URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Submission: On March 23 via api from US

Summary

This website contacted 60 IPs in 4 countries across 47 domains to perform 173 HTTP transactions. The main IP is 2600:9000:2182:6000:3:4b0:de80:93a1, located in United States and belongs to AMAZON-02, US. The main domain is www.wsj.com.
TLS certificate: Issued by Amazon on November 11th 2020. Valid for: a year.
This is the only time www.wsj.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
18 2600:9000:218... 16509 (AMAZON-02)
1 34.253.148.162 16509 (AMAZON-02)
2 142.250.185.162 15169 (GOOGLE)
3 65.9.58.112 16509 (AMAZON-02)
1 13.226.156.142 16509 (AMAZON-02)
2 184.30.25.161 16625 (AKAMAI-AS)
4 13.226.158.204 16509 (AMAZON-02)
1 52.216.169.213 16509 (AMAZON-02)
11 2600:9000:218... 16509 (AMAZON-02)
6 13.226.159.31 16509 (AMAZON-02)
5 99.86.3.71 16509 (AMAZON-02)
2 2.17.181.157 16625 (AKAMAI-AS)
26 2600:9000:206... 16509 (AMAZON-02)
1 2600:9000:206... 16509 (AMAZON-02)
1 54.162.154.79 14618 (AMAZON-AES)
2 34.250.6.25 16509 (AMAZON-02)
1 34.120.133.55 15169 (GOOGLE)
1 52.51.224.103 16509 (AMAZON-02)
1 52.22.122.247 14618 (AMAZON-AES)
2 2a02:26f0:710... 20940 (AKAMAI-ASN1)
1 185.59.220.197 60068 (CDN77 (^_^)/)
13 23.79.129.43 16625 (AKAMAI-AS)
1 2600:9000:211... 16509 (AMAZON-02)
1 2600:9000:211... 16509 (AMAZON-02)
7 147.75.85.120 54825 (PACKET)
2 178.63.12.147 24940 (HETZNER-AS)
1 2a00:1450:400... 15169 (GOOGLE)
1 184.30.24.241 16625 (AKAMAI-AS)
2 34.246.39.225 16509 (AMAZON-02)
1 18.200.157.96 16509 (AMAZON-02)
1 1 99.81.11.244 16509 (AMAZON-02)
2 3 52.214.158.139 16509 (AMAZON-02)
1 2600:9000:218... 16509 (AMAZON-02)
4 151.101.114.133 54113 (FASTLY)
4 65.9.58.66 16509 (AMAZON-02)
1 199.127.207.184 26120 (RHYTHMONE)
1 184.30.25.59 16625 (AKAMAI-AS)
1 3 2.19.34.195 20940 (AKAMAI-ASN1)
5 184.30.25.80 16625 (AKAMAI-AS)
1 2a02:26f0:710... 20940 (AKAMAI-ASN1)
1 52.18.215.87 16509 (AMAZON-02)
1 2 2620:119:50e1... 14413 (LINKEDIN)
1 1 2620:1ec:21::14 8068 (MICROSOFT...)
3 70.42.32.95 13789 (INTERNAP-...)
1 2 185.33.221.11 29990 (ASN-APPNEX)
2 54.77.62.253 16509 (AMAZON-02)
1 35.244.174.68 15169 (GOOGLE)
2 3.231.78.127 14618 (AMAZON-AES)
1 104.108.145.205 16625 (AKAMAI-AS)
1 52.9.156.34 16509 (AMAZON-02)
1 13.32.21.123 16509 (AMAZON-02)
3 65.9.58.22 16509 (AMAZON-02)
4 65.9.58.44 16509 (AMAZON-02)
1 151.101.14.132 54113 (FASTLY)
1 64.74.236.191 22075 (AS-OUTBRAIN)
1 92.123.148.223 16625 (AKAMAI-AS)
1 2a00:f48:2000... 47447 (TTM)
1 151.101.114.110 54113 (FASTLY)
2 54.236.128.245 14618 (AMAZON-AES)
3 162.247.243.147 23467 (NEWRELIC-...)
1 13.226.159.16 16509 (AMAZON-02)
173 60
Apex Domain
Subdomains
Transfer
27 barrons.com
asset.barrons.com
tags.barrons.com
2 MB
22 wsj.net
sts3.wsj.net
images.wsj.net
m.wsj.net
asset.wsj.net
wsjstream.wsj.net
388 KB
21 wsj.com
www.wsj.com
video-api.wsj.com
accounts.wsj.com
1 MB
13 tiqcdn.com
tags.tiqcdn.com
70 KB
11 cxense.com
cdn.cxense.com
api.cxense.com
scomcluster.cxense.com
comcluster.cxense.com
61 KB
9 outbrain.com
widgets.outbrain.com
amplify.outbrain.com
tr.outbrain.com
widget-pixels.outbrain.com
odb.outbrain.com
mcdp-chidc2.outbrain.com
64 KB
6 krxd.net
cdn.krxd.net
beacon.krxd.net
consumer.krxd.net
91 KB
6 privacy-mgmt.com
cdn.privacy-mgmt.com
182 KB
5 newscgp.com
us.tags.newscgp.com
us.pixel.newscgp.com
us.audience.newscgp.com
49 KB
4 imrworldwide.com
secure-us.imrworldwide.com
cdn-gl.imrworldwide.com
8 KB
4 amazon-adsystem.com
c.amazon-adsystem.com
35 KB
4 moatads.com
z.moatads.com
mb.moatads.com
geo.moatads.com
px.moatads.com
72 KB
3 nr-data.net
bam-cell.nr-data.net
2 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
3 KB
3 scorecardresearch.com
sb.scorecardresearch.com
2 KB
3 demdex.net
dpm.demdex.net
dowjones.demdex.net
5 KB
2 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
789 B
2 adnxs.com
ib.adnxs.com
2 KB
2 qualaroo.com
cl.qualaroo.com
dntcl.qualaroo.com
49 KB
2 rlcdn.com
api.rlcdn.com
idsync.rlcdn.com
311 B
2 doubleclick.net
securepubads.g.doubleclick.net
120 KB
1 newrelic.com
js-agent.newrelic.com
16 KB
1 cxpublic.com
content.cxpublic.com
16 KB
1 penews.com
tags.penews.com
3 KB
1 knewz.com
tags.knewz.com
6 KB
1 pagesix.com
tags.pagesix.com
3 KB
1 decider.com
tags.decider.com
3 KB
1 nypost.com
tags.nypost.com
3 KB
1 marketwatch.com
tags.marketwatch.com
3 KB
1 mansionglobal.com
tags.mansionglobal.com
3 KB
1 realtor.com
tags.realtor.com
3 KB
1 ncaudienceexchange.com
www.ncaudienceexchange.com
3 KB
1 postrelease.com
jadserve.postrelease.com
524 B
1 ml314.com
ml314.com
13 KB
1 licdn.com
snap.licdn.com
2 KB
1 ntv.io
s.ntv.io
102 KB
1 videohub.tv
pixel.videohub.tv
354 B
1 everesttech.net
cm.everesttech.net
517 B
1 casalemedia.com
as-sec.casalemedia.com
309 B
1 googlesyndication.com
pagead2.googlesyndication.com
6 KB
1 vidora.com
assets.vidora.com
10 KB
1 rkdms.com
mid.rkdms.com
156 B
1 adsrvr.org
match.adsrvr.org
542 B
1 sessioncam.com
ws.sessioncam.com
304 B
1 amazonaws.com
s3.amazonaws.com
727 B
1 cloudfront.net
d2oh4tlt9mrke9.cloudfront.net
59 KB
1 zqtk.net
segment-data.zqtk.net
1 KB
173 47
Domain Requested by
26 asset.barrons.com www.wsj.com
asset.barrons.com
18 www.wsj.com www.wsj.com
13 tags.tiqcdn.com www.wsj.com
11 images.wsj.net www.wsj.com
7 api.cxense.com www.wsj.com
6 cdn.privacy-mgmt.com www.wsj.com
cdn.privacy-mgmt.com
5 m.wsj.net www.wsj.com
4 c.amazon-adsystem.com www.wsj.com
3 bam-cell.nr-data.net www.wsj.com
3 widgets.outbrain.com www.wsj.com
widgets.outbrain.com
3 sb.scorecardresearch.com 1 redirects www.wsj.com
3 secure-us.imrworldwide.com 2 redirects www.wsj.com
3 sts3.wsj.net www.wsj.com
2 wsjstream.wsj.net www.wsj.com
2 consumer.krxd.net www.wsj.com
2 us.pixel.newscgp.com www.wsj.com
2 beacon.krxd.net www.wsj.com
2 ib.adnxs.com 1 redirects www.wsj.com
2 tr.outbrain.com www.wsj.com
2 px.ads.linkedin.com 1 redirects www.wsj.com
2 us.tags.newscgp.com www.wsj.com
2 cdn.krxd.net www.wsj.com
2 dpm.demdex.net www.wsj.com
2 cdn.cxense.com www.wsj.com
2 video-api.wsj.com www.wsj.com
2 securepubads.g.doubleclick.net www.wsj.com
1 us.audience.newscgp.com www.wsj.com
1 js-agent.newrelic.com www.wsj.com
1 dntcl.qualaroo.com www.wsj.com
1 content.cxpublic.com www.wsj.com
1 mcdp-chidc2.outbrain.com www.wsj.com
1 odb.outbrain.com www.wsj.com
1 tags.penews.com www.wsj.com
1 tags.knewz.com www.wsj.com
1 tags.pagesix.com www.wsj.com
1 tags.decider.com www.wsj.com
1 tags.nypost.com www.wsj.com
1 tags.marketwatch.com www.wsj.com
1 tags.mansionglobal.com www.wsj.com
1 tags.barrons.com www.wsj.com
1 tags.realtor.com www.wsj.com
1 www.ncaudienceexchange.com www.wsj.com
1 log.outbrainimg.com www.wsj.com
1 jadserve.postrelease.com www.wsj.com
1 widget-pixels.outbrain.com www.wsj.com
1 tcheck.outbrainimg.com www.wsj.com
1 idsync.rlcdn.com www.wsj.com
1 www.linkedin.com 1 redirects
1 comcluster.cxense.com www.wsj.com
1 ml314.com www.wsj.com
1 snap.licdn.com www.wsj.com
1 amplify.outbrain.com www.wsj.com
1 s.ntv.io www.wsj.com
1 pixel.videohub.tv www.wsj.com
1 cdn-gl.imrworldwide.com www.wsj.com
1 cm.everesttech.net 1 redirects
1 dowjones.demdex.net www.wsj.com
1 as-sec.casalemedia.com www.wsj.com
1 pagead2.googlesyndication.com www.wsj.com
1 scomcluster.cxense.com www.wsj.com
1 asset.wsj.net www.wsj.com
1 assets.vidora.com www.wsj.com
1 cl.qualaroo.com www.wsj.com
1 mid.rkdms.com www.wsj.com
1 match.adsrvr.org www.wsj.com
1 api.rlcdn.com www.wsj.com
1 px.moatads.com www.wsj.com
1 geo.moatads.com z.moatads.com
1 mb.moatads.com z.moatads.com
1 ws.sessioncam.com www.wsj.com
1 accounts.wsj.com www.wsj.com
1 s3.amazonaws.com www.wsj.com
1 z.moatads.com www.wsj.com
1 d2oh4tlt9mrke9.cloudfront.net www.wsj.com
1 segment-data.zqtk.net www.wsj.com
173 75
Subject Issuer Validity Valid
www.wsj.com
Amazon
2020-11-11 -
2021-12-10
a year crt.sh
*.zqtk.net
Sectigo RSA Domain Validation Secure Server CA
2020-08-13 -
2021-08-25
a year crt.sh
*.g.doubleclick.net
GTS CA 1O1
2021-02-23 -
2021-05-18
3 months crt.sh
sts3.wsj.net
Amazon
2020-08-02 -
2021-09-02
a year crt.sh
*.cloudfront.net
DigiCert Global CA G2
2021-02-22 -
2022-02-21
a year crt.sh
moatads.com
DigiCert SHA2 Secure Server CA
2021-01-21 -
2022-01-25
a year crt.sh
c.amazon-adsystem.com
Amazon
2020-08-04 -
2021-08-02
a year crt.sh
s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2020-08-04 -
2021-08-09
a year crt.sh
images.wsj.net
Amazon
2020-11-09 -
2021-12-08
a year crt.sh
*.privacy-mgmt.com
R3
2021-02-03 -
2021-05-04
3 months crt.sh
m.wsj.net
Amazon
2020-10-21 -
2021-11-20
a year crt.sh
ssl.wsj.com
GeoTrust RSA CA 2018
2020-07-31 -
2021-10-30
a year crt.sh
asset.barrons.com
Amazon
2021-01-22 -
2022-02-19
a year crt.sh
accounts.dowjones.com
Amazon
2020-04-22 -
2021-05-22
a year crt.sh
ws.sessioncam.com
Amazon
2021-03-18 -
2022-04-16
a year crt.sh
*.moatads.com
DigiCert SHA2 Secure Server CA
2019-03-12 -
2021-06-10
2 years crt.sh
*.rlcdn.com
Sectigo RSA Domain Validation Secure Server CA
2021-02-25 -
2022-03-28
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.rkdms.com
Entrust Certification Authority - L1K
2020-10-08 -
2021-10-30
a year crt.sh
*.cxense.com
DigiCert SHA2 Secure Server CA
2020-03-11 -
2021-06-10
a year crt.sh
cl.qualaroo.com
R3
2021-03-10 -
2021-06-08
3 months crt.sh
*.tiqcdn.com
DigiCert SHA2 Secure Server CA
2020-03-16 -
2021-06-15
a year crt.sh
*.vidora.com
Amazon
2021-03-12 -
2022-04-10
a year crt.sh
asset.wsj.net
Amazon
2021-01-22 -
2022-02-19
a year crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2020-03-02 -
2021-04-01
a year crt.sh
*.demdex.net
DigiCert TLS RSA SHA256 2020 CA1
2020-12-02 -
2022-01-02
a year crt.sh
*.imrworldwide.com
DigiCert TLS RSA SHA256 2020 CA1
2021-01-28 -
2022-02-01
a year crt.sh
cdn.krxd.net
DigiCert Global G2 TLS RSA SHA256 2020 CA1
2021-02-08 -
2022-02-07
a year crt.sh
us.tags.newscgp.com
Amazon
2021-03-19 -
2022-04-17
a year crt.sh
*.videohub.tv
Go Daddy Secure Certificate Authority - G2
2020-12-14 -
2022-01-15
a year crt.sh
*.ntv.io
DigiCert SHA2 Secure Server CA
2021-01-25 -
2022-02-01
a year crt.sh
sb.scorecardresearch.com
DigiCert Secure Site ECC CA-1
2020-07-17 -
2021-06-02
a year crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2020-03-09 -
2021-06-08
a year crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
*.ml314.com
Amazon
2021-01-17 -
2022-02-14
a year crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2021-01-06 -
2021-07-05
6 months crt.sh
*.adnxs.com
GeoTrust ECC CA 2018
2021-03-05 -
2022-02-19
a year crt.sh
beacon.krxd.net
DigiCert TLS RSA SHA256 2020 CA1
2021-01-13 -
2022-01-07
a year crt.sh
us.pixel.newscgp.com
Amazon
2020-07-10 -
2021-08-10
a year crt.sh
*.outbrainimg.com
DigiCert Secure Site ECC CA-1
2020-03-26 -
2021-06-25
a year crt.sh
consumer.krxd.net
DigiCert SHA2 Secure Server CA
2020-09-14 -
2021-09-14
a year crt.sh
*.postrelease.com
Amazon
2021-01-28 -
2022-02-26
a year crt.sh
ncaudienceexchange.com
Amazon
2020-09-16 -
2021-10-18
a year crt.sh
tags.knewz.com
Amazon
2021-01-09 -
2022-02-06
a year crt.sh
tags.penews.com
Amazon
2020-07-27 -
2021-08-27
a year crt.sh
cdn-content-production.cxpublic.com
R3
2021-03-18 -
2021-06-16
3 months crt.sh
dntcl.qualaroo.com
R3
2021-03-20 -
2021-06-18
3 months crt.sh
*.newrelic.com
GlobalSign Atlas R3 DV TLS CA 2020
2021-03-22 -
2022-04-23
a year crt.sh
bluegrass.mktdata.dowjones.io
Amazon
2020-09-24 -
2021-10-24
a year crt.sh
*.nr-data.net
DigiCert SHA2 Secure Server CA
2020-02-05 -
2022-02-08
2 years crt.sh
us.audience.newscgp.com
Amazon
2020-06-26 -
2021-07-26
a year crt.sh

This page contains 16 frames:

Primary Page: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Frame ID: AF3A45C3DDC978CCECF289C9EAF05A2B
Requests: 155 HTTP requests in this frame

Frame: https://cdn.privacy-mgmt.com/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
Frame ID: 2C811A3E339C14A2AA24E0B7AE6B4F14
Requests: 6 HTTP requests in this frame

Frame: https://dowjones.demdex.net/dest5.html?d_nsid=undefined
Frame ID: B6D3CD94585DD23B19FE82467D764621
Requests: 1 HTTP requests in this frame

Frame: https://us.tags.newscgp.com/prod/ncg/cookie.html
Frame ID: 25715EE6F9661C886697F47F1B2489A2
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/nanoWidget/externals/cookie/test.html
Frame ID: 78EEC473C3F35D5E5EB1183820E325F4
Requests: 2 HTTP requests in this frame

Frame: https://www.ncaudienceexchange.com/prod/ncg/cookie.html
Frame ID: FF9A0EE5D2CACABA057A4A4EE3FF6B13
Requests: 1 HTTP requests in this frame

Frame: https://tags.realtor.com/prod/ncg/cookie.html
Frame ID: A4A86331AA4894C209812D7574425B1B
Requests: 1 HTTP requests in this frame

Frame: https://tags.barrons.com/prod/ncg/cookie.html
Frame ID: 654925B65D32739C2E94F6F266A45C04
Requests: 1 HTTP requests in this frame

Frame: https://tags.mansionglobal.com/prod/ncg/cookie.html
Frame ID: 8A8E1F434EA86258C235EE8ED3452555
Requests: 1 HTTP requests in this frame

Frame: https://tags.marketwatch.com/prod/ncg/cookie.html
Frame ID: BBF8480321C3B46A06AF2021EF9D2DBD
Requests: 1 HTTP requests in this frame

Frame: https://tags.nypost.com/prod/ncg/cookie.html
Frame ID: 6C93094C54CEA78BE79BD64854B67A26
Requests: 1 HTTP requests in this frame

Frame: https://tags.decider.com/prod/ncg/cookie.html
Frame ID: 7532592180E6A336974386BC1547D3EA
Requests: 1 HTTP requests in this frame

Frame: https://tags.pagesix.com/prod/ncg/cookie.html
Frame ID: 98E13F945DB4ED171D6A9B4308286562
Requests: 1 HTTP requests in this frame

Frame: https://tags.knewz.com/prod/ncg/cookie.html
Frame ID: B4EC2B6C1285A881D5A8602A23A9DAE5
Requests: 1 HTTP requests in this frame

Frame: https://tags.penews.com/prod/ncg/cookie.html
Frame ID: 977BC79BF12D3602D0338655CB842D16
Requests: 1 HTTP requests in this frame

