4 KB
2 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=4270103999706886&correlator=1460515866237464&output=ldjh&impl=fifs&adsid=NT&eid=21065959%2C20194812%2C21065202&vrg=2020042302&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200424&iu_parts=3714934%2CAI_LDR_default1&enc_prev_ius=%2F0%2F1&prev_iu_szs=728x90&cookie=ID%3Dc8184389770f6936%3AT%3D1587767534%3AS%3DALNI_MY31ANI3exNWEcSuOH1Wq3eJCWNNA&cdm=appleinsider.com&bc=31&abxe=1&lmt=1587767536&dt=1587767536560&dlt=1587767534901&idt=1581&ea=0&frm=23&biw=1585&bih=1200&isw=728&ish=90&oid=3&adxs=571&adys=66&adks=4237814344&ucis=p5iw3d43woi7&ifi=1&ifk=3186396165&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=1&iag=3&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&top=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&dssz=14&icsg=2722&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=728x90&msz=728x-1&ga_vid=426319040.1587767535&ga_sid=1587767537&ga_hid=443207404&ga_fc=true&fws=256&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
cafe /
Resource Hash
ab1f1fd1410196f96bf77a4c662831e63b84409c24763f2bffe1f0b62fa604bf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1904
x-xss-protection
0
google-lineitem-id
47413254
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
20041699014
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://appleinsider.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame C90A
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

ads
securepubads.g.doubleclick.net/gampad/ Frame 5448
4 KB
2 KB
XHR
General
Full URL
https://securepubads.g.doubleclick.net/gampad/ads?gdfp_req=1&pvsid=3980429286656127&correlator=2605294471009745&output=ldjh&impl=fifs&adsid=NT&vrg=2020042001&guci=1.2.0.0.2.2.0.0&sc=1&sfv=1-0-37&ecs=20200424&iu_parts=3714934%2CAI_MREC_default&enc_prev_ius=%2F0%2F1&prev_iu_szs=300x250&cookie=ID%3Dc8184389770f6936%3AT%3D1587767534%3AS%3DALNI_MY31ANI3exNWEcSuOH1Wq3eJCWNNA&cdm=appleinsider.com&bc=31&abxe=1&lmt=1587767536&dt=1587767536592&dlt=1587767534994&idt=1587&ea=0&frm=23&biw=1585&bih=1200&isw=300&ish=250&oid=3&adxs=999&adys=264&adks=2130608758&ucis=yf2qjx1p65fy&ifi=1&ifk=630132718&u_tz=120&u_his=2&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_sd=1&flash=0&nhd=1&iag=3&url=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&top=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&dssz=14&icsg=2722&std=0&vis=1&dmc=8&scr_x=0&scr_y=0&psz=300x250&msz=300x-1&ga_vid=426319040.1587767535&ga_sid=1587767537&ga_hid=856903524&ga_fc=true&fws=256&ohw=0
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
cafe /
Resource Hash
b82d4c8d2dc68df2e7d230c7937a99129d0851688addccf467f313b65dd37b05
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
br
x-content-type-options
nosniff
google-mediationgroup-id
-2
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
1909
x-xss-protection
0
google-lineitem-id
47407854
pragma
no-cache
server
cafe
google-mediationtag-id
-2
google-creative-id
20041493334
content-type
text/plain; charset=UTF-8
access-control-allow-origin
https://appleinsider.com
cache-control
no-cache, must-revalidate
access-control-allow-credentials
true
timing-allow-origin
*
expires
Fri, 01 Jan 1990 00:00:00 GMT
pubads_impl_rendering_2020042001.js
securepubads.g.doubleclick.net/gpt/ Frame 5448
67 KB
24 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
sffe /
Resource Hash
4e84d85a31c26a182e31a0e7e97f1393690c5b5756a00201ca7752a253c79998
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 20 Apr 2020 20:16:23 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
24855
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:16 GMT
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 5448
0
0
Other
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