Frame: https://dntcl.qualaroo.com/frame.html
Frame ID: 1914CA2301CBF10D314C40EFFC5B16B3
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Overall confidence: 100%
Detected patterns
  • headers via /\(CloudFront\)$/i

Page Statistics

173
Requests

100 %
HTTPS

21 %
IPv6

47
Domains

75
Subdomains

60
IPs

4
Countries

5075 kB
Transfer

12130 kB
Size

39
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 118
  • https://cm.everesttech.net/cm/dd?d_uuid=13010086674621593890013812748369204575 HTTP 302
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=YFn93AAAAFPCOCkN
Request Chain 119
  • https://secure-us.imrworldwide.com/v60.js HTTP 301
  • https://cdn-gl.imrworldwide.com/v60.js
Request Chain 126
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035148&ns__t=1616510428825&ns_c=UTF-8&c8=Microsoft%20Probes%20Whether%20Leak%20Played%20Role%20in%20Suspected%20Chinese%20Hack%20-%20WSJ&c7=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035148&ns__t=1616510428825&ns_c=UTF-8&c8=Microsoft%20Probes%20Whether%20Leak%20Played%20Role%20in%20Suspected%20Chinese%20Hack%20-%20WSJ&c7=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&c9=&cs_ak_ss=1
Request Chain 134
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=65162&time=1616510428891&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D65162%26time%3D1616510428891%26url%3Dhttps%253A%252F%252Fwww.wsj.com%252Farticles%252Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=65162&time=1616510428891&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&liSync=true
Request Chain 138
  • https://ib.adnxs.com/mapuid?member=7239&user=40b955c4-c195-4a19-8ec2-cf4fcfa12b0b HTTP 307
  • https://ib.adnxs.com/bounce?%2Fmapuid%3Fmember%3D7239%26user%3D40b955c4-c195-4a19-8ec2-cf4fcfa12b0b
Request Chain 145
  • https://secure-us.imrworldwide.com/cgi-bin/m?rnd=1616510429211&ci=us-403743h&js=1&cg=0&ts=cachedClickId?marketerId=00b266f4449d0269d75a7ebfb8cb3bb5e3&vn=6.0.104&cc=1&cd=24&ck=y&je=n&lg=en-US&si=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&sr=1600x1200&tz=1 HTTP 302
  • https://secure-us.imrworldwide.com/cgi-bin/m?rnd=1616510429211&ci=us-403743h&js=1&cg=0&ts=cachedClickId?marketerId=00b266f4449d0269d75a7ebfb8cb3bb5e3&vn=6.0.104&cc=1&cd=24&ck=y&je=n&lg=en-US&si=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&sr=1600x1200&tz=1&ja=1

173 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
www.wsj.com/articles/
647 KB
133 KB
Document
General
Full URL
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Express
Resource Hash
515325453b10e2e036b6b1bbc4775e02f39e507056d443c5b015770150d6c0bf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
www.wsj.com
:scheme
https
:path
/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

content-type
text/html; charset=UTF-8
date
Tue, 23 Mar 2021 14:40:26 GMT
x-powered-by
Express
x-content-type-options
nosniff
x-xss-protection
1; mode=block
cache-control
no-cache, no-store, max-age=0, must-revalidate
expires
Fri, 01 Jan 1990 00:00:00 GMT
pragma
no-cache
x-article-template
snippet
x-info-template
wsj_resp_article_16u_snippet
x-ua-compatible
IE=edge
set-cookie
wsjregion=na%2Cus; Domain=.wsj.com; Path=/; Expires=Thu, 22 Apr 2021 14:40:26 GMT gdprApplies=true; Domain=.wsj.com; Path=/ ccpaApplies=false; Domain=.wsj.com; Path=/ usr_prof_v2=eyJpYyI6MH0%3D; Domain=.wsj.com; Path=/; Expires=Tue, 23 Mar 2021 15:40:26 GMT ab_uuid=c84740c6-b666-489b-971a-62552899e7ba; Domain=.wsj.com; Path=/; Expires=Fri, 21 Mar 2031 14:40:26 GMT usr_bkt=830nwKog3K; Domain=.wsj.com; Path=/; Expires=Fri, 21 Mar 2031 14:40:26 GMT has_optimizely=true; Domain=.wsj.com; Path=/; Expires=Wed, 23 Mar 2022 14:40:26 GMT
content-encoding
gzip
x-cache
Miss from cloudfront
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
4JGKQjRTP8Vror3En-Ypxs7G_28_aBojBJNMvDF4f-h5zcKCxuzpcQ==
dowjones-d8s23j
segment-data.zqtk.net/
2 KB
1 KB
Script
General
Full URL
https://segment-data.zqtk.net/dowjones-d8s23j?url=https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.253.148.162 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-253-148-162.eu-west-1.compute.amazonaws.com
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
4a7ca88c49af98a3bbca1d91f1a58a8e222c3767bb78aa23f32ec7f4ffbee875

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:27 GMT
Content-Encoding
gzip
Last-Modified
Mon, 22 Mar 2021 18:32:00 GMT
Server
nginx/1.10.3 (Ubuntu)
Transfer-Encoding
chunked
Content-Type
application/javascript; charset=UTF-8
Cache-Control
max-age=100292
Connection
keep-alive
Expires
Wed, 24 Mar 2021 18:32:00 GMT
ace.min.js
www.wsj.com/asset/ace/
15 KB
16 KB
Script
General
Full URL
https://www.wsj.com/asset/ace/ace.min.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6490c7294ace78101f58523b53c3385333cdc8c09c591369bbb4a9ee526887f7

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
SSjdRMJ4wqR3SVN97rIQNpbK9ea_QWZr
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
last-modified
Thu, 18 Mar 2021 14:10:17 GMT
server
AmazonS3
age
57
etag
"9724e6dff67a91ccbc88c42f1c5a260b"
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
date
Tue, 23 Mar 2021 14:39:44 GMT
x-amz-replication-status
COMPLETED
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
content-length
15798
x-amz-cf-id
bmmhQs2oYkXvf65DAakuDl-XyPjYnhMhJr6jxwC2QJDQ32FGvX8V3A==
gpt.js
securepubads.g.doubleclick.net/tag/js/
57 KB
20 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
142.250.185.162 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s51-in-f2.1e100.net
Software
sffe /
Resource Hash
0d12ebfd483e51163516b5aff7d3cb31d7d3b0a4ca1b5e18072c82d0b70f5b85
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"820 / 868 of 1000 / last-modified: 1616497833"
vary
Accept-Encoding
content-type
text/javascript
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
19733
x-xss-protection
0
expires
Tue, 23 Mar 2021 14:40:27 GMT
pb.js
sts3.wsj.net/pb/
432 KB
120 KB
Script
General
Full URL
https://sts3.wsj.net/pb/pb.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.112 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
fabf296699d94d9d8b5088c739fccbc6b364bff3e526a80221708ec1805fd660

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:07:03 GMT
content-encoding
gzip
last-modified
Sun, 10 Jan 2021 19:12:04 GMT
server
AmazonS3
age
2562
etag
W/"2b1f1a51e0cdb19b4f1e85fa14ba826b"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
via
1.1 120ade321ed0e3697c81eb1eb19b5f62.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
1OzuR02CQHeRT0UUZ66R8xqG3qvc12hqxCsLb-SZo_utZipLSx8zAQ==
cxense-candy.js
sts3.wsj.net/iweb/static_html_files/
53 KB
17 KB
Script
General
Full URL
https://sts3.wsj.net/iweb/static_html_files/cxense-candy.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.112 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
edf221c80326289d8123aa7295f6d5b71b0cf870468b9d2fdba392bfd8bc2161

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 13:52:29 GMT
content-encoding
gzip
last-modified
Thu, 18 Mar 2021 15:53:17 GMT
server
AmazonS3
age
2931
etag
W/"ea6b6cf63e6dccb83a9306d6ea32db10"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
via
1.1 120ade321ed0e3697c81eb1eb19b5f62.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
Vz7vnPJoI6J9gkGnNDuPy53yt56UfJYR-rRyaEMn1_cqszD7-2e0Ug==
sessioncam.recorder.js
d2oh4tlt9mrke9.cloudfront.net/Record/js/
262 KB
59 KB
Script
General
Full URL
https://d2oh4tlt9mrke9.cloudfront.net/Record/js/sessioncam.recorder.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.226.156.142 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-156-142.dus51.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
a27b898e5d5bf7dbec74fc23aa7ebb633c09298f296126bea1fc9878c178da5c

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
tjPYx0CKfuLwH50dgPzKTE4R2iSTAjly
Content-Encoding
gzip
ETag
"a0feb5d5582ebb61d74cd1deeae7f2e9"
Age
4376
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
60169
Last-Modified
Wed, 10 Mar 2021 15:04:37 GMT
Server
AmazonS3
Date
Tue, 23 Mar 2021 13:27:32 GMT
Content-Type
text/javascript
Via
1.1 cddd3e95f67291463f7a95d065c7fcff.cloudfront.net (CloudFront)
Cache-Control
max-age=14400
X-Amz-Cf-Pop
DUS51-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
hblU158rgbaIXC2x1R9MHHSnd1wlK1QKv33P3z2FyDh2smhfsoYx-g==
moatheader.js
z.moatads.com/dowjonesheader64568365681/
199 KB
70 KB
Script
General
Full URL
https://z.moatads.com/dowjonesheader64568365681/moatheader.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
184.30.25.161 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-25-161.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
3f1c002f735ca536a579fc5b1e682ccc8b3988aece4cb654d0c9d89fd386d712

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
content-encoding
gzip
last-modified
Fri, 24 Jul 2020 22:51:19 GMT
server
AmazonS3
x-amz-request-id
6087C80EE42D0FA6
etag
"c6b1022702e6fcdee897c0c1d6c05857"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=50434
accept-ranges
bytes
content-length
71438
x-amz-id-2
cxAkk/pZaAI/CyMzlj42HkAn+E6CGlKIYaauj2oQqMI9n1omr1DoyfGIEyX3XkcIj2Q3ei94yts=
uac.min.1.0.14.js
www.wsj.com/asset/ace/
13 KB
13 KB
Script
General
Full URL
https://www.wsj.com/asset/ace/uac.min.1.0.14.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6eb88e6a1b4fb744001450894ef249ca969aa4a13e3ba2ca1674884909b0b141

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
VshsYzRvxhTgnA.dh6KGRwSde8FPyy7c
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
last-modified
Tue, 02 Mar 2021 15:27:12 GMT
server
AmazonS3
age
66
etag
"5a1e655217de98f87c3afa3aa3a39046"
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
date
Tue, 23 Mar 2021 14:40:01 GMT
x-amz-replication-status
COMPLETED
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
content-length
12870
x-amz-cf-id
T6kHfqyCuPGrPkcnltENLIhpDRAGw-IQ8-GIui0IwCi0JbI3Hf7KTg==
djcmp.min.1.0.9.js
www.wsj.com/asset/ace/
16 KB
17 KB
Script
General
Full URL
https://www.wsj.com/asset/ace/djcmp.min.1.0.9.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a67941ba999c939746f38d55e6e29deb47a379e3ed29a5d1432a49a2097533c0

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
l.ch1.cFGQWtYpJ4bnJpqOFZFfrwglL0
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
last-modified
Mon, 08 Mar 2021 20:07:33 GMT
server
AmazonS3
age
44
etag
"f9092fe655c28e20a9dea940b1202678"
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
date
Tue, 23 Mar 2021 14:40:01 GMT
x-amz-replication-status
COMPLETED
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
content-length
16527
x-amz-cf-id
BlF6wnWmzBIPX9HHHPG8IHmkyaPtCzHOetOubA6d0smk2-LwRnAd7Q==
apstag.js
c.amazon-adsystem.com/aax2/
119 KB
31 KB
Script
General
Full URL
https://c.amazon-adsystem.com/aax2/apstag.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.158.204 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-158-204.dus51.r.cloudfront.net
Software
Server /
Resource Hash
86cef609c85d2c2ce6a507af54e77a9c150e2fa408043e1454082614c4b0ce2b

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
3fjLLc1LoPP.EINVORL0CYT_opc2h9.5
content-encoding
gzip
server
Server
age
822
etag
d2bbe61d6c9cfd2f9d26c66417c4fb1e
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 821feb380ab4aeca6ae9157aa1190ff2.cloudfront.net (CloudFront)
cache-control
public, max-age=900
date
Tue, 23 Mar 2021 14:26:45 GMT
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
timing-allow-origin
*
x-amz-cf-id
Kz8cUBaWKtI-MGA0gwfpV0tsumMT877aj0Acie13soHSBSF-rZUT8w==
Retina-Book.woff2
www.wsj.com/fonts/woffs/retina/
46 KB
47 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/retina/Retina-Book.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f991604789d1e2850a2fa69278386e36cce9e05a2b90c1c71abcd29c931c2373

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 19 Jan 2021 09:17:42 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
5462566
x-cache
Hit from cloudfront
content-length
47100
last-modified
Tue, 08 Oct 2019 21:42:55 GMT
server
AmazonS3
etag
"7033b8f58054f0180c90a32395faf73c"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
njWWhsTZbMtqrDzqDPM9Hrs0U9cHQ3ioftK2fBTgt2tU2z3ELCH-eg==
evi.js
s3.amazonaws.com/ki.js/46075/
377 B
727 B
Script
General
Full URL
https://s3.amazonaws.com/ki.js/46075/evi.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.216.169.213 Ashburn, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
s3-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
428e345114b5c47392b4afcef76e6a68cb67fac10ef9a4ae2eba20d1573c35d6

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:28 GMT
Content-Encoding
gzip
Last-Modified
Fri, 21 Aug 2020 14:07:26 GMT
Server
AmazonS3
x-amz-request-id
2AKE2EXV9J233CTC
ETag
"1404867bd564ae9a063eb1794c31f15a"
Content-Type
application/ecmascript
Cache-Control
s-maxage=3600, max-age=0
Accept-Ranges
bytes
Content-Length
293
x-amz-id-2
h9YT7//iAHw84AvySdtuHwc1+4bzDKaUOKm/68xRswnoO06LY8pwL0gwztURl0aYV0gQvl0pu/o=
wrapperMessagingWithoutDetection.1.0.5.js
www.wsj.com/asset/ace/
0
150 KB
Other
General
Full URL
https://www.wsj.com/asset/ace/wrapperMessagingWithoutDetection.1.0.5.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
9dw95x4.3og9wF5MBM1iM3_J9mnxlKEg
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
last-modified
Thu, 18 Feb 2021 14:05:28 GMT
server
AmazonS3
age
65
etag
"a4f076c6663c59bdd617e07c8c108846"
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
date
Tue, 23 Mar 2021 14:40:13 GMT
x-amz-replication-status
COMPLETED
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
content-length
153074
x-amz-cf-id
zwcL0Qn7STCo-whUwz3TFZZqPJ86PkJb79F0vTZc9ctLWvC_6SlrkQ==
wrapperMessagingWithoutDetection.1.0.5.js
www.wsj.com/asset/ace/
149 KB
150 KB
Script
General
Full URL
https://www.wsj.com/asset/ace/wrapperMessagingWithoutDetection.1.0.5.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a59069d842fc70e07dddaa0184c9f62ac950f5fb66b4dd0e9f516b20756d97c7

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
9dw95x4.3og9wF5MBM1iM3_J9mnxlKEg
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
last-modified
Thu, 18 Feb 2021 14:05:28 GMT
server
AmazonS3
x-amz-cf-pop
DUS51-C1
etag
"a4f076c6663c59bdd617e07c8c108846"
x-cache
Hit from cloudfront
content-type
application/javascript; charset=utf-8
date
Tue, 23 Mar 2021 14:40:27 GMT
x-amz-replication-status
COMPLETED
accept-ranges
bytes
content-length
153074
x-amz-cf-id
k3aKlnLeqT8EpoBUPZIxfFE0EV0lUy8FcomZ71m2OY6bWpfVGQzVGw==
Retina-Medium.woff2
www.wsj.com/fonts/woffs/retina/
46 KB
47 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/retina/Retina-Medium.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
27fd73dee5596813bbd6282a821926ae6cd1281f9736d98943a1deb6955608ee

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 13 Dec 2020 18:45:19 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
8625309
x-cache
Hit from cloudfront
content-length
47552
last-modified
Tue, 08 Oct 2019 21:42:55 GMT
server
AmazonS3
etag
"87ae136546f1829642c68aa7d5bca0d4"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
nvXK8mjmQiCvx2Lj2HBFNVFdsOuPkUJQzbdqcBqTD38UCoh4qlXcpA==
im-311215
images.wsj.net/
174 KB
174 KB
Image
General
Full URL
https://images.wsj.net/im-311215?width=1260&size=1.5
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Image Pipeline
Resource Hash
daacedaa095181a8b4495b3ef9ab2be5fdcb12e365b51e96f25b52c6291c0fd7
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 12 Mar 2021 19:06:27 GMT
via
1.1 dd169cfdbbafbb3da513bede6bc6640e.cloudfront.net (CloudFront), 1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
age
934440
x-amzn-requestid
bb13621f-4547-4dc3-a786-fc3085d2e56f
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-311215,nrtools.im.prod.im-311215_1260x840
phis
71870527
x-cache
Hit from cloudfront
x-amz-apigw-id
cFpDvGdfIAMF1dQ=
content-length
177754
x-xss-protection
1; mode=block
x-frame-options
SAMEORIGIN
x-powered-by
Image Pipeline
x-amzn-trace-id
Root=1-604bbbb1-6e2a456802b2596a78f73769;Sampled=1
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
x-amz-cf-pop
IAD89-C1, DUS51-C1
x-amz-cf-id
iXVSHPHEe6OYVLcaORCM_9CgtfCMI3K0pD-r7mx-7Dqsnk77stVo7A==
wsj-logo-big-black.svg
sts3.wsj.net/iweb/images/
8 KB
3 KB
Image
General
Full URL
https://sts3.wsj.net/iweb/images/wsj-logo-big-black.svg
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.112 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5746ba586b456d8c7968e8b79f2832942d91c4844bc5e99f22560b8ba0803418

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 13:45:07 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 16:34:59 GMT
server
AmazonS3
age
5247
etag
W/"360b936a3528f4d78c73eda3ccfb8c4f"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
via
1.1 120ade321ed0e3697c81eb1eb19b5f62.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
Mi6KwWNUClDn_1KtnfgmSGq_0aFiil1vTfzhZlFWlx_6kUCdfkyLLQ==
im-315016
images.wsj.net/
3 KB
3 KB
Image
General
Full URL
https://images.wsj.net/im-315016?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
2265c3099f341385c0f233a5fadd0651bd41cac399401fe30550dc489ba1daf3
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 00:51:00 GMT
via
1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
x-aspnet-version
4.0.30319
age
49767
x-powered-by
ASP.NET
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-315016,nrtools.im.prod.im-315016_111x62
phis
72227909
x-cache
Hit from cloudfront
content-length
2968
x-xss-protection
1; mode=block
server
Microsoft-IIS/8.5
x-frame-options
SAMEORIGIN
etag
"5f9c81fd-ecf7-486e-a1ed-5d73833ea0fa"
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
access-control-allow-methods
*
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
x-amz-cf-pop
DUS51-C1
access-control-allow-headers
*
x-amz-cf-id
F4JtHv_CxO308BqLB92-Yw3mj9-Yp9kKY6AkTQQNHQCFy9fYEEP5lA==
im-314820
images.wsj.net/
3 KB
3 KB
Image
General
Full URL
https://images.wsj.net/im-314820?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
bb5bd71dfa708e219404dc5e297c5e0b4fbae80b9265626e0e02b0744b25b370
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 21:00:45 GMT
via
1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
x-aspnet-version
4.0.30319
age
63582
x-powered-by
ASP.NET
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314820,nrtools.im.prod.im-314820_111x62
phis
72006913
x-cache
Hit from cloudfront
content-length
2851
x-xss-protection
1; mode=block
server
Microsoft-IIS/8.5
x-frame-options
SAMEORIGIN
etag
"a19747e8-3b36-41fc-9c58-024cbb5dd650"
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
access-control-allow-methods
*
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
x-amz-cf-pop
DUS51-C1
access-control-allow-headers
*
x-amz-cf-id
tGUR87vmuDq8psAW151PvXG7UF_XM_9WDRvPUIDeK3Fo5H57h1m4RA==
im-314076
images.wsj.net/
3 KB
4 KB
Image
General
Full URL
https://images.wsj.net/im-314076?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
54231504e2516dda54e19e99a0dfa6b2291b349ddc99a3100abf2e53cef831d3
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 11:40:06 GMT
via
1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
x-aspnet-version
4.0.30319
age
10821
x-powered-by
ASP.NET
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314076,nrtools.im.prod.im-314076_111x62
phis
imu-20210319172049589
x-cache
Hit from cloudfront
content-length
2982
x-xss-protection
1; mode=block
server
Microsoft-IIS/8.5
x-frame-options
SAMEORIGIN
etag
"bb03fcd2-bcb6-43e5-add0-62694ce1d933"
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
access-control-allow-methods
*
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
x-amz-cf-pop
DUS51-C1
access-control-allow-headers
*
x-amz-cf-id
KKfpgbWkIsTaFn247IxfmWSBSIUaNZnb7AJCf936J8q2RAYA4i3dVA==
im-314297
images.wsj.net/
3 KB
4 KB
Image
General
Full URL
https://images.wsj.net/im-314297?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
e465f9787bb6efe2d0d00ca4641a21e0c45ecc3e042c600a95e1d42c2dff6e15
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 00:36:54 GMT
via
1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
x-aspnet-version
4.0.30319
age
50613
x-powered-by
ASP.NET
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314297,nrtools.im.prod.im-314297_111x62
phis
imu-20210320011304860
x-cache
Hit from cloudfront
content-length
3292
x-xss-protection
1; mode=block
server
Microsoft-IIS/8.5
x-frame-options
SAMEORIGIN
etag
"a56f5c87-8094-4c8d-bd05-8fe183a5576b"
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
access-control-allow-methods
*
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
x-amz-cf-pop
DUS51-C1
access-control-allow-headers
*
x-amz-cf-id
J5v4U0VSpWjtDj6VaKHP-jb95UNPxJqAo7RG-Y1pLVhKNcG9qU6qeg==
im-314130
images.wsj.net/
2 KB
3 KB
Image
General
Full URL
https://images.wsj.net/im-314130?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
e1f2b732bc9018238dd0365097d1e49a4ebb5d14ac1f1f31a5185ac49c5d9189
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:24:10 GMT
via
1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
x-aspnet-version
4.0.30319
age
977
x-powered-by
ASP.NET
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314130,nrtools.im.prod.im-314130_111x62
phis
71756589
x-cache
Hit from cloudfront
content-length
2440
x-xss-protection
1; mode=block
server
Microsoft-IIS/8.5
x-frame-options
SAMEORIGIN
etag
"1325c81f-0859-4743-af7d-8dd75b315562"
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
access-control-allow-methods
*
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
x-amz-cf-pop
DUS51-C1
access-control-allow-headers
*
x-amz-cf-id
cfymSl6ppJXvYWLkSuMECNGhorJW2Yj8LjTC7c1Q-4OA6OiF7wAl7g==
im-314708
images.wsj.net/
2 KB
3 KB
Image
General
Full URL
https://images.wsj.net/im-314708?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
0b8123f4e050d82fb8ccf48405fc06daa4fcfc2c9576807f4540751043e28c4b
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 11:54:22 GMT
via
1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
x-aspnet-version
4.0.30319
age
9964
x-powered-by
ASP.NET
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314708,nrtools.im.prod.im-314708_111x62
phis
63904306
x-cache
Hit from cloudfront
content-length
2532
x-xss-protection
1; mode=block
server
Microsoft-IIS/8.5
x-frame-options
SAMEORIGIN
etag
"b1f122db-ba85-4c78-8d4a-907ecb33b292"
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
access-control-allow-methods
*
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
x-amz-cf-pop
DUS51-C1
access-control-allow-headers
*
x-amz-cf-id
ZvfDv8uLL7CSSGbPLnTf84cUGkUtoVu9kx2MJU2W0bb_nbxLae-8Ug==
im-314606
images.wsj.net/
2 KB
3 KB
Image
General
Full URL
https://images.wsj.net/im-314606?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Image Pipeline
Resource Hash
34dfc9c819571defa60868158bce4b72b24cb8ef5e7b365e6325bf46bdb53b5a
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

imagepipeline
20210322-150402-ebd7b30d-42ff-4015-b9fd-9e199aa7c087-wsj
via
1.1 f4cb5dc388dd91aa43ce5b333fc7c7c2.cloudfront.net (CloudFront), 1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
age
10848
x-powered-by
Image Pipeline
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314606,nrtools.im.prod.im-314606_111x62
date
Tue, 23 Mar 2021 11:39:39 GMT
x-cache
Hit from cloudfront
x-amz-apigw-id
co37MFxwoAMF8bg=
content-length
2401
x-xss-protection
1; mode=block
x-amzn-requestid
63fbc49b-83c2-4abe-b45b-b5f3095993b2
x-frame-options
SAMEORIGIN
x-amzn-trace-id
Root=1-6059d37a-62c2f14346e3315d284bf958;Sampled=1
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
x-amz-cf-pop
IAD79-C2, DUS51-C1
x-amz-cf-id
ghQ0unaRsfCdZIFnnS3y8zrjjjjUjNjKvK74LFgrWhU65pXxN2k2Vw==
im-314408
images.wsj.net/
3 KB
3 KB
Image
General
Full URL
https://images.wsj.net/im-314408?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
00a669c9e4d6009a02683eed9d9defeff662fa2c3a7f5cc052dda1260b15e745
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 12:06:33 GMT
via
1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
x-aspnet-version
4.0.30319
age
95634
x-powered-by
ASP.NET
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314408,nrtools.im.prod.im-314408_111x62
phis
72157088
x-cache
Hit from cloudfront
content-length
2612
x-xss-protection
1; mode=block
server
Microsoft-IIS/8.5
x-frame-options
SAMEORIGIN
etag
"4794c1da-2811-48b3-9b0d-7fd8a81ec38a"
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
access-control-allow-methods
*
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
x-amz-cf-pop
DUS51-C1
access-control-allow-headers
*
x-amz-cf-id
j6e4WHBKQ1BjSKdVj6aFAhEbawxR-UT4dC7a_1UiadYohXvIbFVGIQ==
im-314407
images.wsj.net/
3 KB
3 KB
Image
General
Full URL
https://images.wsj.net/im-314407?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Microsoft-IIS/8.5 / ASP.NET
Resource Hash
144fda44979a621a30e88f9a56cc42326d088e4687056d8949429ad1f175af62
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 00:36:45 GMT
via
1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
x-aspnet-version
4.0.30319
age
137022
x-powered-by
ASP.NET
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314407,nrtools.im.prod.im-314407_111x62
phis
72153743
x-cache
Hit from cloudfront
content-length
2609
x-xss-protection
1; mode=block
server
Microsoft-IIS/8.5
x-frame-options
SAMEORIGIN
etag
"c56c16e4-a1c4-49c6-91e9-955da2d4ae62"
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
access-control-allow-methods
*
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=604800
x-amz-cf-pop
DUS51-C1
access-control-allow-headers
*
x-amz-cf-id
m3olcKKQeXVHt3WJvzNWkZbO_FEJPvyveLw9Ojs8AXJqNlcuquR-pg==
native-message
cdn.privacy-mgmt.com/wrapper/tcfv2/v1/gdpr/ Frame
0
0
Preflight
General
Full URL
https://cdn.privacy-mgmt.com/wrapper/tcfv2/v1/gdpr/native-message?requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&hasCsp=true&env=prod&consentLanguage=en&body=%7B%22accountId%22%3A229%2C%22requestUUID%22%3A%22a152af4a-b6b3-4012-bd9a-1226560a0d1f%22%2C%22propertyHref%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%2C%22euconsent%22%3Anull%2C%22meta%22%3A%22%7B%5C%22mmsCookies%5C%22%3A%5B%5D%2C%5C%22resolved%5C%22%3Anull%7D%22%2C%22clientMMSOrigin%22%3A%22https%3A%2F%2Fcdn.privacy-mgmt.com%22%2C%22targetingParams%22%3Anull%2C%22campaignEnv%22%3A%22prod%22%2C%22pubData%22%3A%7B%7D%7D
Protocol
H2
Server
13.226.159.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-159-31.dus51.r.cloudfront.net
Software
/ Express
Resource Hash

Request headers

Accept
*/*
Access-Control-Request-Method
GET
Access-Control-Request-Headers
content-type
Origin
https://www.wsj.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

content-type
text/html; charset=utf-8
content-length
13
date
Tue, 23 Mar 2021 14:40:27 GMT
x-powered-by
Express
access-control-allow-origin
https://www.wsj.com
access-control-allow-credentials
true
access-control-allow-headers
Origin,X-Requested-With,Content-Type,Accept,Authorization,SP_SCRIPT_VERSION
access-control-allow-methods
GET, PUT, POST, DELETE
cache-control
no-cache, no-store
allow
POST,GET,HEAD
vary
Accept-Encoding
x-cache
Miss from cloudfront
via
1.1 414a05dee9c365a2a2079013f9d53671.cloudfront.net (CloudFront)
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
yWlB0Cjto7jF7G-lqu0pJHTLF771HaFnLVaFnmC9NmqlhjuVuTGxnw==
native-message
cdn.privacy-mgmt.com/wrapper/tcfv2/v1/gdpr/
195 KB
131 KB
XHR
General
Full URL
https://cdn.privacy-mgmt.com/wrapper/tcfv2/v1/gdpr/native-message?requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&hasCsp=true&env=prod&consentLanguage=en&body=%7B%22accountId%22%3A229%2C%22requestUUID%22%3A%22a152af4a-b6b3-4012-bd9a-1226560a0d1f%22%2C%22propertyHref%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%2C%22euconsent%22%3Anull%2C%22meta%22%3A%22%7B%5C%22mmsCookies%5C%22%3A%5B%5D%2C%5C%22resolved%5C%22%3Anull%7D%22%2C%22clientMMSOrigin%22%3A%22https%3A%2F%2Fcdn.privacy-mgmt.com%22%2C%22targetingParams%22%3Anull%2C%22campaignEnv%22%3A%22prod%22%2C%22pubData%22%3A%7B%7D%7D
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.159.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-159-31.dus51.r.cloudfront.net
Software
/ Express
Resource Hash
40a80c2647113754ec7f864e955327e95dd3bc3485e3fb29f2559335d83e61b8

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
application/json

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
content-encoding
gzip
x-amz-cf-pop
DUS51-C1
x-powered-by
Express
vary
Accept-Encoding
access-control-allow-methods
GET, PUT, POST, DELETE
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.wsj.com
cache-control
no-cache, no-store
access-control-allow-credentials
true
x-cache
Miss from cloudfront
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Accept, Authorization, SP_SCRIPT_VERSION
x-amz-cf-id
b8G3cGmCy764tZlEcJ-Mq4VlS7rpRTC0e-3h823PfGwQCtxnrtIcwA==
via
1.1 414a05dee9c365a2a2079013f9d53671.cloudfront.net (CloudFront)
Retina-Light.woff2
www.wsj.com/fonts/woffs/retina/
46 KB
46 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/retina/Retina-Light.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
51547de25ed0756832e259e8eac96c8b4b999c54b85f5a4cc40b2ab7e0f33043

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 20 Sep 2020 00:39:14 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
15948073
x-cache
Hit from cloudfront
content-length
47072
last-modified
Tue, 08 Oct 2019 21:42:55 GMT
server
AmazonS3
etag
"1e6c88800c670f9ee8bf0e2edb9b873f"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
pE5Zs2CGGEq3f4b0_-GL9IxvLOijnY3-ZKOG5ggdM-1o_WDQPaZy5w==
im-314936
images.wsj.net/
1 KB
2 KB
Image
General
Full URL
https://images.wsj.net/im-314936?width=111&height=62
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5000:e:b675:f600:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Image Pipeline
Resource Hash
fbbdb4d5348397ee4ffde90fd34e2d9f45b824aa7f7666ddc545270bb8427bc2
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

imagepipeline
20210322-220652-588caf3b-b755-4d1c-b549-b1b132b4e56e-wsj
via
1.1 fba666ceffdeb316c8edf476d8994bd5.cloudfront.net (CloudFront), 1.1 58dd513f0a53b3e6851a071cb857a706.cloudfront.net (CloudFront)
age
7248
x-powered-by
Image Pipeline
x-dns-prefetch-control
off
edge-cache-tag
nrtools.im.prod.im-314936,nrtools.im.prod.im-314936_111x62
date
Tue, 23 Mar 2021 12:39:39 GMT
x-cache
Hit from cloudfront
x-amz-apigw-id
cpAtvGqNIAMFy-w=
content-length
1318
x-xss-protection
1; mode=block
x-amzn-requestid
51abfb8a-5b7f-4116-a3f7-f90693eb35f7
x-frame-options
SAMEORIGIN
x-amzn-trace-id
Root=1-6059e18b-24b8b3204ce64d036babf4d5;Sampled=1
x-download-options
noopen
strict-transport-security
max-age=15552000; includeSubDomains
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=604800
x-amz-cf-pop
IAD89-C1, DUS51-C1
x-amz-cf-id
OlTMX3k9BDaOYupXuElPH-zisdLU24Y6KGUvZRXIj8ddUDP6HV0Hqg==
032321bouldershoot_167x94.jpg
m.wsj.net/video/20210323/032321bouldershoot/
8 KB
9 KB
Image
General
Full URL
https://m.wsj.net/video/20210323/032321bouldershoot/032321bouldershoot_167x94.jpg
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.3.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-71.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
df5f8d7097d559dd2b58319797e8fef88dd693e1b95475b067a82abb3621aaea

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 05:56:59 GMT
via
1.1 8cdf0467c0468ddfe8e9873c6bb8304c.cloudfront.net (CloudFront)
last-modified
Tue, 23 Mar 2021 05:49:33 GMT
server
AmazonS3
age
31409
etag
"d222a726276c26f0a11b990ea5ce385f"
x-cache
Hit from cloudfront
content-type
image/jpeg
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
8612
x-amz-cf-id
VSgAQZRcY1NOIjDKl-Gi9mhLDHQnlS6PjpSazDgL52H9Lk5HRUmy8Q==
032221miamicurfew_167x94.jpg
m.wsj.net/video/20210322/032221miamicurfew/
9 KB
9 KB
Image
General
Full URL
https://m.wsj.net/video/20210322/032221miamicurfew/032221miamicurfew_167x94.jpg
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.3.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-71.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
6e92979ad73d3f2416f3daee108903dc0bf6492d27f55add65c5ad7c9014f014

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 08:00:00 GMT
via
1.1 8cdf0467c0468ddfe8e9873c6bb8304c.cloudfront.net (CloudFront)
last-modified
Mon, 22 Mar 2021 07:53:28 GMT
server
AmazonS3
age
24027
etag
"9a192e8ae0ace52dd697a117f72effc3"
x-cache
Hit from cloudfront
content-type
image/jpeg
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
9341
x-amz-cf-id
9WcA1EGMt6TrkwACWdRCONcfhxaVaFX8ln8P1e5WKG6aGof9lq7EyQ==
031921pwengine_167x94.jpg
m.wsj.net/video/20210319/031921pwengine/
5 KB
5 KB
Image
General
Full URL
https://m.wsj.net/video/20210319/031921pwengine/031921pwengine_167x94.jpg
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.3.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-71.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
23e5ba66205952b1e8fab6c82c55bb2994f701a06a764a5545d7d19ce5c0fa72

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 10:31:38 GMT
via
1.1 8cdf0467c0468ddfe8e9873c6bb8304c.cloudfront.net (CloudFront)
last-modified
Fri, 19 Mar 2021 22:46:09 GMT
server
AmazonS3
age
14930
etag
"45ce7d8353bfdbe04d32089365776431"
x-cache
Hit from cloudfront
content-type
image/jpeg
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
5094
x-amz-cf-id
cXQ6K0K5_PtxD0uIjy-RFf1zi7QaB38dqBApREvMOjJoqHD_ITuumA==
032321seibfederaldebt_167x94.jpg
m.wsj.net/video/20210322/032321seibfederaldebt/
8 KB
8 KB
Image
General
Full URL
https://m.wsj.net/video/20210322/032321seibfederaldebt/032321seibfederaldebt_167x94.jpg
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.3.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-71.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5e52704e332251762691a3ca4d5facef9c25a3529aab0c11b807043d8f486ec9

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 09:31:02 GMT
via
1.1 8cdf0467c0468ddfe8e9873c6bb8304c.cloudfront.net (CloudFront)
last-modified
Mon, 22 Mar 2021 22:00:01 GMT
server
AmazonS3
age
18566
etag
"105b0433c63a1ac3a548ebc647a295b6"
x-cache
Hit from cloudfront
content-type
image/jpeg
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
8177
x-amz-cf-id
iyw0QvACPk3PeA0eFbbLyyOQzA9HadZqCda7g4RFKPgS14NKt6nE2g==
cruiseships032121_167x94.jpg
m.wsj.net/video/20210321/cruiseships032121/
7 KB
7 KB
Image
General
Full URL
https://m.wsj.net/video/20210321/cruiseships032121/cruiseships032121_167x94.jpg
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
99.86.3.71 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-99-86-3-71.fra6.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
5e1c6e280c43dd6f80550c8a9a8cc9381ca68f57932e660a0971e37c06abffad