/
match.adsrvr.org/track/upb/ Frame 8830
Redirect Chain
  • https://insight.adsrvr.org/track/up?adv=ax523nj&ref=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&upid=8i0zrrx&upv...
  • https://match.adsrvr.org/track/upb/?adv=ax523nj&ref=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&upid=8i0zrrx&upv...
0
0
Document
General
Full URL
https://match.adsrvr.org/track/upb/?adv=ax523nj&ref=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&upid=8i0zrrx&upv=1.1.0
Requested by
Host: js.adsrvr.org
URL: https://js.adsrvr.org/up_loader.1.1.0.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.49.118.177 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-49-118-177.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash

Request headers

:method
GET
:authority
match.adsrvr.org
:scheme
https
:path
/track/upb/?adv=ax523nj&ref=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&upid=8i0zrrx&upv=1.1.0
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
TDID=4de87d25-35b6-4479-b266-5bc3b9c2e809
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
date
Fri, 24 Apr 2020 22:32:16 GMT
content-type
text/html
cache-control
private,no-cache, must-revalidate
pragma
no-cache
x-aspnet-version
4.0.30319
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"

Redirect headers

status
302
date
Fri, 24 Apr 2020 22:32:16 GMT
content-type
text/html; charset=utf-8
location
https://match.adsrvr.org/track/upb/?adv=ax523nj&ref=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&upid=8i0zrrx&upv=1.1.0
cache-control
private,no-cache, must-revalidate
pragma
no-cache
x-aspnet-version
4.0.30319
set-cookie
TDID=4de87d25-35b6-4479-b266-5bc3b9c2e809; domain=.adsrvr.org; expires=Sat, 24-Apr-2021 22:32:16 GMT; path=/; secure; SameSite=None
p3p
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV"
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020042001&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
6be0e00538fcb4cd572ed3fea670d42f84a772632a1b22699a68dd264a5e6c2f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5220
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js?21065952
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:16 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 81C4
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Fri, 24 Apr 2020 22:15:19 GMT
expires
Sat, 24 Apr 2021 22:15:19 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1017
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame B8E5
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html?n=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Fri, 24 Apr 2020 21:07:32 GMT
expires
Sat, 24 Apr 2021 21:07:32 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
5084
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame C90A
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2a902f3f6bb291138692567054de342c7482edfe90db9f3d2bab061351320386
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587573036175118"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27875
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:16 GMT
sodar
pagead2.googlesyndication.com/getconfig/ Frame C90A
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020042302&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e8362508ec64c07c54169d14cbd114111d0812cb96a62dd3672b53de1c510225
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5196
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/ Frame C90A
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042302.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:16 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:16 GMT
gen_204
pagead2.googlesyndication.com/pagead/
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020042001&jk=192160441551974&bg=!m5ilmIBYeVUNjFPVGYcCAAAATlIAAAAdmQFcW-LAoP_rAC2XUpX7I1WGkvU590BlZFUGJfqFmZX0Uo12sM6SIH0U1F8DgZxya6w3O3EmPhOpSaokgij7_Nt98F1SUMQnwTgQq-QDxW-xn53glHvYJdXogxvnpEYQwvorAwkWwk06IzsigBidIY326-jLmb9KC8SnlktLCIgoYxkOcKeRGHrkeE0EXptoptrK0CAHj2Y_ns2mitRRFwKqRLO5TDPqXD68hyKfOk2zcqHuI0fi5X5MWb4SnggPjv6jP8RHfdMXPoKCodMNXMBc0ax0_T_cPWv_zTchASzSL2nmIHvpA6k0I1YjWs4ESvWxhw9qQotfvBt-qqfbFJ5RzHMXG-EP3nARs8Z7Pj4KQLfZIAbrMK0RlUP5X4OSiemhw-PABCeUPMa3iZeLn48hMuGiEMLCxG4s0D7cuqnmAIy1O-wcIRUsQUSFmXX66tx2mSGIvd8ABcZyEBjp
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:16 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame 334D
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Fri, 24 Apr 2020 22:15:19 GMT
expires
Sat, 24 Apr 2021 22:15:19 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1017
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
container.html
tpc.googlesyndication.com/safeframe/1-0-37/html/ Frame 36E8
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/safeframe/1-0-37/html/container.html?n=1
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/safeframe/1-0-37/html/container.html?n=1
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
timing-allow-origin
*
content-length
2973
date
Fri, 24 Apr 2020 21:07:32 GMT
expires
Sat, 24 Apr 2021 21:07:32 GMT
last-modified
Thu, 21 Nov 2019 16:01:11 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, immutable, max-age=31536000
age
5085
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
osd.js
www.googletagservices.com/activeview/js/current/ Frame 5448
74 KB
27 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2020042001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
2a902f3f6bb291138692567054de342c7482edfe90db9f3d2bab061351320386
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1587573036175118"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
27875
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:17 GMT
sodar
pagead2.googlesyndication.com/getconfig/ Frame 5448
7 KB
5 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gpt&tv=2020042001&st=env
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
21470644f5283d1b3d306d6b62d7eaf877b6f9b43d9b5326ea849a09f7a91d60
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