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 09:00:53 GMT
via
1.1 8cdf0467c0468ddfe8e9873c6bb8304c.cloudfront.net (CloudFront)
last-modified
Sun, 21 Mar 2021 18:42:12 GMT
server
AmazonS3
age
20375
etag
"0ae6cc425d209938f4c3f77b4d85cd55"
x-cache
Hit from cloudfront
content-type
image/jpeg
x-amz-cf-pop
FRA6-C1
accept-ranges
bytes
content-length
6957
x-amz-cf-id
9JUmlRLTawHwRPiN7xdywbykZfnxCriMt3KETGlPsaYDoO2l5dVidw==
video.min.js
video-api.wsj.com/api-video/player/v3/js/
739 KB
192 KB
Script
General
Full URL
https://video-api.wsj.com/api-video/player/v3/js/video.min.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.17.181.157 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-17-181-157.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
14f004e6753c43b8ed9b273f0ea1a38bf700bf45bd4b6e70f3b01ad3890ad27b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:27 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Tue, 12 Jan 2021 21:24:17 GMT
x-amz-request-id
3EADEA365E8AA471
ETag
"a09464aeb10bb9ea15951499005ba858"
Vary
Accept-Encoding
x-amz-id-2
4BmKBmvTGadzsxuqAaC8KiRs0obtaACxj2GErzYIFOKwNeu1t/RF1vn5n515MsZ/Qd3m5XY0sqs=
Content-Type
application/javascript
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
196212
X-XSS-Protection
1; mode=block
Expires
Tue, 23 Mar 2021 15:40:27 GMT
video.min.css
video-api.wsj.com/api-video/player/v3/css/
41 KB
9 KB
Stylesheet
General
Full URL
https://video-api.wsj.com/api-video/player/v3/css/video.min.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.17.181.157 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a2-17-181-157.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7ca99f04ac70c7f61166527f4ce52338e51ce8d99d16ed342db91d88f4a1195a
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:27 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Last-Modified
Tue, 12 Jan 2021 21:23:45 GMT
x-amz-request-id
9CEE444444466603
ETag
"d512297569ed1106d9edffcfc0032aa2"
Vary
Accept-Encoding
x-amz-id-2
+kxOVImAfUoJckYZxMwl6e00I6LocutPKMvaHqoK+80JoTb9xbI52uPgYz+9XM2S6lmulpEY0P0=
Content-Type
text/css
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
8633
X-XSS-Protection
1; mode=block
Expires
Tue, 23 Mar 2021 15:40:27 GMT
video.06cc293cdfa7.js
asset.barrons.com/article/public/
102 KB
36 KB
Script
General
Full URL
https://asset.barrons.com/article/public/video.06cc293cdfa7.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bf7f515807f3ab7b4dd9cc3965030df1a2e095686863cdbd70f2d25209cb97d3

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:39 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:30 GMT
server
AmazonS3
age
586729
etag
W/"82036adad3ec4493f9e8acbf9060b4bc"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
p8AP7jx8OVOqadtbMex-052tKL_abXsRM0L5JK9HANK1H43H-du1Mw==
RetinaNarr-Book.woff2
www.wsj.com/fonts/woffs/retina/
47 KB
47 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/retina/RetinaNarr-Book.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
497f169256ff4f0af835f665a2d105f02e0f12bf078572d12dcbaf6d25328b8d

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 30 Dec 2020 00:57:11 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
7220597
x-cache
Hit from cloudfront
content-length
47636
last-modified
Tue, 08 Oct 2019 21:42:56 GMT
server
AmazonS3
etag
"0606fb011eb4f71a05f334a661a66c71"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
FkuFiK3JY2i6bC8I1bOusDONY-09_7vk8aDbyql4RtXNeyuxOXzcwA==
RetinaNarr-Light.woff2
www.wsj.com/fonts/woffs/retina/
46 KB
46 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/retina/RetinaNarr-Light.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
2ad4a9b9e1d7bda32834af951eadbe33f30183272a09c596febf458d07cfa916

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sat, 13 Feb 2021 01:51:05 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
3329363
x-cache
Hit from cloudfront
content-length
46896
last-modified
Tue, 08 Oct 2019 21:42:56 GMT
server
AmazonS3
etag
"24c68ac27c209da5c83d10b3038c17af"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
MGDmqkVY75VDTxDnTIVPVOgmokte3-UuAnwrn0hI9ruHBMIOH95RGQ==
Escrow+Display+Condensed+Bold.woff2
www.wsj.com/fonts/woffs/escrow/
26 KB
27 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/escrow/Escrow+Display+Condensed+Bold.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
38a583de4c9a85114ea0d3811417028bd25ca29b2eed3f84372822c527d01ca6

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sat, 19 Sep 2020 10:40:22 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
15998406
x-cache
Hit from cloudfront
content-length
26844
last-modified
Tue, 08 Oct 2019 21:42:54 GMT
server
AmazonS3
etag
"7c442e963b2fb63c4cb6fcad8abde902"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
aWzYuQtirreAjBM4EUBPjhyUyJOFjGwTIitn5vusDQL9CaJKAgP0HQ==
Exchange-BookItalic.woff2
www.wsj.com/fonts/woffs/exchange/
65 KB
66 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/exchange/Exchange-BookItalic.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ec5aef56172acb4f9cc7a533d8846bd6f4c12a8bb635321299d375c3a986095d

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 09 Sep 2020 18:39:51 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
16833637
x-cache
Hit from cloudfront
content-length
66893
last-modified
Tue, 08 Oct 2019 21:42:54 GMT
server
AmazonS3
etag
"f5141e1492b8d073c44e43cc202d6ffe"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
cLUSue9e0HG8xqB0KR64fyO7s3MO4h7J_dzJjhCI7A_uD0_dm4PoPg==
Exchange-Book.woff2
www.wsj.com/fonts/woffs/exchange/
62 KB
63 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/exchange/Exchange-Book.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3a760ad2462e5115efb1336e598dd00a47072606dedbdb0bb0f75747529228f7

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 08 Nov 2020 18:59:48 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
11648440
x-cache
Hit from cloudfront
content-length
63957
last-modified
Tue, 08 Oct 2019 21:42:54 GMT
server
AmazonS3
etag
"0c40a7ae21908c50dab61ba01d106deb"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
qPgM7cyLvk7Tza5OdMEZn4oA5v_IsmxRIPPWkQ7G5NfVmGGrb3X1Vw==
RetinaNarr-Medium.woff2
www.wsj.com/fonts/woffs/retina/
46 KB
47 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/retina/RetinaNarr-Medium.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8d415c84ae3caeab1ef04300f0e9358fde343c99c434645337c0bde0d143d65c

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 29 Jan 2021 09:36:40 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
4597428
x-cache
Hit from cloudfront
content-length
47236
last-modified
Tue, 08 Oct 2019 21:42:56 GMT
server
AmazonS3
etag
"e08c459a519315fcc6b4a26d2b6c8a4a"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
XpBZtFC0lNPjnPI6jIWu8PrmkFOr2ZWy37yFXeNTfrQ7urXnRHFxbA==
runtime.8400fa8109cc.js
asset.barrons.com/article/public/
19 KB
7 KB
Script
General
Full URL
https://asset.barrons.com/article/public/runtime.8400fa8109cc.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b17504124ba7a2baf32457efbf9744eb9f50fed11884243c1f48b6e588ce0a3b

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:23 GMT
content-encoding
gzip
last-modified
Mon, 22 Mar 2021 19:33:41 GMT
server
AmazonS3
age
64084
etag
W/"d90cf45c6d5653d9eb927cb431aaf6f5"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
sVN9Upt1gIYTfblYWMLu3hN70i3-qTvD4ICtuhRoFoVPLq76YSwLPg==
sso-auth.js
accounts.wsj.com/assets/
4 KB
2 KB
Script
General
Full URL
https://accounts.wsj.com/assets/sso-auth.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:f000:f:5016:900:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Apache /
Resource Hash
8970a5667afeafd5746bf5774ddf7f6f708ee9bcead0ef0cd8520d11e912688e

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 07:26:35 GMT
content-encoding
gzip
last-modified
Tue, 09 Mar 2021 22:38:06 GMT
server
Apache
age
35178
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 4874e0c922f34c928345f4c183ea11b4.cloudfront.net (CloudFront)
cache-control
public,max-age=14400
x-amz-cf-pop
FRA56-C1
content-length
1480
x-amz-cf-id
2eHecopECPhTkl2Zf1hEFlJM_gjUikv3iJOHntO_NtLveqC0zVcSPA==
config.aspx
ws.sessioncam.com/Record/
14 B
304 B
XHR
General
Full URL
https://ws.sessioncam.com/Record/config.aspx?url=https%3A%2F%2Fwww.wsj.com%2F%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&jsver=587&originalUrl=https://www.wsj.com&sse=1616510427337&inTg=a&acr=0
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.162.154.79 , United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-162-154-79.compute-1.amazonaws.com
Software
Kestrel /
Resource Hash
0dca547b59c4fbcd851ab52275af17aca24162114b919ddaa955e7d35838e9d4

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

Pragma
no-cache
Date
Tue, 23 Mar 2021 14:40:26 GMT
Server
Kestrel
Content-Type
text/javascript
Access-Control-Allow-Origin
https://www.wsj.com
Cache-Control
no-store,no-cache
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
14
yi.js
mb.moatads.com/
1 KB
2 KB
Script
General
Full URL
https://mb.moatads.com/yi.js?ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8D4Sq_GVK61%5Dml%22ZzTm!ja8V%22%3BU%5DDTg%7Df%2FH%40%26%2Bc%5B5IUOG(%2CWV%7BGrV~1HmDkP8D4rUDtmxT%3Bwv%40V374BKm55%3D%261fp%5BoU5tWhX%3C%3Ce%24%26~1%3Axkr%2BUe31k5X%5BG%5E%5B)%2C2iVSX%3C_Y%7B!7IQ3HbmUZzCFm%5Du!x2l.uBlTVU%2F.%3Dh%3Ft%40yUtKC&th=2771453282&tf=nMzjG---CSa7H-XSSptC-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2BBEYBvGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJfR0BqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&confidence=2&pcode=dowjonesheader64568365681&callback=MoatNadoAllJsonpRequest_58232703
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/dowjonesheader64568365681/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.250.6.25 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-250-6-25.eu-west-1.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
29fda52214b0f585a697b297b3a1f5abae9a24360559451addd29543d6398b09

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
cache-control
max-age=900
server
TornadoServer/4.5.3
timing-allow-origin
*
etag
"15a6c2e6a23e709cdc635696c960e157281621ce"
content-length
1510
content-type
text/html; charset=UTF-8
n.js
geo.moatads.com/
100 B
276 B
Script
General
Full URL
https://geo.moatads.com/n.js?e=35&ud=undefined&qn=%604%7BZEYwoqI%24%5BK%2BdLLU)%2CMm~t8!Z.%5BMhS%3A15.sn_003etW6~P6Jn)s)wC%24GL3jX%7BQqDOJ%3Eoy)G3p%2FhFjrR8D4Sq_GVK61%5Dml%22ZzTm!ja8V%22%3BU%5DDTg%7Df%2FH%40%26%2Bc%5B5IUOG(%2CWV%7BGrV~1HmDkP8D4rUDtmxT%3Bwv%40V374BKm55%3D%261fp%5BoU5tWhX%3C%3Ce%24%26~1%3Axkr%2BUe31k5X%5BG%5E%5B)%2C2iVSX%3C_Y%7B!7IQ3HbmUZzCFm%5Du!x2l.uBlTVU%2F.%3Dh%3Ft%40yUtKC&th=2771453282&tf=nMzjG---CSa7H-XSSptC-j7VIQD-xFQTS-nMzjG-&vi=111111&qp=00000&is=BBBBB2BBEYBvGl2BBCBBtUTBBRmsqbKW8BsrBu0rCFE48CRBeeBS2hWTMBBQeQBBn2soYggyUig0CBlWZ0uBBCCCCCCOgRBBiOfnE6Bkg7OxBb8MxOtJYHCBdm5kBhBBC9Y8oBXckXBR76iUUsJBCBBBBBBBBBWBSqj3BBBZeGV2BBBCMciUBBBjgEBBBBBB94UMgTdJMtEcpMBBBQBBBniOccBBBBBB47kNBBBBBBBBBBBBBhcjG6BBJM2L4Bk8BwCBQmIoRBBCzBz1BBCTClBBrbBBC4ehueB57NG9aJfR0BqBBiuwBBBB&iv=8&qt=0&gz=0&hh=0&hn=0&tw=null&qc=0&qd=0&qf=1600&qe=1200&qh=1600&qg=1200&qm=-60&qa=1600&qb=1200&qi=1600&qj=1200&to=00&po=1-0020002000002120&vy=&qr=0&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&confidence=2&pcode=dowjonesheader64568365681&ql=&qo=0&i=DOWJONES_HEADER1&hp=1&wf=1&kq=1&hq=0&hs=0&hu=0&hr=0&ht=0&dnt=0&bq=11&f=0&j=&t=1616510427364&de=982669267494&rx=668885862073&m=0&ar=2e4dbc35770-clean&iw=8b4fed4&q=1&cb=0&cu=1616510427364&ll=2&lm=0&ln=0&em=0&en=0&d=undefined%3Aundefined%3Aundefined%3Aundefined&gu=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&id=1&gw=dowjonesheader64568365681&fd=1&ac=1&it=500&pe=1%3A733%3A733%3A0%3A0&fs=180807&na=894076209&cs=0&callback=MoatDataJsonpRequest_58232703
Requested by
Host: z.moatads.com
URL: https://z.moatads.com/dowjonesheader64568365681/moatheader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.250.6.25 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-250-6-25.eu-west-1.compute.amazonaws.com
Software
TornadoServer/4.5.3 /
Resource Hash
8f9aaf713261c38848cb5c66b503eeb50491b428c8ba4a29e723247c0f6b1adf

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
cache-control
max-age=900
server
TornadoServer/4.5.3
timing-allow-origin
*
etag
"54fd40285e8330cfd851429133f443f8e89fa605"
content-length
100
content-type
text/html; charset=UTF-8
pixel.gif
px.moatads.com/
43 B
260 B
Image
General
Full URL
https://px.moatads.com/pixel.gif?e=17&t=1616510427364&de=753096692541&d=DOWJONES_HEADER1%3ADesktop%3A-%3A-&i=YIELD_INTELLIGENCE_INTERNAL1&ar=2e4dbc35770-clean&iw=8b4fed4&zMoatRendered=0&zMoatSlotTargetingLoaded=0&zMoatSlotTargetingSet=0&zMoatPageDataTargetingSet=0&zMoatSafetyTargetingSet=0&zMoatEmptySlot=0&zMoatNadoDataLoadTime=Not%20Loaded&zMoatAllDataLoadTime=Not%20Loaded&bo=wsj.com&bd=wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&ac=1&bq=11&f=0&na=1674960724&cs=0
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
184.30.25.161 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-25-161.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:27 GMT
last-modified
Fri, 20 May 2016 15:16:00 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1463757360"
content-type
image/gif
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-length
43
expires
Tue, 23 Mar 2021 14:40:27 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
471fe2996db186a05e20d52b03a8cd99b17f6be67d96603689701019afb84629

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
Escrow+Display+Condensed+Roman.woff2
www.wsj.com/fonts/woffs/escrow/
25 KB
26 KB
Font
General
Full URL
https://www.wsj.com/fonts/woffs/escrow/Escrow+Display+Condensed+Roman.woff2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
30f50c27fb65c2f79bda64a7f209fd8af7abace857ade7dc29e9539587ace1a2

Request headers

Origin
https://www.wsj.com
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 27 Sep 2020 23:55:28 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
vary
Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
15259500
x-cache
Hit from cloudfront
content-length
25736
last-modified
Tue, 08 Oct 2019 21:42:54 GMT
server
AmazonS3
etag
"10ea31224c1480796a64d3dc474588d8"
access-control-max-age
3000
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
x-amz-cf-pop
DUS51-C1
accept-ranges
bytes
x-amz-cf-id
6-WkmV-PbJapsIwJNqhdCbuzwpSh40wwEeifR9qqD_SbFjnJCFaFSg==
aps_csm.js
c.amazon-adsystem.com/bao-csm/aps-comm/
6 KB
3 KB
XHR
General
Full URL
https://c.amazon-adsystem.com/bao-csm/aps-comm/aps_csm.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.158.204 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-158-204.dus51.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
06b99248a163333e36980a6cfb756f1a7de60fa49517162b87b1a44d5d48f844

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
Z_m26sDjicOoQtCCmuJEtOsMPnFQWWIm
content-encoding
gzip
etag
W/"a4d296427fc806b21335359e398c025c"
age
65164
x-cache
Hit from cloudfront
access-control-max-age
3000
access-control-allow-origin
*
last-modified
Sat, 06 Mar 2021 01:32:40 GMT
server
AmazonS3
date
Mon, 22 Mar 2021 20:34:23 GMT
vary
Origin
access-control-allow-methods
GET
content-type
application/javascript
via
1.1 4678033b564719cfa85dd7af417223ab.cloudfront.net (CloudFront)
cache-control
public, max-age=86400
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
vZpNDK-46Ba5okrU22l-OW5DywFyzpZuMRVLOkWjrA7YVCC73Y4Pkw==
identity
api.rlcdn.com/api/
0
245 B
XHR
General
Full URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope&cv=CPDd0E3PDd0E3AGABCENBSCgAAAAAELAABpYAAAN1gDAAgAEdAQcBCADAgH2AbqAOEgAgCOFAAgBHAN1GAAgBHAN1HQAQBHEAAIAjiQAEARxSACACAAA.YAAAAAAAAAAA&ct=4
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.120.133.55 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
55.133.120.34.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
via
1.1 google
access-control-allow-headers
Accept, Authorization, Content-Type, Cookie, Origin, X-Requested-With
access-control-allow-methods
GET, OPTIONS
access-control-allow-origin
https://www.wsj.com
cache-control
no-cache, no-store
access-control-allow-credentials
true
timing-allow-origin
*
alt-svc
clear
rid
match.adsrvr.org/track/
109 B
542 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=185780
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.51.224.103 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-51-224-103.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
c8427883286d243b6d5c2c8f9fd41c17edbe509911150f778a31f5a0df8e098e

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
x-aspnet-version
4.0.30319
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.wsj.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Thu, 22 Apr 2021 14:40:27 GMT
idsv2
mid.rkdms.com/
0
156 B
XHR
General
Full URL
https://mid.rkdms.com/idsv2?ptk=17c1789b-e660-493b-aa74-3c8fb990dc5f&pubid=DOWJONES
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.22.122.247 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-22-122-247.compute-1.amazonaws.com
Software
nginx/1.18.0 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

access-control-allow-origin
https://www.wsj.com
date
Tue, 23 Mar 2021 14:40:27 GMT
access-control-allow-credentials
true
server
nginx/1.18.0
access-control-allow-methods
GET, HEAD, OPTIONS
wsj_resp_article_16u_snippet.async.13b2198650b9.css
asset.barrons.com/article/public/
49 KB
15 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/wsj_resp_article_16u_snippet.async.13b2198650b9.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6d7917888c5b43b53193c20f1911236f589b1225f9b4d9c6730ba80e05c14eb6

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 14:32:08 GMT
content-encoding
gzip
last-modified
Thu, 18 Mar 2021 15:07:10 GMT
server
AmazonS3
age
86900
etag
W/"d1367fe1c7c60688c9d94866e2eccb3a"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
0LVWsVHh3jrIMIjzFUwSzClO2FjbLGxUUdPwta0NnZ5K09f-1MchWA==
cx.js
cdn.cxense.com/
111 KB
27 KB
Script
General
Full URL
https://cdn.cxense.com/cx.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:7100:2a0::268b Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
AkamaiNetStorage /
Resource Hash
0ebfbfc245c6fc8911c5c790812ce93989cd9f42ef3437b24de2fd23990bdee3

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:27 GMT
Content-Encoding
gzip
Last-Modified
Tue, 23 Mar 2021 12:45:30 GMT
Server
AkamaiNetStorage
Vary
Accept-Encoding
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
26761
Expires
Tue, 23 Mar 2021 15:40:27 GMT
cx.cce.js
cdn.cxense.com/
22 KB
6 KB
Script
General
Full URL
https://cdn.cxense.com/cx.cce.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:7100:2a0::268b Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
AkamaiNetStorage /
Resource Hash
9b18e7bfca8064c887385c5cf57bdbcb6f7d263d0fb9cb320d94bc1f82a62a7c

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:27 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Feb 2021 15:28:34 GMT
Server
AkamaiNetStorage
Vary
Accept-Encoding
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=3600
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5903
Expires
Tue, 23 Mar 2021 15:40:27 GMT
index.html
cdn.privacy-mgmt.com/ Frame 2C81
4 KB
2 KB
Document
General
Full URL
https://cdn.privacy-mgmt.com/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.159.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-159-31.dus51.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
71b76d51d2da6bd16bba3c1ae1d61a6f24c72a21d5786e11c2c636ee1f4c908a

Request headers

:method
GET
:authority
cdn.privacy-mgmt.com
:scheme
https
:path
/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

content-type
text/html
last-modified
Tue, 16 Mar 2021 18:45:34 GMT
server
AmazonS3
content-encoding
gzip
date
Tue, 23 Mar 2021 13:50:09 GMT
etag
W/"f895edfe84fb752b0b1fea2c750ad685"
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 8033f9c6b87a03b2eca7c2db5157e10e.cloudfront.net (CloudFront)
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
Migq6v5WpDV7uSCfAqbROUH0vJ1MmQpI1BpLAnWewiW9r2yPFZgt0g==
age
3018
pubads_impl_2021031601.js
securepubads.g.doubleclick.net/gpt/
285 KB
100 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2021031601.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
142.250.185.162 , United States, ASN15169 (GOOGLE, US),
Reverse DNS
fra16s51-in-f2.1e100.net
Software
sffe /
Resource Hash
eea4a3705b3e19174b9f0f127702bfc02cda65dff1f5b25e65f48a9c65ce9a7e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 16 Mar 2021 08:39:28 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
cache-control
private, immutable, max-age=31536000
cross-origin-resource-policy
cross-origin
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
102421
x-xss-protection
0
expires
Tue, 23 Mar 2021 14:40:27 GMT
eviqoo.js
cl.qualaroo.com/ki.js/46075/
147 KB
48 KB
Script
General
Full URL
https://cl.qualaroo.com/ki.js/46075/eviqoo.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
185.59.220.197 Frankfurt am Main, Germany, ASN60068 (CDN77 (^_^)/, GB),
Reverse DNS
unn-185-59-220-197.datapacket.com
Software
BunnyCDN-DE1-487 /
Resource Hash
7d839c332db4f1ad40533b273945219eca20b60406ed4ef1eacbfd163ab9eb96

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
content-encoding
gzip
cdn-edgestorageid
487
x-amz-request-id
EG9W7Z2H6V2G5MBW
cdn-cachedat
2020-08-21 14:54:47
cdn-pullzone
92714
content-length
48983
x-amz-id-2
L2TFKVg0HpEQMydUK4ODBkFo2fcy8aKqAyvakvwG4vYc9FbhXK2MtWOftppbJWD32xKOsiCmksw=
last-modified
Fri, 21 Aug 2020 14:07:26 GMT
server
BunnyCDN-DE1-487
vary
Accept-Encoding, Accept-Encoding
content-type
application/ecmascript
cdn-cache
HIT
cdn-uid
50c043fb-dcd1-4574-9faf-b60384f66f78
cache-control
s-maxage=3600, max-age=0
cdn-requestid
993748da478a38c94b7c27d023ff4c4b
accept-ranges
bytes
cdn-requestcountrycode
NL
wsj_resp_article_16u_snippet.e71757e1e91e.js
asset.barrons.com/article/public/
527 KB
165 KB
Script
General
Full URL
https://asset.barrons.com/article/public/wsj_resp_article_16u_snippet.e71757e1e91e.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6568180942f34fd91276e59888a64f6c9e65fa2766718c83f2ccd3f229af7aa4

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:48 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 15:38:56 GMT
server
AmazonS3
age
586720
etag
W/"70a6d38b47ee709f9443d324e921c050"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
XmEqCWeXzxy5kYGUgr3brZM5Na8OUUDlANTfJW7p7BP1noCH0nY17A==
Notice.37f30.css
cdn.privacy-mgmt.com/ Frame 2C81
29 KB
5 KB
Stylesheet
General
Full URL
https://cdn.privacy-mgmt.com/Notice.37f30.css
Requested by
Host: cdn.privacy-mgmt.com
URL: https://cdn.privacy-mgmt.com/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.159.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-159-31.dus51.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
f34567304f288693cf33a0b0ff04fa42ed930db606948b4d5e6a9c715865affa

Request headers

Referer
https://cdn.privacy-mgmt.com/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 13:45:40 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 18:45:34 GMT
server
AmazonS3
age
3288
etag
W/"227670f327655cdc0f6317b8d0f58d27"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 8033f9c6b87a03b2eca7c2db5157e10e.cloudfront.net (CloudFront)
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
ucSHZ9ySAaX2Kc6DsncI0pIxH-7ZypasPGmQAhGAsdlmBPYuzgy0xQ==
polyfills.65071.js
cdn.privacy-mgmt.com/ Frame 2C81
5 KB
2 KB
Script
General
Full URL
https://cdn.privacy-mgmt.com/polyfills.65071.js
Requested by
Host: cdn.privacy-mgmt.com
URL: https://cdn.privacy-mgmt.com/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.159.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-159-31.dus51.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
533b23c57b1770cc3ee9c15b998b2eb494fa0adb2d6929fd22a9b78adfade3a7

Request headers

Referer
https://cdn.privacy-mgmt.com/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 13:54:06 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 18:45:34 GMT
server
AmazonS3
age
2782
etag
W/"89661b8fd918815bcb224bba79cabab1"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8033f9c6b87a03b2eca7c2db5157e10e.cloudfront.net (CloudFront)
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
_mUtWC7i5C9oXMB4dxLgDpqxwx-bJCPNHTL-DIOx8Wbr0P3y2hhFIw==
Notice.2f2bf.js
cdn.privacy-mgmt.com/ Frame 2C81
170 KB
42 KB
Script
General
Full URL
https://cdn.privacy-mgmt.com/Notice.2f2bf.js
Requested by
Host: cdn.privacy-mgmt.com
URL: https://cdn.privacy-mgmt.com/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.159.31 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-159-31.dus51.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
cff6d399aa3793e3ebf9dc4fb7c21d2a846642f2490d6be9effaff766d4ff5ce

Request headers

Referer
https://cdn.privacy-mgmt.com/index.html?message_id=450643&consentUUID=b1d90d4b-d364-4a30-9260-6ac021b7b149&requestUUID=a152af4a-b6b3-4012-bd9a-1226560a0d1f&preload_message=true&consentLanguage=en
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:23:51 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 18:45:34 GMT
server
AmazonS3
age
997
etag
W/"c85163727e52a58ce3e4990198570614"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 8033f9c6b87a03b2eca7c2db5157e10e.cloudfront.net (CloudFront)
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
IYAOOVzvndghbOkOksrq8958f33wXFB2c_OhWN3DieOnia8RE01SLw==
utag.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
138 KB
38 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cedd7b6ed1740611ec689e00b8f6486c01a9599a8be4f34ff84f7295d5bb7bc5

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:27 GMT
content-encoding
gzip
last-modified
Thu, 28 Jan 2021 20:34:25 GMT
server
AkamaiNetStorage
etag
"8f76b812243ddba4ac9409319878b2e1:1611866064.899549"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=300
accept-ranges
bytes
content-length
38179
expires
Tue, 23 Mar 2021 14:45:27 GMT
vidora-client.1.2.9.min.js
assets.vidora.com/js/
10 KB
10 KB
Script
General
Full URL
https://assets.vidora.com/js/vidora-client.1.2.9.min.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:211e:1800:4:77d:a0c0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
a801446b14366d62a4e9dc9105060d5d5f7cb079700e4c39318512214831ef37

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 08 Feb 2021 01:07:21 GMT
via
1.1 0363fab377de19b9b4f85394469f6fca.cloudfront.net (CloudFront)
last-modified
Mon, 16 Mar 2020 20:44:10 GMT
server
AmazonS3
age
3763987
etag
"d159321aabbd618a7a5dab4154f5c764"
x-cache
Hit from cloudfront
content-type
binary/octet-stream
cache-control
public,max-age=31536000
x-amz-cf-pop
FRA56-C2
accept-ranges
bytes
content-length
9914
x-amz-cf-id
NopNNIoldAKlZB892bgYdzOKRa0sdSegSR1uFYQ1I8gtcAuL8X1VQw==
c8882c9c-15d3-4d1f-9b0e-81b6f321365d.69625fd60463.js
asset.barrons.com/article/public/
18 KB
6 KB
Script
General
Full URL
https://asset.barrons.com/article/public/c8882c9c-15d3-4d1f-9b0e-81b6f321365d.69625fd60463.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6ce11960c6244fe2cd0d24c928b30662b75d6fb6883d521cb48c4ac213c0f4f3

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:40 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:29 GMT
server
AmazonS3
age
586728
etag
W/"856d66f9d7012942a187e40bbd11859d"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
ERHlpzm39UmmBN-QdrcvvP5EfaJQcVbp4h8nDdu64A9xAiuGDkSuCA==
5c5570fe-7775-4969-92ed-c47ecb965e78.18423e4e6de6.css
asset.barrons.com/article/public/
38 KB
7 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/5c5570fe-7775-4969-92ed-c47ecb965e78.18423e4e6de6.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
02ad550d2eb40a4b87da7846a243b84bc32757fcdd5f8ba8e0de700fd8ed1da4

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Thu, 18 Mar 2021 21:07:58 GMT
server
AmazonS3
age
64083
etag
W/"dd9a54b663c2cfefe3db052cc42f474e"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
k_lOyVciSlOFvmkonQ1rzwuHFXIt_TJIyv4O57JDTv7pGBwBJZR3cQ==
5c5570fe-7775-4969-92ed-c47ecb965e78.2a2387270570.js
asset.barrons.com/article/public/
981 KB
403 KB
Script
General
Full URL
https://asset.barrons.com/article/public/5c5570fe-7775-4969-92ed-c47ecb965e78.2a2387270570.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
becbd6c456509888a19c5b974eba1fd4d602b607ebae037120bd59bf833198cf

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Mon, 22 Mar 2021 18:46:33 GMT
server
AmazonS3
age
64083
etag
W/"7aa1a950b843524e7506f9d190b8efdd"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
ds3fgAuD2u79e8A3fUibO2W7O-xxUqJid0xYrDuf-t45PIAPzyYP1g==
0ad70e52-063f-11ea-8d71-362b9e155667.98e6c3fc89d9.css
asset.barrons.com/article/public/
9 KB
3 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/0ad70e52-063f-11ea-8d71-362b9e155667.98e6c3fc89d9.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6bdbea940f70009a140f6efecafec7e805a511ec55a7fc85a82d2e825a47aa6d

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Thu, 18 Mar 2021 21:07:58 GMT
server
AmazonS3
age
64083
etag
W/"9f8b162d4b1a651494ba3cdf7bc1f381"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
GylxrnuGcCvKfnsIItHEfy6bStquHFGIF_laXMOP9PZJvxwTSyysiw==
0ad70e52-063f-11ea-8d71-362b9e155667.fc50155095da.js
asset.barrons.com/article/public/
942 KB
390 KB
Script
General
Full URL
https://asset.barrons.com/article/public/0ad70e52-063f-11ea-8d71-362b9e155667.fc50155095da.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
264ef2cb6e93e9ee7eb864e39e855dc405eb9234c13ab2a34a4a55b536e15c7d

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Mon, 22 Mar 2021 18:46:33 GMT
server
AmazonS3
age
64083
etag
W/"37df44d522675b0961f55a4adacd82af"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
B3MUjteOkU0jxIeekJ9yKWoCcZdbYfLFWJWkSX2w-BkonsHMgGp-kg==
275181c7-8620-4df3-a008-d0cd9937db22.98103331169c.js
asset.barrons.com/article/public/
22 KB
6 KB
Script
General
Full URL
https://asset.barrons.com/article/public/275181c7-8620-4df3-a008-d0cd9937db22.98103331169c.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ef0c1c8ac3ed77047a2b7d7409552201408c20fe00dff72e1513d42a93a3899f

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:41 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:28 GMT
server
AmazonS3
age
586727
etag
W/"673b69e608a47924a9f116511b48ac49"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
ROHXOj3Hp2NnZk77PzbeQ9qhrx_rz8NU-9W6T57yip_3EHi6t1Jn6w==
c13492a5-d9db-47c3-a804-80f45f96c081.cafbe9d1e0d3.css
asset.barrons.com/article/public/
4 KB
2 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/c13492a5-d9db-47c3-a804-80f45f96c081.cafbe9d1e0d3.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
e5802f293c62b42467e0bee021146995034e4ea8741864d07473ebb4556fe3eb

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Mon, 22 Mar 2021 16:32:58 GMT
server
AmazonS3
age
64083
etag
W/"43d001b5f1cd0707df3ed5f1e627cc52"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
A9I78V65vGnvqOxiu0DZ5nWdfkergDfuf5ubeYyU2yvkAPgiq3fDOA==
c13492a5-d9db-47c3-a804-80f45f96c081.cf5b0ecdf37e.js
asset.barrons.com/article/public/
900 KB
375 KB
Script
General
Full URL
https://asset.barrons.com/article/public/c13492a5-d9db-47c3-a804-80f45f96c081.cf5b0ecdf37e.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1b36caccf9e1f7f6bcfe936386f94775b8cc18390a56ff783282af59df264573

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Mon, 22 Mar 2021 18:46:33 GMT
server
AmazonS3
age
64083
etag
W/"d7def09e4ef9a9a6814be0929a7a67b2"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
AQtkNzJM-4TQ_H1jSOahhJ9F7ieDZ5ey8UR9yXPHuIuOtqyeqI9BHQ==
17f32040-0bfd-4790-bb36-732d32093176.e195a3402f05.js
asset.barrons.com/article/public/
85 KB
28 KB
Script
General
Full URL
https://asset.barrons.com/article/public/17f32040-0bfd-4790-bb36-732d32093176.e195a3402f05.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
dc2e93ea2a95c3fef7ad3bede20512f172ae4afb7dac52fbf502ae7fef2c0449

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:41 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:28 GMT
server
AmazonS3
age
586727
etag
W/"1ad30f72b0adfe849a073178c0cdf966"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
hX69Xv9ZQvDJzuXdtzOf4fk9PsNLZFBwzt8wEW8TJm0uIgvIhCs_Tg==
03c85c64-f03f-4789-9e88-00158f0ea41e.407a98336892.css
asset.barrons.com/article/public/
44 KB
11 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/03c85c64-f03f-4789-9e88-00158f0ea41e.407a98336892.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
fbfcbb30fa8d058793e804e76b669f9344cc9af908f5af81e0d79efdaa23a074

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Thu, 18 Mar 2021 21:07:58 GMT
server
AmazonS3
age
64083
etag
W/"00f317fe4ba10431950bc88d52215c60"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
qhWXNHu-RXi3QnDkv6aBR3adrzjtsoU9Php8EGd7RuiEA97pEaQkeA==
03c85c64-f03f-4789-9e88-00158f0ea41e.2cd1a18dae6c.js
asset.barrons.com/article/public/
1 MB
476 KB
Script
General
Full URL
https://asset.barrons.com/article/public/03c85c64-f03f-4789-9e88-00158f0ea41e.2cd1a18dae6c.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ce3c45a4e612115a71954547a724a3a63d667be8e17bfb4e5cafff92faff9873

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Mon, 22 Mar 2021 18:46:33 GMT
server
AmazonS3
age
64083
etag
W/"2d3258c7c073ebade528a3ff8ea83aaa"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
a8S9ESqEGKbrMVMV8sEJT-PUwqEyAx8JgeV9SOWAe9OG_9G-EHyUYA==
9b6fea7a-ca2a-4ec2-982f-ea3079678342.246af03267ab.css
asset.barrons.com/article/public/
13 KB
5 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/9b6fea7a-ca2a-4ec2-982f-ea3079678342.246af03267ab.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
c515d84239266624e92f16089179ff92f92ec8e498b3c6e99ac8a6b110050f9d

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:40 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:29 GMT
server
AmazonS3
age
586728
etag
W/"6886b57e02c987316a06dd73b2107e11"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
6nMxqS8vv0cDSJ6HnuSoAnKq_NCkussrtH06DWZhbhSFYtg54Mnntw==
9b6fea7a-ca2a-4ec2-982f-ea3079678342.8cd4e30d70c1.js
asset.barrons.com/article/public/
946 KB
391 KB
Script
General
Full URL
https://asset.barrons.com/article/public/9b6fea7a-ca2a-4ec2-982f-ea3079678342.8cd4e30d70c1.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6a3bd974d8aa7a034bd80150e1d3be017fd3e25558101bc87c9d6d642d0d2445

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Mon, 22 Mar 2021 18:46:33 GMT
server
AmazonS3
age
64083
etag
W/"6adfaa2fc91fddb822cc7bd1ed5ee602"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
kZxD1sheEisd-cKk_bDbE5WQR6ALxaCyzUCwtB_2XDaEgvmX2RPP9g==
669cbb36-1bd8-4a26-89f6-ec35ac37fb24.adc09fc26faa.css
asset.barrons.com/article/public/
3 KB
1 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/669cbb36-1bd8-4a26-89f6-ec35ac37fb24.adc09fc26faa.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4aa46c304d58c1613317ff9b7e442638aed07eb93008f2ebf965446f3bb81a2d

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:25 GMT
content-encoding
gzip
last-modified
Thu, 18 Mar 2021 21:07:58 GMT
server
AmazonS3
age
64083
etag
W/"5e5f0f159d4ec137e12f697071f09511"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
QdoCvuMshyJr1WGhokgxLvKKhs97DfP3SURUsYdGXnVjwvhESPTMQg==
669cbb36-1bd8-4a26-89f6-ec35ac37fb24.285fd13531b1.js
asset.barrons.com/article/public/
23 KB
7 KB
Script
General
Full URL
https://asset.barrons.com/article/public/669cbb36-1bd8-4a26-89f6-ec35ac37fb24.285fd13531b1.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
40b06d856ba8fcc3e41ffae12241cce686159eec86ead92070ddcf62f039ecbe

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:41 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:28 GMT
server
AmazonS3
age
586727
etag
W/"59b2404067f5bb131ff1db4647391099"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
ywXPfMHpZo-tal4gyogluWq7n7nracr-QFeom0v58qjwI4pPFtzodQ==
md5.production-e41e7724c3.js
asset.wsj.net/public/
6 KB
3 KB
Script
General
Full URL
https://asset.wsj.net/public/md5.production-e41e7724c3.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:211e:5000:16:f5f7:a380:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8fa10251d001d1f7ef9f02d6947e65c165acb50f7ab13a544436ac29fb3653d6