timing-allow-origin
*
date
Fri, 24 Apr 2020 22:32:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5292
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/ Frame 5448
14 KB
5 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_rendering_2020042001.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
a47f17d6ebbf4621d8fe87ab790d8d8fb5c3086629194d9ff2d64faaa6e46ab6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1582746470043195"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
5456
x-xss-protection
0
expires
Fri, 24 Apr 2020 22:32:17 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/209/ Frame DEC5
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/209/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80b::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/209/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
5727
date
Fri, 24 Apr 2020 22:15:19 GMT
expires
Sat, 24 Apr 2021 22:15:19 GMT
last-modified
Tue, 25 Feb 2020 17:32:01 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1018
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050=":443"; ma=2592000
gen_204
pagead2.googlesyndication.com/pagead/ Frame C90A
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020042302&jk=4270103999706886&bg=!ammlaXFYmD4fixSxMckCAAAAaFIAAAAPmQFiAsJ1mWmq5fbXyQHVRDye2egaQ298Kb4b-lkUan1scSoguzcxIkfYVnnQEEe-tzO2TxgOMib4MSz5ELKjtyS2pqvscABy5c6LEWLd4AgAu9CiJJH7wVEZO3bJS7Fb6vka0hElXBpEGAzZEctC-abpoZGgr8Wg4xT28mUSnjB3vYGwQjc1BRKyoqas9Eocy825-Svt1_W9Dsbm-cqq3ApXc6IXOHSDDGfUXMhlRHNHP_HA6pp4mh8VDioxklxToaD9RnI2my4sVFKHtGj_h-zO0NauwpqFKiVsg2JWiFRpyDy_CwpFzCp7BWHLZ8Vy7gfOqdaoce3Sbp3ngJrwfAQZFK-3cDYfJa3gICuByJ-VPIeOOPli0LJtHOevHJKIjQ0smUywaS9j7Bp0InLZHat9qRzy5-MkHKmJaZn1SSwa4Rc9GB1UHQ6pX7chix3a7M2uxxU3l8qNt1If7lGhCBI_QHTs
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:17 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
gen_204
pagead2.googlesyndication.com/pagead/ Frame 5448
0
58 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=209&t=2&li=gpt_2020042001&jk=3980429286656127&bg=!6Oul6_NY_8U6Z9jAMfICAAAAS1IAAAAQmQFi_Co8efC0nHURq-PjpTlqLV1aoWzWiumCsIhRzn_voPrVsMJWqMT9AJRkyVhONnbDPBsuU1f4ZacB87Bu0_DPvJoZay8bqqwUxF0-9Cr2Oy18FGWlAVHcEmXKaIESUk-7sLfMLGFGR6AKUTLaqf8TFqPIu_WWqK9Qcy8BesunZbXzCkfRV-WmaSNt38M75PHcSRi1qpu7GS681TRzZbhI4QSIkT9gXZ6y0o7p0NcO07wUCqLQqmfpf9FGW9SQFshyh7FowZVqP4iZIsCGuJbOf3O1MEZhPHYmdsA3nRPitoPWW_R_OC2Q43LP4BBs0v2Y-Y4QXW4xN_NoFFr_zZW3UWCRvgPWIidH8_gy4oEGUEcifPj9c33jsUjfHh3jYBtu_XJm5ohW_Zs_tGpMehrHbR35RkZciMSpVXNP9T61BW4HQNI-zzJO7AhbM0cvRmYpbAsk7v_7TUCzYJTnufFW5dM9
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:17 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame C90A
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjssDnGIi6CZvC4k_yFTsECwsLsznMMGv4N0O2x4NW1HqmlZpy9iNvKAHmCtVPXKTshOJWcTONf4HSSy9K8IYL9AVlt3TFIfJ3Fk5HVR7w0k&sig=Cg0ArKJSzECIJv0TTeDbEAE&adk=3914823742&tt=-1&bs=1585%2C1200&mtos=1055,1055,1055,1055,1055&tos=1055,0,0,0,0&p=66,571,156,1299&mcvt=1055&rs=0&ht=0&tfs=174&tls=1277&mc=1&lte=0&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1587767534903&dlt&rpt=1172&isd=0&msd=0&ext&xdi=0&ps=1585%2C4137&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-11-6-10-10-0-0-0&tvt=1272&is=728%2C90&iframe_loc=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&r=v&id=osdim&vs=4&uc=11&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200422
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:17 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
activeview
pagead2.googlesyndication.com/pcs/ Frame 5448
42 B
110 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pcs/activeview?xai=AKAOjstoCH_yWKiu0UGFGrUPus-fTfk5bZ3NZTnXd_QCTWInry76mSrKgRBWip7QnEfo3T3dQlvsSe0ttiGFWUEpHsyQrDXHRet-_wKEZoNMiso&sig=Cg0ArKJSzFscQMf5aJX6EAE&adk=3436827314&tt=-1&bs=1585%2C1200&mtos=1056,1056,1056,1056,1056&tos=1056,0,0,0,0&p=264,999,514,1299&mcvt=1056&rs=0&ht=0&tfs=122&tls=1226&mc=1&lte=0&bas=0&bac=0&met=mue&avms=nio&exg=1&md=2&btr=0&lm=2&rst=1587767534995&dlt&rpt=1090&isd=0&msd=0&ext&xdi=0&ps=1585%2C4137&ss=1600%2C1200&pt=-1&bin=4&deb=1-0-0-11-6-10-10-0-0-0&tvt=1221&is=300%2C250&iframe_loc=https%3A%2F%2Fappleinsider.com%2Farticles%2F20%2F04%2F22%2Ftwo-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users&r=v&id=osdim&vs=4&uc=11&upc=1&tgt=DIV&cl=1&cec=1&wf=0&cac=1&cd=0x0&itpl=19&v=20200422
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 24 Apr 2020 22:32:17 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
magickeyboardipadpro_carousel.jpg
photos5.appleinsider.com/
9 KB
9 KB
Image
General
Full URL
https://photos5.appleinsider.com/magickeyboardipadpro_carousel.jpg
Requested by
Host: photos5.appleinsider.com
URL: https://photos5.appleinsider.com/v9/js/header-scripts-concat.min.js?1.04b
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::6818:1359 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c5f09d5735985c1c3a9b656f78627f1f8d553cd37160c268871835abc1797d6