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 02:54:16 GMT
content-encoding
gzip
age
42372
x-cache
Hit from cloudfront
content-length
2304
x-amz-id-2
MoEc5oVk2LeNoWQ8t6xN5UKkGtjypcppKHP2AJCNxG4RA0+q/dDwsjmVDQ8QzgkXqGENNBR4fF8=
last-modified
Thu, 16 Mar 2017 16:29:03 GMT
server
AmazonS3
etag
"b86a40785867daf7a7867ad4145340e0"
x-amz-request-id
10JRE760MXF3Z8PM
via
1.1 1ee1abe42f3acbda66e5d1252319566a.cloudfront.net (CloudFront)
cache-control
max-age=3153600
x-amz-cf-pop
FRA56-C2
accept-ranges
bytes
content-type
application/javascript
x-amz-cf-id
ykPDLdbbuy5c2Wp4up5yG2ddGg60NYklrG__cjdAi9eSkFXC4b0f_g==
data
api.cxense.com/public/widget/
4 KB
2 KB
Script
General
Full URL
https://api.cxense.com/public/widget/data?json=%7B%22context%22%3A%7B%22referrer%22%3A%22%22%2C%22categories%22%3A%7B%22subscriber%22%3A%22nonsubscriber%22%2C%22edition%22%3A%22naus%22%2C%22pwcampaign%22%3A%2210%22%2C%22bucket%22%3A%222%22%2C%22testgroup%22%3A%2233%22%7D%2C%22parameters%22%3A%5B%7B%22key%22%3A%22subscriber%22%2C%22value%22%3A%22nonsubscriber%22%7D%2C%7B%22key%22%3A%22edition%22%2C%22value%22%3A%22naus%22%7D%2C%7B%22key%22%3A%22pwcampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22bucket%22%2C%22value%22%3A%222%22%7D%2C%7B%22key%22%3A%22ver%22%2C%22value%22%3A%222.40%22%7D%2C%7B%22key%22%3A%22testGroup%22%2C%22value%22%3A%2233%22%7D%2C%7B%22key%22%3A%22env%22%2C%22value%22%3A%22prod%22%7D%2C%7B%22key%22%3A%22topDomain%22%2C%22value%22%3A%22wsj.com%22%7D%2C%7B%22key%22%3A%22pwTag%22%2C%22value%22%3A%22default%22%7D%2C%7B%22key%22%3A%22pwPlacement%22%2C%22value%22%3A%22cx-snippetad%22%7D%2C%7B%22key%22%3A%22pwCampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22pwType%22%2C%22value%22%3A%22personalized%22%7D%2C%7B%22key%22%3A%22retina%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22type%22%2C%22value%22%3A%22Technology%22%7D%2C%7B%22key%22%3A%22template%22%2C%22value%22%3A%22preview%22%7D%2C%7B%22key%22%3A%22access%22%2C%22value%22%3A%22paid%22%7D%2C%7B%22key%22%3A%22section%22%2C%22value%22%3A%22Tech%22%7D%2C%7B%22key%22%3A%22isSubscriber%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22ab_bucket%22%2C%22value%22%3A%2287%22%7D%2C%7B%22key%22%3A%22pageContentTypeDetai%22%2C%22value%22%3A%22article%22%7D%2C%7B%22key%22%3A%22pageSiteProduct%22%2C%22value%22%3A%22WSJ%22%7D%2C%7B%22key%22%3A%22testgroup%22%2C%22value%22%3A%2233%22%7D%5D%2C%22autoRefresh%22%3Afalse%2C%22url%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%7D%2C%22widgetId%22%3A%22cd6dfe5cad0e11d2b5b32bf63b7776a73af93c00%22%2C%22user%22%3A%7B%22ids%22%3A%7B%22usi%22%3A%22kmm4kkxnaic4weu6%22%7D%7D%2C%22prnd%22%3A%22kmm4kjzbrql6u1vp%22%7D&media=javascript&sid=9222318613852486900&widgetId=cd6dfe5cad0e11d2b5b32bf63b7776a73af93c00&resizeToContentSize=true&useSecureUrls=true&usi=kmm4kkxnaic4weu6&rnd=1147910111&prnd=kmm4kjzbrql6u1vp&tzo=-60&callback=cXJsonpCBkmm4kky8z68ahfg0
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.120 Schiphol, Netherlands, ASN54825 (PACKET, US),
Reverse DNS
Software
Jetty(9.4.28.v20200408) /
Resource Hash
f13c908028d32bd02e1ca3799574041fd9ccfb37e289766f26797a1b1a852a4f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
Jetty(9.4.28.v20200408)
strict-transport-security
max-age=31536000
p3p
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
cache-control
no-store, no-cache, must-revalidate
content-type
text/javascript;charset=utf-8
content-length
1384
expires
Mon, 26 Jul 1997 05:00:00 GMT
data
api.cxense.com/public/widget/
913 B
1 KB
Script
General
Full URL
https://api.cxense.com/public/widget/data?json=%7B%22context%22%3A%7B%22referrer%22%3A%22%22%2C%22categories%22%3A%7B%22subscriber%22%3A%22nonsubscriber%22%2C%22edition%22%3A%22naus%22%2C%22pwcampaign%22%3A%2210%22%2C%22bucket%22%3A%222%22%2C%22testgroup%22%3A%2233%22%7D%2C%22parameters%22%3A%5B%7B%22key%22%3A%22subscriber%22%2C%22value%22%3A%22nonsubscriber%22%7D%2C%7B%22key%22%3A%22edition%22%2C%22value%22%3A%22naus%22%7D%2C%7B%22key%22%3A%22pwcampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22bucket%22%2C%22value%22%3A%222%22%7D%2C%7B%22key%22%3A%22ver%22%2C%22value%22%3A%222.40%22%7D%2C%7B%22key%22%3A%22testGroup%22%2C%22value%22%3A%2233%22%7D%2C%7B%22key%22%3A%22env%22%2C%22value%22%3A%22prod%22%7D%2C%7B%22key%22%3A%22topDomain%22%2C%22value%22%3A%22wsj.com%22%7D%2C%7B%22key%22%3A%22pwTag%22%2C%22value%22%3A%22default%22%7D%2C%7B%22key%22%3A%22pwPlacement%22%2C%22value%22%3A%22cx-snippetad%22%7D%2C%7B%22key%22%3A%22pwCampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22pwType%22%2C%22value%22%3A%22personalized%22%7D%2C%7B%22key%22%3A%22retina%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22type%22%2C%22value%22%3A%22Technology%22%7D%2C%7B%22key%22%3A%22template%22%2C%22value%22%3A%22preview%22%7D%2C%7B%22key%22%3A%22access%22%2C%22value%22%3A%22paid%22%7D%2C%7B%22key%22%3A%22section%22%2C%22value%22%3A%22Tech%22%7D%2C%7B%22key%22%3A%22isSubscriber%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22ab_bucket%22%2C%22value%22%3A%2287%22%7D%2C%7B%22key%22%3A%22pageContentTypeDetai%22%2C%22value%22%3A%22article%22%7D%2C%7B%22key%22%3A%22pageSiteProduct%22%2C%22value%22%3A%22WSJ%22%7D%2C%7B%22key%22%3A%22testgroup%22%2C%22value%22%3A%2233%22%7D%5D%2C%22autoRefresh%22%3Afalse%2C%22url%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%7D%2C%22widgetId%22%3A%222ef2870b96cb18a4208f4bcf946286e73e3d791d%22%2C%22user%22%3A%7B%22ids%22%3A%7B%22usi%22%3A%22kmm4kkxnaic4weu6%22%7D%7D%2C%22prnd%22%3A%22kmm4kjzbrql6u1vp%22%7D&media=javascript&sid=9222318613852486900&widgetId=2ef2870b96cb18a4208f4bcf946286e73e3d791d&resizeToContentSize=true&useSecureUrls=true&usi=kmm4kkxnaic4weu6&rnd=1120193991&prnd=kmm4kjzbrql6u1vp&tzo=-60&callback=cXJsonpCBkmm4kkycm922mdup
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.120 Schiphol, Netherlands, ASN54825 (PACKET, US),
Reverse DNS
Software
Jetty(9.4.28.v20200408) /
Resource Hash
cdfea7b5309f1a68e07d6955f9d35bcb2bf48923e9ee1f810fa2db4658ab5ba1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:27 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
Jetty(9.4.28.v20200408)
strict-transport-security
max-age=31536000
p3p
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
cache-control
no-store, no-cache, must-revalidate
content-type
text/javascript;charset=utf-8
content-length
544
expires
Mon, 26 Jul 1997 05:00:00 GMT
rep.gif
scomcluster.cxense.com/Repo/
43 B
468 B
Image
General
Full URL
https://scomcluster.cxense.com/Repo/rep.gif?ver=1&typ=pgv&rnd=kmm4kjzbrql6u1vp&acc=0&sid=9222318613852486900&loc=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&gol=&pgn=&new=0&arf=0&ltm=1616510427745&ref=&tzo=-60&res=1600x1200&dpr=1&col=24&jav=0&bln=en-US&chs=UTF-8&cks=kmm4kkxxcien2i5s&ckp=kmm4kkxnaic4weu6&glb=&wsz=1600x1200&cp_ver=2.40&cp_testGroup=33&cp_env=prod&cp_topDomain=wsj.com&cp_pwTag=default&cp_pwPlacement=cx-snippetad&cp_pwCampaign=10&cp_pwType=personalized&cp_retina=n&cp_type=Technology&cp_template=preview&cp_access=paid&cp_section=Tech&cp_subscriber=nonsubscriber&cp_isSubscriber=n&cp_edition=naus&cp_bucket=2&cp_ab_bucket=87&cp_pageContentTypeDetai=article&cp_pageSiteProduct=WSJ&fls=0&flv=
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
178.63.12.147 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
de715.cxense.com
Software
Jetty(9.4.28.v20200408) /
Resource Hash
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:28 GMT
Server
Jetty(9.4.28.v20200408)
P3P
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Content-Length
43
Content-Type
image/gif
show_companion_ad.js
pagead2.googlesyndication.com/pagead/
14 KB
6 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/show_companion_ad.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
47b7a8710924ec2a6402c437f720b5e31dd3a5229a18db70badce74eaba80c4f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:02:32 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
2276
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
cross-origin-resource-policy
cross-origin
content-disposition
attachment; filename="f.txt"
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5864
x-xss-protection
0
server
cafe
etag
2731930202144549249
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
public, max-age=3600
timing-allow-origin
*
expires
Tue, 23 Mar 2021 15:02:32 GMT
wsj-logo-big-black.165e51ccda3d.svg
asset.barrons.com/article/public/img/
7 KB
3 KB
Image
General
Full URL
https://asset.barrons.com/article/public/img/wsj-logo-big-black.165e51ccda3d.svg
Requested by
Host: asset.barrons.com
URL: https://asset.barrons.com/article/public/03c85c64-f03f-4789-9e88-00158f0ea41e.407a98336892.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cd6e1b047c6ff55df32853dc017dfc0d353027c8b5f564f8b06584bff654642a

Request headers

Referer
https://asset.barrons.com/article/public/03c85c64-f03f-4789-9e88-00158f0ea41e.407a98336892.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:41 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:30 GMT
server
AmazonS3
age
586728
etag
W/"165e51ccda3da1ace8ad7d40e81a7485"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
QEThReOoGa3FJ1rUtd6haGNsvz0hhzEpPIMPCm08xozsUrg423A6YQ==
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8c14dd9179913a3fb6d8bee3165293a61a0ffe62aca3be04bae738b5bce30a13

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
google-play.4699f3c28a26.svg
asset.barrons.com/article/public/img/
6 KB
3 KB
Image
General
Full URL
https://asset.barrons.com/article/public/img/google-play.4699f3c28a26.svg
Requested by
Host: asset.barrons.com
URL: https://asset.barrons.com/article/public/9b6fea7a-ca2a-4ec2-982f-ea3079678342.246af03267ab.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f173ce9aba85239293aa2d30b59d8e9769ab57261a63376147b22773f84972bb

Request headers

Referer
https://asset.barrons.com/article/public/9b6fea7a-ca2a-4ec2-982f-ea3079678342.246af03267ab.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:41 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:30 GMT
server
AmazonS3
age
586728
etag
W/"4699f3c28a26de50bde7eb2e516c4616"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
RPQo8Yrd1o5ZAcpdQhxMVu72ZecfpwJeI9kzOyZqHHI0LsnQP30wTg==
appstore.a6e93ba3daca.svg
asset.barrons.com/article/public/img/
5 KB
2 KB
Image
General
Full URL
https://asset.barrons.com/article/public/img/appstore.a6e93ba3daca.svg
Requested by
Host: asset.barrons.com
URL: https://asset.barrons.com/article/public/9b6fea7a-ca2a-4ec2-982f-ea3079678342.246af03267ab.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
beec0e606b0397cdc95eba5c160317d7c73f18917d6cb2ec97795aec9b10fafa

Request headers

Referer
https://asset.barrons.com/article/public/9b6fea7a-ca2a-4ec2-982f-ea3079678342.246af03267ab.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:41 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:30 GMT
server
AmazonS3
age
586728
etag
W/"a6e93ba3daca96df368bd52a469cf262"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
image/svg+xml
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
yXAiYkucEyhTr8VqBlb7E5t8805BY-PCgnBTVRKvIffb2mInfFbwQw==
headerstats
as-sec.casalemedia.com/
0
309 B
XHR
General
Full URL
https://as-sec.casalemedia.com/headerstats?s=409263&u=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&v=3
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.24.241 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-24-241.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

Pragma
no-cache
Date
Tue, 23 Mar 2021 14:40:28 GMT
Server
Apache
Access-Control-Allow-Origin
https://www.wsj.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Length
0
Expires
Tue, 23 Mar 2021 14:40:28 GMT
bid
c.amazon-adsystem.com/e/dtb/
23 B
366 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3482&u=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&pid=m6gy4p0Ra5WFy&cb=0&ws=1600x1200&v=7.60.00&t=1000&slots=%5B%7B%22sd%22%3A%220%22%2C%22s%22%3A%5B%22300x250%22%2C%22320x320%22%2C%22728x90%22%2C%22970x90%22%2C%22970x66%22%2C%22970x250%22%5D%2C%22sn%22%3A%22%2F2%2Finteractive.wsj.com%2Ftech%22%7D%5D&cfgv=0&gdpre=1&gdprc=CPDd0E3PDd0E3AGABCENBSCgAAAAAELAABpYAAAN1gDAAgAEdAQcBCADAgH2AbqAOEgAgCOFAAgBHAN1GAAgBHAN1HQAQBHEAAIAjiQAEARxSACACAAA.YAAAAAAAAAAA&gdprl=%7B%22status%22%3A%22tcfv2-success%22%7D
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.158.204 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-158-204.dus51.r.cloudfront.net
Software
Server /
Resource Hash
745a085b52b8371ec6705413fca70a28c6d8bff0db480e6b124bd08c54e95ef8

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
via
1.1 821feb380ab4aeca6ae9157aa1190ff2.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
DUS51-C1
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://www.wsj.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
X_-i3l_SeWuzWpfaHiHeuE0D9RfKmqOdTEtd4e622eBc7518DV32yw==
bid
c.amazon-adsystem.com/e/dtb/
23 B
368 B
XHR
General
Full URL
https://c.amazon-adsystem.com/e/dtb/bid?src=3482&u=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&pid=m6gy4p0Ra5WFy&cb=1&ws=1600x1200&v=7.60.00&t=1000&slots=%5B%7B%22sd%22%3A%221%22%2C%22s%22%3A%5B%22300x250%22%2C%22320x320%22%2C%222x2%22%2C%22300x600%22%2C%22300x1050%22%5D%2C%22sn%22%3A%22%2F2%2Finteractive.wsj.com%2Ftech%22%7D%5D&cfgv=0&gdpre=1&gdprc=CPDd0E3PDd0E3AGABCENBSCgAAAAAELAABpYAAAN1gDAAgAEdAQcBCADAgH2AbqAOEgAgCOFAAgBHAN1GAAgBHAN1HQAQBHEAAIAjiQAEARxSACACAAA.YAAAAAAAAAAA&gdprl=%7B%22status%22%3A%22tcfv2-success%22%7D
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.158.204 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-158-204.dus51.r.cloudfront.net
Software
Server /
Resource Hash
89b4aa9e9bf8516c2ab7b5134f65d47b02071637259a14c9f60dccc207e05ce4

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
via
1.1 821feb380ab4aeca6ae9157aa1190ff2.cloudfront.net (CloudFront)
server
Server
x-amz-cf-pop
DUS51-C1
vary
User-Agent
x-cache
Miss from cloudfront
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
https://www.wsj.com
access-control-allow-credentials
true
timing-allow-origin
*
content-length
23
x-amz-cf-id
mUBYZ4hcf4j8hGlvNp45cvGwOIwAYmRi2oMZ5ezFiyLTVWJDOasFqA==
WSJTheme-275181c7-8620-4df3-a008-d0cd9937db22.55f3bab017fe.css
asset.barrons.com/article/public/
10 KB
4 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/WSJTheme-275181c7-8620-4df3-a008-d0cd9937db22.55f3bab017fe.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
62441e5010f8cb21137be10c0c415b238b4561ce9a037c2e4e4c48d6947146e5

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 22 Mar 2021 20:52:26 GMT
content-encoding
gzip
last-modified
Thu, 18 Mar 2021 21:07:58 GMT
server
AmazonS3
age
64083
etag
W/"9edb3c1e47283ea2f34900d35b3c7760"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
-Bc3KgL_BUAxr-9lwnhWZd2WvX1Nvn1Iz3XfMvsScyGQRdM9z_-h4A==
WSJTheme-275181c7-8620-4df3-a008-d0cd9937db22.35ce785333eb.js
asset.barrons.com/article/public/
8 KB
4 KB
Script
General
Full URL
https://asset.barrons.com/article/public/WSJTheme-275181c7-8620-4df3-a008-d0cd9937db22.35ce785333eb.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
b13892567997e3df87899c52e0a80bcd17019977ebbd5532edfedb43d2eb1170

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:42 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:29 GMT
server
AmazonS3
age
586727
etag
W/"65d8d83f222406a09dfc398664263a0d"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
IZ293caV7t7nyEAksm_wGRHjSOlYhFf1o10eb4QmTXyOgVVLkRE0FA==
WSJTheme-17f32040-0bfd-4790-bb36-732d32093176.ea4c27101aa4.css
asset.barrons.com/article/public/
4 KB
2 KB
Stylesheet
General
Full URL
https://asset.barrons.com/article/public/WSJTheme-17f32040-0bfd-4790-bb36-732d32093176.ea4c27101aa4.css
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
23aaf5959a3443deeb0b4ee0f11f230da1f7211bbca064515aaf302a3d59e16d

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:42 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:29 GMT
server
AmazonS3
age
586727
etag
W/"a92ccfaa157704088e7d8d1de38225f7"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
text/css
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
T5dagCh1iTc4Y7yO0IVlXU7zxY6Yynm7UoHFCDGkScqiKTEYU6jVUA==
WSJTheme-17f32040-0bfd-4790-bb36-732d32093176.0f3485b75049.js
asset.barrons.com/article/public/
1 KB
1 KB
Script
General
Full URL
https://asset.barrons.com/article/public/WSJTheme-17f32040-0bfd-4790-bb36-732d32093176.0f3485b75049.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:206f:a200:1a:635e:8fc0:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
17c366a1a6af130f4c10d1cf220e10685adde6e601bea20dfcf893354a4f496c