Request headers

Referer
https://appleinsider.com/articles/20/04/22/two-apple-mail-vulnerabilities-being-used-to-target-iphone-ipad-users
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Fri, 24 Apr 2020 22:32:27 GMT
cf-cache-status
HIT
age
171278
status
200
content-length
9054
cf-request-id
024feb2d9a0000074acb358200000001
last-modified
Wed, 22 Apr 2020 22:52:25 GMT
server
cloudflare
etag
"5ea0caa9-235e"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
cf-ray
589347c29b9d074a-FRA
expires
Wed, 29 Apr 2020 22:57:49 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
dtnspbid.appleinsider.com
URL
https://dtnspbid.appleinsider.com/engine?site=133097;size=1x1;e=0;dt=0;category=;kw=u4f%20rp8tn%20lajt%20nbl6m02aimqkavs%20jnamg%202j6u%20cw%20l9rhmk%20zp0ww6%2C%20jx15%20ubm0k;rnd=(1587767535756)

Verdicts & Comments Add Verdict or Comment

270 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| google_ad_request_done function| $ function| jQuery function| htmlParser function| postscribe function| domready object| LazyAds object| appleInsider object| googletag object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync number| google_srt boolean| google_measure_js_timing string| GoogleAnalyticsObject function| ga function| fbq function| _fbq number| __google_ad_urls_id number| google_unique_id object| gaGlobal function| ttd_dom_ready function| TTDUniversalPixelApi object| adsbygoogle string| ftClick string| ftExpTrack_2214372 string| ftX string| ftY string| ftZ number| ftOBA string| ftContent string| ftCustom string| ft300x250_OOBclickTrack number| ftRandom string| ftBuildTag1 string| ftBuildTag2 string| ftClick_2214372 string| ft_referrer string| ftDomain string| ftTag object| google_ad_modifications object| google_logging_queue function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots boolean| google_apltlad boolean| _gfp_p_ function| google_spfd number| google_lpabyc object| google_sv_map object| google_t12n_vars object| FB object| google_tag_data object| gaplugins object| gaData object| __twttrll object| twttr object| __twttr function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter object| ampInaboxIframes object| ampInaboxPendingMessages object| __google_ad_urls boolean| google_osd_loaded boolean| google_onload_fired function| google_sa_impl object| google_persistent_state_async number| google_global_correlator object| google_prev_clients object| google_jobrunner string| vanilla_forum_url string| vanilla_identifier string| vanilla_discussion_id object| google_ad_client object| google_ad_slot object| google_ad_width object| google_ad_height object| google_ad_block object| google_ad_channel object| google_ad_format object| google_ad_host object| google_ad_host_channel object| google_ad_host_tier_id object| google_ad_layout object| google_ad_layout_key object| google_ad_output object| google_ad_region object| google_ad_section object| google_ad_type object| google_ad_unit_key object| google_ad_dom_fingerprint object| google_ad_semantic_area object| google_adtest object| google_allow_expandable_ads object| google_alternate_ad_url object| google_alternate_color object| google_apsail object| google_captcha_token object| google_city object| google_color_bg object| google_color_border object| google_color_line object| google_color_link object| google_color_text object| google_color_url object| google_container_id object| google_content_recommendation_ad_positions object| google_content_recommendation_columns_num object| google_content_recommendation_rows_num object| google_content_recommendation_ui_type object| google_content_recommendation_use_square_imgs object| google_contents object| google_core_dbp object| google_country object| google_cpm object| google_ctr_threshold object| google_cust_age object| google_cust_ch object| google_cust_criteria object| google_cust_gender object| google_cust_id object| google_cust_interests object| google_cust_job object| google_cust_l object| google_cust_lh object| google_cust_u_url object| google_disable_video_autoplay object| google_bfa object| ebfa object| ebfaca object| google_eids object| google_enable_content_recommendations object| google_enable_ose object| google_encoding object| google_font_face object| google_font_size object| google_frame_id object| google_full_width_responsive_allowed object| efwr object| google_full_width_responsive object| gfwroh object| gfwrow object| gfwroml object| gfwromr object| gfwroz object| gfwrnh object| gfwrnwer object| gfwrnher object| google_gl object| google_hints object| google_image_size object| google_kw object| google_kw_type object| google_lact object| google_language object| google_loeid object| google_max_num_ads object| google_max_radlink_len object| google_max_responsive_height object| google_ml_rank object| google_mtl object| google_native_ad_template object| google_native_settings_key object| google_num_radlinks object| google_num_radlinks_per_unit object| google_only_pyv_ads object| google_override_format object| google_page_url object| google_pgb_reactive object| google_pucrd object| google_referrer_url object| google_region object| google_resizing_allowed object| google_resizing_height object| google_resizing_width object| rpe object| google_responsive_formats object| google_responsive_auto_format object| armr object| google_rl_dest_url object| google_rl_filtering object| google_rl_mode object| google_rt object| google_safe object| google_safe_for_responsive_override object| google_scs object| google_source_type object| google_tag_for_child_directed_treatment object| google_tag_for_under_age_of_consent object| google_tag_origin object| google_tag_partner object| google_targeting object| google_tfs object| google_video_doc_id object| google_video_product_type object| google_video_url_to_fetch object| google_webgl_support object| google_yt_pt object| google_yt_up object| google_package object| google_debug_params object| google_enable_single_iframe object| dash object| google_refresh_count object| google_restrict_data_processing function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| e9 object| e9Manager undefined| e9AdSlots function| expo9_ad object| e9PageData undefined| error object| vanilla string| host_base_url function| onMessage function| checkHash function| stripParam function| processMessage function| scrollPosition function| setHeight function| vanillaUrl boolean| vanilla_lazy_load undefined| A9PIXEL object| expoDisplayAd object| google_image_requests function| css_browser_selector string| c object| aiCarousels function| carousel function| setCookie function| pgAddReadMore function| a number| b string| d string| e string| f object| k object| m string| o boolean| p object| r string| s object| t undefined| u object| v object| gapi object| ___jsl object| gadgets object| osapi object| shindig object| iframer function| ToolbarApi object| iframes function| IframeBase function| Iframe function| IframeProxy function| IframeWindow object| __gapi_jstiming__ string| tempString object| GoogleGcLKhOms