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 16 Mar 2021 19:41:42 GMT
content-encoding
gzip
last-modified
Tue, 16 Mar 2021 02:37:29 GMT
server
AmazonS3
age
586727
etag
W/"6c537880b9895baf4b890ac329b33cac"
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 d947c3ab534102b2c9a7f0a4541d2ed9.cloudfront.net (CloudFront)
cache-control
max-age=31536000
x-amz-cf-pop
FRA56-C1
x-amz-cf-id
RPs2ZNyQ04EBDsdMaZivT4FjYVfkP2ToJCdTyOw1XNlJpzfh5FflWg==
truncated
/ Frame 2C81
62 KB
62 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f27f7b08cdba301dc4a18d86a6749ca5e133b70aa2fdc166327c8be7d9a30a37

Request headers

Origin
https://cdn.privacy-mgmt.com
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
application/font-woff
truncated
/ Frame 2C81
62 KB
62 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b14684edc7a33025134268da451328fe23fd64c0ab1614a9811f47b3dbe944b4

Request headers

Origin
https://cdn.privacy-mgmt.com
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
application/font-woff
id
dpm.demdex.net/
367 B
1 KB
XHR
General
Full URL
https://dpm.demdex.net/id?d_visid_ver=4.4.0&d_fieldgroup=MC&d_rtbd=json&d_ver=2&d_orgid=CB68E4BA55144CAA0A4C98A5%40AdobeOrg&d_nsid=0&ts=1616510428526
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.39.225 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-246-39-225.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
2206c48767667dd6cfeb9eb4cd3400e3e46da01edf521da73b238d944438e142
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

DCS
dcs-prod-irl1-v090-0ff724c1e.edge-irl1.demdex.com 5.80.7.20210304103356 7ms (+0ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
Content-Encoding
gzip
X-TID
qhOCBoHCSks=
Vary
Origin, Accept-Encoding, User-Agent
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Access-Control-Allow-Origin
https://www.wsj.com
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json;charset=utf-8
Content-Length
304
Expires
Thu, 01 Jan 1970 00:00:00 GMT
utag.331.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.331.js?utv=ut4.46.202101101414
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
be732d8d3767863acbd79f0f19fb005aa3c06048174ca27d1fa0d63e7e5b3957

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Fri, 19 Oct 2018 16:41:06 GMT
server
AkamaiNetStorage
etag
"56267864bc0c42c03b6df396fb68f1e3:1539967266"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
916
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.312.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
3 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.312.js?utv=ut4.46.202101101414
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
c84c3adafe72e12fcc722c873c342d0d14d39b24587159ec8b201d20745c60d8

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Thu, 17 Aug 2017 20:17:03 GMT
server
AkamaiNetStorage
etag
"65e69feb7a57d78cf0fd3a038e9267ce:1503001023"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1270
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.313.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
55 KB
17 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.313.js?utv=ut4.46.202101101414
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
4d6b15af7e84bc9b498ca161df9ed5b4f8a56a7a21f0fde3ff22d7e000c62277

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Thu, 17 Aug 2017 20:17:03 GMT
server
AkamaiNetStorage
etag
"4a65dd0c659f0b8cc66a43613c579a82:1503001023"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
17296
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.404.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
3 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.404.js?utv=ut4.46.202101101414
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
8f642ca05713a34d74b4da86813a3bfd868934ec11ba295f97198b58fc50636b

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Wed, 24 Oct 2018 00:35:12 GMT
server
AkamaiNetStorage
etag
"ac3277e4efc43ebb6f19b26c00ae8131:1540341312"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1319
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.432.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.432.js?utv=ut4.46.202101271342
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
a78d1522c19df1aa33e1caae584d05dc149875061ef1569cf0cd4e7f9eb1a8aa

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Sat, 05 Dec 2020 00:19:03 GMT
server
AkamaiNetStorage
etag
"0a3a58c3c5d30065b86955816ee460e1:1607127543.447074"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1205
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.309.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.309.js?utv=ut4.46.202101101414
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
fd3bfdee8bbfb9d3dc894217ba3e843673727a0ff522f9aa82da9c9988c6d8ab

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Fri, 01 Jun 2018 17:48:51 GMT
server
AkamaiNetStorage
etag
"373e043dda0fe83005924173e4e69daa:1527875331"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1028
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.279.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
3 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.279.js?utv=ut4.46.202101081555
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
7d1f01b1b0358ba5964941063c52bf124ba28b061f53c987bd0963298be1f2d2

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Thu, 28 May 2020 17:30:04 GMT
server
AkamaiNetStorage
etag
"332d9251bbe6c944b0bba43d4708bf0e:1590687004.301073"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1471
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.334.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
3 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.334.js?utv=ut4.46.202101081555
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
a5607861ab3c9c83766c1bae06272c446e5ba7bf4a66dbbac9e5b532dd70cefb

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Wed, 06 Sep 2017 21:31:29 GMT
server
AkamaiNetStorage
etag
"f370fa8e250d2ca631d00b5df6bcfc7e:1504733489"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1531
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.409.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
4 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.409.js?utv=ut4.46.202101081555
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
8674ea75b653c503ee16c32dde1a8a72a920cb40597590a8b69d94f32006ff06

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Fri, 22 Feb 2019 15:17:13 GMT
server
AkamaiNetStorage
etag
"9f526d06fe9e58f32c8e19ce170409f0:1550848633"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1778
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.381.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
2 KB
1 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.381.js?utv=ut4.46.202101081555
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
1e0ead576de98a27a4da3c1461492acf158b3581eb1e283c499a696ae9e80822

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Mon, 02 Apr 2018 20:14:56 GMT
server
AkamaiNetStorage
etag
"fc2081b97d661ab8bc9f1bed8af8b472:1522700096"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1133
expires
Wed, 07 Apr 2021 14:40:28 GMT
utag.458.js
tags.tiqcdn.com/utag/wsjdn/wsj/prod/
3 KB
2 KB
Script
General
Full URL
https://tags.tiqcdn.com/utag/wsjdn/wsj/prod/utag.458.js?utv=ut4.46.202012141427
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
36e588ab3599f1ba52e646223ee0082cd08b844f09845abdf10622ee9e669b5b

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
last-modified
Mon, 14 Dec 2020 14:27:15 GMT
server
AkamaiNetStorage
etag
"d517d53f7b696e909eeeba8389313ef4:1607956035.476555"
vary
Accept-Encoding
content-type
application/x-javascript
cache-control
max-age=1296000
accept-ranges
bytes
content-length
1652
expires
Wed, 07 Apr 2021 14:40:28 GMT
pixel.gif
www.wsj.com/cookies/
35 B
292 B
Image
General
Full URL
https://www.wsj.com/cookies/pixel.gif
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Express
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
x-amz-cf-pop
DUS51-C1
x-powered-by
Express
x-cache
Miss from cloudfront
content-type
image/gif
cache-control
no-cache
content-length
35
x-amz-cf-id
zMVkGobKNIr7ItDHaoz2DywTZ8D8DWlQ2Y0aew43rzxeqNjpH7T73A==
data
api.cxense.com/public/widget/
16 KB
4 KB
Script
General
Full URL
https://api.cxense.com/public/widget/data?json=%7B%22context%22%3A%7B%22referrer%22%3A%22%22%2C%22categories%22%3A%7B%22subscriber%22%3A%22nonsubscriber%22%2C%22edition%22%3A%22naus%22%2C%22pwcampaign%22%3A%2210%22%2C%22bucket%22%3A%222%22%2C%22testgroup%22%3A%2233%22%7D%2C%22parameters%22%3A%5B%7B%22key%22%3A%22subscriber%22%2C%22value%22%3A%22nonsubscriber%22%7D%2C%7B%22key%22%3A%22edition%22%2C%22value%22%3A%22naus%22%7D%2C%7B%22key%22%3A%22pwcampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22bucket%22%2C%22value%22%3A%222%22%7D%2C%7B%22key%22%3A%22ver%22%2C%22value%22%3A%222.40%22%7D%2C%7B%22key%22%3A%22testGroup%22%2C%22value%22%3A%2233%22%7D%2C%7B%22key%22%3A%22env%22%2C%22value%22%3A%22prod%22%7D%2C%7B%22key%22%3A%22topDomain%22%2C%22value%22%3A%22wsj.com%22%7D%2C%7B%22key%22%3A%22pwTag%22%2C%22value%22%3A%22default%22%7D%2C%7B%22key%22%3A%22pwPlacement%22%2C%22value%22%3A%22cx-snippetad%22%7D%2C%7B%22key%22%3A%22pwCampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22pwType%22%2C%22value%22%3A%22personalized%22%7D%2C%7B%22key%22%3A%22retina%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22type%22%2C%22value%22%3A%22Technology%22%7D%2C%7B%22key%22%3A%22template%22%2C%22value%22%3A%22preview%22%7D%2C%7B%22key%22%3A%22access%22%2C%22value%22%3A%22paid%22%7D%2C%7B%22key%22%3A%22section%22%2C%22value%22%3A%22Tech%22%7D%2C%7B%22key%22%3A%22isSubscriber%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22ab_bucket%22%2C%22value%22%3A%2287%22%7D%2C%7B%22key%22%3A%22pageContentTypeDetai%22%2C%22value%22%3A%22article%22%7D%2C%7B%22key%22%3A%22pageSiteProduct%22%2C%22value%22%3A%22WSJ%22%7D%2C%7B%22key%22%3A%22testgroup%22%2C%22value%22%3A%2233%22%7D%5D%2C%22autoRefresh%22%3Afalse%2C%22url%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%7D%2C%22widgetId%22%3A%22fdffeaef25759d5a4b278e2b045241d7cc93fb7c%22%2C%22user%22%3A%7B%22ids%22%3A%7B%22usi%22%3A%22kmm4kkxnaic4weu6%22%7D%7D%2C%22prnd%22%3A%22kmm4kjzbrql6u1vp%22%7D&media=javascript&sid=9222318613852486900&widgetId=fdffeaef25759d5a4b278e2b045241d7cc93fb7c&resizeToContentSize=true&useSecureUrls=true&usi=kmm4kkxnaic4weu6&rnd=1889370284&prnd=kmm4kjzbrql6u1vp&tzo=-60&callback=cXJsonpCBkmm4klfp62wdupe2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.120 Schiphol, Netherlands, ASN54825 (PACKET, US),
Reverse DNS
Software
Jetty(9.4.28.v20200408) /
Resource Hash
da56a6ebc8f0c849c782ba682c88240a534b158287bb724b6b1b3dd38349e2bf
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
Jetty(9.4.28.v20200408)
strict-transport-security
max-age=31536000
p3p
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
cache-control
no-store, no-cache, must-revalidate
content-type
text/javascript;charset=utf-8
content-length
3648
expires
Mon, 26 Jul 1997 05:00:00 GMT
data
api.cxense.com/public/widget/
4 KB
2 KB
Script
General
Full URL
https://api.cxense.com/public/widget/data?json=%7B%22context%22%3A%7B%22referrer%22%3A%22%22%2C%22categories%22%3A%7B%22subscriber%22%3A%22nonsubscriber%22%2C%22edition%22%3A%22naus%22%2C%22pwcampaign%22%3A%2210%22%2C%22bucket%22%3A%222%22%2C%22testgroup%22%3A%2233%22%7D%2C%22parameters%22%3A%5B%7B%22key%22%3A%22subscriber%22%2C%22value%22%3A%22nonsubscriber%22%7D%2C%7B%22key%22%3A%22edition%22%2C%22value%22%3A%22naus%22%7D%2C%7B%22key%22%3A%22pwcampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22bucket%22%2C%22value%22%3A%222%22%7D%2C%7B%22key%22%3A%22ver%22%2C%22value%22%3A%222.40%22%7D%2C%7B%22key%22%3A%22testGroup%22%2C%22value%22%3A%2233%22%7D%2C%7B%22key%22%3A%22env%22%2C%22value%22%3A%22prod%22%7D%2C%7B%22key%22%3A%22topDomain%22%2C%22value%22%3A%22wsj.com%22%7D%2C%7B%22key%22%3A%22pwTag%22%2C%22value%22%3A%22default%22%7D%2C%7B%22key%22%3A%22pwPlacement%22%2C%22value%22%3A%22cx-snippetad%22%7D%2C%7B%22key%22%3A%22pwCampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22pwType%22%2C%22value%22%3A%22personalized%22%7D%2C%7B%22key%22%3A%22retina%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22type%22%2C%22value%22%3A%22Technology%22%7D%2C%7B%22key%22%3A%22template%22%2C%22value%22%3A%22preview%22%7D%2C%7B%22key%22%3A%22access%22%2C%22value%22%3A%22paid%22%7D%2C%7B%22key%22%3A%22section%22%2C%22value%22%3A%22Tech%22%7D%2C%7B%22key%22%3A%22isSubscriber%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22ab_bucket%22%2C%22value%22%3A%2287%22%7D%2C%7B%22key%22%3A%22pageContentTypeDetai%22%2C%22value%22%3A%22article%22%7D%2C%7B%22key%22%3A%22pageSiteProduct%22%2C%22value%22%3A%22WSJ%22%7D%2C%7B%22key%22%3A%22testgroup%22%2C%22value%22%3A%2233%22%7D%5D%2C%22autoRefresh%22%3Afalse%2C%22url%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%7D%2C%22widgetId%22%3A%227c0f421cfa9c7ff41f8607ed2a35e74618ba7a6a%22%2C%22user%22%3A%7B%22ids%22%3A%7B%22usi%22%3A%22kmm4kkxnaic4weu6%22%7D%7D%2C%22prnd%22%3A%22kmm4kjzbrql6u1vp%22%7D&media=javascript&sid=9222318613852486900&widgetId=7c0f421cfa9c7ff41f8607ed2a35e74618ba7a6a&resizeToContentSize=true&useSecureUrls=true&usi=kmm4kkxnaic4weu6&rnd=1622043301&prnd=kmm4kjzbrql6u1vp&tzo=-60&callback=cXJsonpCBkmm4klfvn374gwha
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.120 Schiphol, Netherlands, ASN54825 (PACKET, US),
Reverse DNS
Software
Jetty(9.4.28.v20200408) /
Resource Hash
896f829baca5fa6d7a41b264545f15558967bf0a64e3d179a6b4ef5c89ea4e8d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
Jetty(9.4.28.v20200408)
strict-transport-security
max-age=31536000
p3p
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
cache-control
no-store, no-cache, must-revalidate
content-type
text/javascript;charset=utf-8
content-length
1839
expires
Mon, 26 Jul 1997 05:00:00 GMT
data
api.cxense.com/public/widget/
6 KB
2 KB
Script
General
Full URL
https://api.cxense.com/public/widget/data?json=%7B%22context%22%3A%7B%22referrer%22%3A%22%22%2C%22categories%22%3A%7B%22subscriber%22%3A%22nonsubscriber%22%2C%22edition%22%3A%22naus%22%2C%22pwcampaign%22%3A%2210%22%2C%22bucket%22%3A%222%22%2C%22testgroup%22%3A%2233%22%7D%2C%22parameters%22%3A%5B%7B%22key%22%3A%22subscriber%22%2C%22value%22%3A%22nonsubscriber%22%7D%2C%7B%22key%22%3A%22edition%22%2C%22value%22%3A%22naus%22%7D%2C%7B%22key%22%3A%22pwcampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22bucket%22%2C%22value%22%3A%222%22%7D%2C%7B%22key%22%3A%22ver%22%2C%22value%22%3A%222.40%22%7D%2C%7B%22key%22%3A%22testGroup%22%2C%22value%22%3A%2233%22%7D%2C%7B%22key%22%3A%22env%22%2C%22value%22%3A%22prod%22%7D%2C%7B%22key%22%3A%22topDomain%22%2C%22value%22%3A%22wsj.com%22%7D%2C%7B%22key%22%3A%22pwTag%22%2C%22value%22%3A%22default%22%7D%2C%7B%22key%22%3A%22pwPlacement%22%2C%22value%22%3A%22cx-snippetad%22%7D%2C%7B%22key%22%3A%22pwCampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22pwType%22%2C%22value%22%3A%22personalized%22%7D%2C%7B%22key%22%3A%22retina%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22type%22%2C%22value%22%3A%22Technology%22%7D%2C%7B%22key%22%3A%22template%22%2C%22value%22%3A%22preview%22%7D%2C%7B%22key%22%3A%22access%22%2C%22value%22%3A%22paid%22%7D%2C%7B%22key%22%3A%22section%22%2C%22value%22%3A%22Tech%22%7D%2C%7B%22key%22%3A%22isSubscriber%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22ab_bucket%22%2C%22value%22%3A%2287%22%7D%2C%7B%22key%22%3A%22pageContentTypeDetai%22%2C%22value%22%3A%22article%22%7D%2C%7B%22key%22%3A%22pageSiteProduct%22%2C%22value%22%3A%22WSJ%22%7D%2C%7B%22key%22%3A%22testgroup%22%2C%22value%22%3A%2233%22%7D%5D%2C%22autoRefresh%22%3Afalse%2C%22url%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%7D%2C%22widgetId%22%3A%22709e0d02d3792f778b24228ce30f79002dec0364%22%2C%22user%22%3A%7B%22ids%22%3A%7B%22usi%22%3A%22kmm4kkxnaic4weu6%22%7D%7D%2C%22prnd%22%3A%22kmm4kjzbrql6u1vp%22%7D&media=javascript&sid=9222318613852486900&widgetId=709e0d02d3792f778b24228ce30f79002dec0364&resizeToContentSize=true&useSecureUrls=true&usi=kmm4kkxnaic4weu6&rnd=846044273&prnd=kmm4kjzbrql6u1vp&tzo=-60&callback=cXJsonpCBkmm4klg1ekbgcdas
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.120 Schiphol, Netherlands, ASN54825 (PACKET, US),
Reverse DNS
Software
Jetty(9.4.28.v20200408) /
Resource Hash
303179572c054601ee7e5b0ada7cce2663958e9a781076f23958e3ef0f56f41a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
Jetty(9.4.28.v20200408)
strict-transport-security
max-age=31536000
p3p
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
cache-control
no-store, no-cache, must-revalidate
content-type
text/javascript;charset=utf-8
content-length
1748
expires
Mon, 26 Jul 1997 05:00:00 GMT
Cookie set dest5.html
dowjones.demdex.net/ Frame B6D3
7 KB
3 KB
Document
General
Full URL
https://dowjones.demdex.net/dest5.html?d_nsid=undefined
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.200.157.96 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-18-200-157-96.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
7bea17a80a61ed0f54248b4ffc4c718f7c8ff2619742577a73591d62ce074da8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Host
dowjones.demdex.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
demdex=13010086674621593890013812748369204575
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Accept-Ranges
bytes
Cache-Control
max-age=21600
Content-Encoding
gzip
Content-Type
text/html
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified
Wed, 10 Mar 2021 16:01:36 GMT
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Pragma
no-cache
Set-Cookie
demdex=13010086674621593890013812748369204575;Path=/;Domain=.demdex.net;Expires=Sun, 19-Sep-2021 14:40:28 GMT;Max-Age=15552000;Secure;SameSite=None
Strict-Transport-Security
max-age=31536000; includeSubDomains
Vary
Accept-Encoding, User-Agent
X-TID
lW0uaWssTHY=
Content-Length
2785
Connection
keep-alive
ibs:dpid=411&dpuuid=YFn93AAAAFPCOCkN
dpm.demdex.net/
Redirect Chain
  • https://cm.everesttech.net/cm/dd?d_uuid=13010086674621593890013812748369204575
  • https://dpm.demdex.net/ibs:dpid=411&dpuuid=YFn93AAAAFPCOCkN
42 B
915 B
Image
General
Full URL
https://dpm.demdex.net/ibs:dpid=411&dpuuid=YFn93AAAAFPCOCkN
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.246.39.225 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-34-246-39-225.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