11 Cookies

Domain/Path Name / Value
.facebook.com/ Name: fr
Value: 08yiVbg5QQJ4hmHUi..Beo2jv...1.0.Beo2jv.
.doubleclick.net/ Name: DSID
Value: NO_DATA
.twitter.com/ Name: personalization_id
Value: "v1_XOnEVZrVrCc5ugTx2kylUg=="
.doubleclick.net/ Name: IDE
Value: AHWqTUmX3M0U4MiNjoiaZPM_4yT6W-hIwJSWtMVnTi-CBOIyaDiusoMfnxLZBVIG
.appleinsider.com/ Name: _fbp
Value: fb.1.1587767535058.1673387955
.appleinsider.com/ Name: _ga
Value: GA1.2.426319040.1587767535
.appleinsider.com/ Name: _gid
Value: GA1.2.1866757278.1587767535
.appleinsider.com/ Name: __gads
Value: ID=c8184389770f6936:T=1587767534:S=ALNI_MY31ANI3exNWEcSuOH1Wq3eJCWNNA
appleinsider.com/ Name: PHPSESSID
Value: e2ivss1echf5h3mbglv08ipdi4
.appleinsider.com/ Name: _gat
Value: 1
.appleinsider.com/ Name: __cfduid
Value: dea10e828c44bbbc694abb81ecefe05401587767533

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy frame-ancestors 'self'
X-Frame-Options sameorigin

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ads.pro-market.net
adserver.adtech.advertising.com
adserver.adtechus.com
adserver1.backbeatmedia.com
adservice.google.com
adservice.google.de
aka-cdn.adtechus.com
aol-match.dotomi.com
apis.google.com
appleinsider.com
bullseye.backbeatmedia.com
cd8ba0b44a15c10065fd-24461f391e20b7336331d5789078af53.ssl.cf1.rackcdn.com
connect.facebook.net
dtnspbid.appleinsider.com
forums.appleinsider.com
googleads.g.doubleclick.net
insight.adsrvr.org
js.adsrvr.org
match.adsrvr.org
pagead2.googlesyndication.com
photos5.appleinsider.com
pixel.advertising.com
pixel.quantserve.com
platform.twitter.com
pr-bh.ybp.yahoo.com
s.tribalfusion.com
securepubads.g.doubleclick.net
servedby.flashtalking.com
syndication.twitter.com
tags.expo9.exponential.com
tpc.googlesyndication.com
ups.analytics.yahoo.com
www.facebook.com
www.google-analytics.com
www.googletagservices.com
www.redditstatic.com
dtnspbid.appleinsider.com
104.244.42.8
108.62.116.115
108.62.116.116
143.204.94.29
152.199.21.35
172.217.22.34
18.156.0.31
199.232.53.140
2.16.106.193
2.18.233.88
205.185.216.10
23.77.210.70
23.8.13.110
2606:2800:233:97b6:26be:138a:cba8:bb01
2606:2800:233:df9:e694:9b00:53f:3b95
2606:2800:234:46c:e8b:1e2f:2bd:694
2606:4700:20::6818:1259
2606:4700:20::6818:1359
2a00:1288:110:c305::8000
2a00:1450:4001:80b::2001
2a00:1450:4001:817::200e
2a00:1450:4001:821::2002
2a00:1450:4001:824::2002
2a00:1450:4001:824::200e
2a02:fa8:8806:12::1400
2a03:2880:f02d:12:face:b00c:0:3
2a03:2880:f12d:83:face:b00c:0:25de
52.49.118.177
52.59.74.203
54.246.153.43
91.228.74.217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