DCS
dcs-prod-irl1-v090-066368f53.edge-irl1.demdex.com 5.80.7.20210304103356 1ms (+1ms)
Pragma
no-cache
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Content-Type-Options
nosniff
X-TID
56bASwOhQ4E=
P3P
policyref="/w3c/p3p.xml", CP="NOI NID CURa ADMa DEVa PSAa PSDa OUR SAMa BUS PUR COM NAV INT"
Cache-Control
no-cache,no-store,must-revalidate,max-age=0,proxy-revalidate,no-transform,private
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Thu, 01 Jan 1970 00:00:00 GMT

Redirect headers

Location
https://dpm.demdex.net/ibs:dpid=411&dpuuid=YFn93AAAAFPCOCkN
Date
Tue, 23 Mar 2021 14:40:28 GMT
Cache-Control
no-cache
Server
AMO-cookiemap/1.1
Connection
keep-alive
Content-Length
0
P3P
CP="NOI NID DEVa PSAa PSDa OUR IND PUR COM NAV INT DEM"
v60.js
cdn-gl.imrworldwide.com/
Redirect Chain
  • https://secure-us.imrworldwide.com/v60.js
  • https://cdn-gl.imrworldwide.com/v60.js
21 KB
7 KB
Script
General
Full URL
https://cdn-gl.imrworldwide.com/v60.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:5e00:2:42d9:3100:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
75481bc06d1b02e50fd1cc921a7838e3af6caa9b8c0745b50182ebf29f195e20

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
.KrDWJ6YcsmnfI6j8sx8eWw9CjCealBE
content-encoding
gzip
etag
W/"cc7339d315e5ab16597dd66d153a0e7e"
last-modified
Mon, 12 Oct 2020 13:35:53 GMT
server
AmazonS3
age
31870
x-amz-server-side-encryption
AES256
vary
Accept-Encoding
x-cache
Hit from cloudfront
content-type
application/javascript
via
1.1 88bc7a9e54e3765a2fd64d3e80cc8217.cloudfront.net (CloudFront)
cache-control
max-age=86400
date
Tue, 23 Mar 2021 05:49:19 GMT
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
zAAaLdsFTDx4zrxxToK_9OxCh6ygY-AelZjKef3cAxOHhkHvkMvvjw==

Redirect headers

location
https://cdn-gl.imrworldwide.com:443/v60.js
date
Tue, 23 Mar 2021 14:40:28 GMT
server
awselb/2.0
content-length
134
content-type
text/html
segments
www.wsj.com/emailsignup/
33 B
424 B
Fetch
General
Full URL
https://www.wsj.com/emailsignup/segments
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:2182:6000:3:4b0:de80:93a1 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/ Express
Resource Hash
5349db16a90756d9ddef76d0177e01419ee596007798522b9ca91d6627505b61

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
tracestate
1022681@nr=0-1-1684273-914039553-0aa73775070dcd24----1616510428796
traceparent
00-bb4038f6478726d38b6060e58e2595b0-0aa73775070dcd24-01
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
newrelic
eyJ2IjpbMCwxXSwiZCI6eyJ0eSI6IkJyb3dzZXIiLCJhYyI6IjE2ODQyNzMiLCJhcCI6IjkxNDAzOTU1MyIsImlkIjoiMGFhNzM3NzUwNzBkY2QyNCIsInRyIjoiYmI0MDM4ZjY0Nzg3MjZkMzhiNjA2MGU1OGUyNTk1YjAiLCJ0aSI6MTYxNjUxMDQyODc5NiwidGsiOiIxMDIyNjgxIn19
content-type
application/json; charset=utf-8

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
etag
W/"21-1WszN1HzmLjzX8pZiVeECQ"
x-amz-cf-pop
DUS51-C1
x-powered-by
Express
vary
Origin
x-cache
Miss from cloudfront
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.wsj.com
access-control-allow-credentials
true
x-amz-cf-id
Jbqf9z-uiBO0ExeGnRSh-pnfVa_lXC8AwDEOv7buA4sTq6MwsDbh_A==
via
1.1 51054083366f59cdc509361d23d873eb.cloudfront.net (CloudFront)
sfmavwkc3.js
cdn.krxd.net/controltag/
28 KB
7 KB
Script
General
Full URL
https://cdn.krxd.net/controltag/sfmavwkc3.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
2470fe344c2d1e5d548fec59938b1f2db635d42424e3deb9d1cfccb1c94841ab

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-backend
4FrRTvEr9h480D4BywjehZ--F_config_service_ash_prod
date
Tue, 23 Mar 2021 14:40:28 GMT
via
1.1 varnish, 1.1 varnish
age
28
x-cache
MISS, HIT, HIT
x-app-cache
HIT
x-age
0
content-encoding
gzip
content-length
6339
x-served-by
config-service-a001-ash-prod.krxd.net, cache-bwi5150-BWI, cache-hhn4068-HHN
x-response-time
1
x-do-esi
esi
x-timer
S1616510429.864291,VS0,VE0
etag
"91a21cbc974a78fd641ba98d5b517031dde7b3e9"
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
cache-control
public, max-age=1200
accept-ranges
bytes
x-cache-hits
0, 2, 5
ncg.js
us.tags.newscgp.com/prod/ncg/
142 KB
45 KB
Script
General
Full URL
https://us.tags.newscgp.com/prod/ncg/ncg.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.66 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4be96c5d29c9bf76e780135555bf103c8376a99652ff3a975a30c998d155fbf7

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Mon, 22 Mar 2021 19:37:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 18 Mar 2021 05:50:52 GMT
Server
AmazonS3
Age
68566
ETag
W/"ba7b8e295a90f7f658ffadb83f351e67"
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 120ade321ed0e3697c81eb1eb19b5f62.cloudfront.net (CloudFront)
Connection
keep-alive
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
0ZTa31F9GMmJWtrto7LUkZz9bHOXwHYK-uPXRekqTPQHs0MOc6_wFg==
img
pixel.videohub.tv/event/
43 B
354 B
Image
General
Full URL
https://pixel.videohub.tv/event/img?trackcd=1590095980178&bvr_id=1160316&adv_id=472986
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
199.127.207.184 , United States, ASN26120 (RHYTHMONE, US),
Reverse DNS
Software
nginx/1.10.3 /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:29 GMT
useSecure
true
Server
nginx/1.10.3
Connection
keep-alive
Content-Length
43
Content-Type
image/gif
load.js
s.ntv.io/serve/
350 KB
102 KB
Script
General
Full URL
https://s.ntv.io/serve/load.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.25.59 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-25-59.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
a907e2526a3b6cab889c0980f334e473c5030a198e475a498888dd7f443e65b3

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:28 GMT
Content-Encoding
gzip
x-amz-request-id
WHJHDKWWRMS7YJAW
x-amz-server-side-encryption
AES256
Transfer-Encoding
chunked
Connection
keep-alive, Transfer-Encoding
x-amz-id-2
kQ9sIRxA3eklRqehjh3tgJBhehTRwyG2fgsea2tSSTsuJfLSNX+WJhOryBWylpyHqXWidS0xrTs=
Last-Modified
Thu, 18 Mar 2021 22:59:00 GMT
Server
AmazonS3
ETag
"b746b90cece7de94af23a6f5d4065113"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
cs.js
sb.scorecardresearch.com/c2/6035148/
0
400 B
Script
General
Full URL
https://sb.scorecardresearch.com/c2/6035148/cs.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.19.34.195 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-19-34-195.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:28 GMT
Content-Encoding
gzip
Last-Modified
Fri, 08 Apr 2011 23:11:26 GMT
ETag
"d41d8cd98f00b204e9800998ecf8427e:1349196464"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=259200
Connection
keep-alive
Content-Length
20
Expires
Fri, 26 Mar 2021 14:40:28 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035148&ns__t=1616510428825&ns_c=UTF-8&c8=Microsoft%20Probes%20Whether%20Leak%20Played%20Role%20in%20Suspected%20Chinese%20Hack%20-%20WSJ&c7=https%3A%2F%2...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035148&ns__t=1616510428825&ns_c=UTF-8&c8=Microsoft%20Probes%20Whether%20Leak%20Played%20Role%20in%20Suspected%20Chinese%20Hack%20-%20WSJ&c7=https%3A%2F%...
0
528 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035148&ns__t=1616510428825&ns_c=UTF-8&c8=Microsoft%20Probes%20Whether%20Leak%20Played%20Role%20in%20Suspected%20Chinese%20Hack%20-%20WSJ&c7=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&c9=&cs_ak_ss=1
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2.19.34.195 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a2-19-34-195.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 23 Mar 2021 14:40:28 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035148&ns__t=1616510428825&ns_c=UTF-8&c8=Microsoft%20Probes%20Whether%20Leak%20Played%20Role%20in%20Suspected%20Chinese%20Hack%20-%20WSJ&c7=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&c9=&cs_ak_ss=1
Pragma
no-cache
Date
Tue, 23 Mar 2021 14:40:28 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
outbrain.js
widgets.outbrain.com/
169 KB
57 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.25.80 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-25-80.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
4c75866b96d0beb84da129fec2f73daa3584d6ec3a1a84bd34c55762be48b1c7

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
edge-cache-tag
widget-cheetah
cookie
CheetahStaging=true
x-traceid
e1a253ffc339bbc47e36e8000ef6a1cb
content-length
57577
last-modified
Sun, 21 Mar 2021 15:31:40 GMT
etag
W/"2a555-7zDHuWtCwd0ElO/z07olBcATG9E"
vary
Accept-Encoding
access-control-allow-methods
GET,POST
content-type
application/x-javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=14400
access-control-allow-credentials
false
timing-allow-origin
*, *
expires
Tue, 23 Mar 2021 18:40:28 GMT
obtp.js
amplify.outbrain.com/cp/
7 KB
3 KB
Script
General
Full URL
https://amplify.outbrain.com/cp/obtp.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.25.80 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-25-80.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
e15eca5878352d8972f4e93b9aed80e34860514c23bfe9ee0a01767a291cf28a

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:28 GMT
Content-Encoding
gzip
Last-Modified
Mon, 22 Mar 2021 12:03:44 GMT
Server
AkamaiNetStorage
ETag
"c43e7f1b0459d05cce32768dd16af59b:1616414624.063318"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=1200
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2864
Expires
Tue, 23 Mar 2021 15:00:28 GMT
insight.min.js
snap.licdn.com/li.lms-analytics/
4 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:7100:481::25ea Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
/
Resource Hash
5f3b103a1268f862a5e432d607f8e5220dea9d301d13565b0ecded3ad9c25ab2

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:28 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Jan 2021 22:14:03 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=21250
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1855
utag.v.js
tags.tiqcdn.com/utag/tiqapp/
2 B
202 B
Script
General
Full URL
https://tags.tiqcdn.com/utag/tiqapp/utag.v.js?a=wsjdn/wsj/202101282034&cb=1616510428837
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.79.129.43 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-79-129-43.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
a2c2339691fc48fbd14fb307292dff3e21222712d9240810742d7df0c6d74dfb

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:28 GMT
last-modified
Thu, 14 Apr 2016 16:57:51 GMT
server
AkamaiNetStorage
etag
"7bc0ee636b3b83484fc3b9348863bd22:1460653071"
content-type
application/x-javascript
cache-control
max-age=600
accept-ranges
bytes
content-length
2
expires
Tue, 23 Mar 2021 14:50:28 GMT
tag.aspx
ml314.com/
28 KB
13 KB
Script
General
Full URL
https://ml314.com/tag.aspx?232
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.18.215.87 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-18-215-87.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
ac2295d897d9c85c39d26180d983fa960e03d52bbe0874f152274b00cf1abc99

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:28 GMT
Content-Encoding
gzip
Last-Modified
Tue, 23 Mar 2021 07:29:10 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=60521
Connection
keep-alive
Content-Length
12550
Expires
Wed, 24 Mar 2021 07:29:10 GMT
push
comcluster.cxense.com/dmp/
64 B
652 B
Script
General
Full URL
https://comcluster.cxense.com/dmp/push?callback=cXJsonpCBkmm4kloe1qrp63f3&persisted=c77e57f707a8285372fa005966570578c63489b3&json=%7B%22events%22%3A%5B%7B%22type%22%3A%22snippetLoad%22%2C%22rnd%22%3A%22kmm4kloe9ppivndd%22%2C%22siteId%22%3A%229222318613852486900%22%2C%22prnd%22%3A%22kmm4kjzbrql6u1vp%22%2C%22userIds%22%3A%5B%7B%22id%22%3A%22kmm4kkxnaic4weu6%22%2C%22type%22%3A%22cx%22%7D%5D%2C%22origin%22%3A%22wsj-placement%22%2C%22customParameters%22%3A%5B%7B%22group%22%3A%22trackCode%22%2C%22item%22%3A%22aaqwghsx%22%2C%22type%22%3A%22string%22%7D%2C%7B%22group%22%3A%22brand%22%2C%22item%22%3A%22WSJ%22%2C%22type%22%3A%22string%22%7D%2C%7B%22group%22%3A%22campaignType%22%2C%22item%22%3A%22ACQUISITION%22%2C%22type%22%3A%22string%22%7D%5D%7D%5D%7D
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
178.63.12.147 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
de715.cxense.com
Software
Jetty(9.4.28.v20200408) /
Resource Hash
739c523c10e326360d93285517694607bb4b020df238faff2d9f0be11959050b
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 23 Mar 2021 14:40:29 GMT
X-Content-Type-Options
nosniff
Server
Jetty(9.4.28.v20200408)
P3P
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control
no-store, no-cache, must-revalidate
Content-Type
text/javascript;charset=utf-8
Content-Length
64
Expires
Mon, 26 Jul 1997 05:00:00 GMT
controltag.js.0631b7d64dbbd3656a8b7368ad227a04
cdn.krxd.net/ctjs/
259 KB
83 KB
Script
General
Full URL
https://cdn.krxd.net/ctjs/controltag.js.0631b7d64dbbd3656a8b7368ad227a04
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
b9b47c8bafc4618d804c7c54ac03c39b29beb9ed5b1e7d9dbadb0f28d71c3d94

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-backend
4FrRTvEr9h480D4BywjehZ--F_Controltag_S3
date
Tue, 23 Mar 2021 14:40:28 GMT
content-encoding
gzip
age
3506754
x-amz-server-side-encryption
AES256
x-cache
HIT
x-cache-hits
4052794
content-length
84451
x-served-by
cache-hhn4068-HHN
last-modified
Thu, 15 Oct 2020 07:09:29 GMT
x-timer
S1616510429.890258,VS0,VE0
etag
"0631b7d64dbbd3656a8b7368ad227a04"
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=315360000
accept-ranges
bytes
expires
Sun, 13 Oct 2030 07:09:28 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=65162&time=1616510428891&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D65162%26time%3D1616510428891%26url%3Dhttps%253A%252F%252Fwww.wsj.com%252Farticles...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=65162&time=1616510428891&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-116155757...
0
57 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=65162&time=1616510428891&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&liSync=true
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2620:119:50e1:101::6cae:b25 , United States, ASN14413 (LINKEDIN, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:29 GMT
server
Play
linkedin-action
1
x-li-fabric
prod-lor1
x-li-proto
http/2
x-li-pop
prod-esv5
content-type
application/javascript
content-length
0
x-li-uuid
pVbR1qv/bhbQmHvUKisAAA==

Redirect headers

strict-transport-security
max-age=31536000
x-content-type-options
nosniff
linkedin-action
1
content-length
0
x-li-uuid
Ayojy6v/bhaAV3lxpCsAAA==
pragma
no-cache
x-li-pop
afd-prod-lor1
x-msedge-ref
Ref A: 74B6B843B2964DC39C3729F614EE4D57 Ref B: FRAEDGE1309 Ref C: 2021-03-23T14:40:29Z
date
Tue, 23 Mar 2021 14:40:29 GMT
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
x-frame-options
sameorigin
x-li-fabric
prod-lor1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=65162&time=1616510428891&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&liSync=true
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id lnkd.demdex.net blob: https://accounts.google.com/gsi/status https://linkedin.sc.omtrdc.net/b/ss/ www.google-analytics.com static.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media.licdn.com media-exp1.licdn.com media-exp2.licdn.com media-exp3.licdn.com; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/ platform.linkedin.com platform-akam.linkedin.com platform-ecst.linkedin.com platform-azur.linkedin.com; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
cachedClickId
tr.outbrain.com/
35 B
239 B
Script
General
Full URL
https://tr.outbrain.com/cachedClickId?marketerId=00b266f4449d0269d75a7ebfb8cb3bb5e3
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.95 , United States, ASN13789 (INTERNAP-BLK3, US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
1d348f9f803c95305f63def9d75fd50e79e54a375e1a4a888edbbea366845580

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:29 GMT
content-encoding
gzip
X-TraceId
5518daa29d224f53adc265b0b8628867
Content-Length
56
Content-Type
application/javascript
unifiedPixel
tr.outbrain.com/
43 B
256 B
Image
General
Full URL
https://tr.outbrain.com/unifiedPixel?marketerId=00b266f4449d0269d75a7ebfb8cb3bb5e3&obApiVersion=1.1&obtpVersion=1.4.1&name=PAGE_VIEW&dl=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&optOut=false&bust=03429363798199643
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.95 , United States, ASN13789 (INTERNAP-BLK3, US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
33ca751ed175a163bef530ebdcdbd0a2d15997ccbcbf8d50a6f504e8ffac5a5c

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:29 GMT
Cache-Control
no-cache
X-TraceId
20b5f7d7ef050b9f4ff2763e0e0c89fa
content-encoding
gzip
Content-Length
60
Content-Type
image/gif;
cookie.html
us.tags.newscgp.com/prod/ncg/ Frame 2571
6 KB
3 KB
Document
General
Full URL
https://us.tags.newscgp.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.66 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
us.tags.newscgp.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Tue, 23 Mar 2021 00:17:16 GMT
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 120ade321ed0e3697c81eb1eb19b5f62.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
h0FgFc8mSkx3CtX0IkgMI4vTv5G7bRt_CEXOj-X6s2_qOLP9y4zqMQ==
Age
51793
bounce
ib.adnxs.com/
Redirect Chain
  • https://ib.adnxs.com/mapuid?member=7239&user=40b955c4-c195-4a19-8ec2-cf4fcfa12b0b
  • https://ib.adnxs.com/bounce?%2Fmapuid%3Fmember%3D7239%26user%3D40b955c4-c195-4a19-8ec2-cf4fcfa12b0b
43 B
1 KB
Image
General
Full URL
https://ib.adnxs.com/bounce?%2Fmapuid%3Fmember%3D7239%26user%3D40b955c4-c195-4a19-8ec2-cf4fcfa12b0b
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
185.33.221.11 Amsterdam, Netherlands, ASN29990 (ASN-APPNEX, US),
Reverse DNS
733.bm-nginx-loadbalancer.mgmt.ams1.adnexus.net
Software
nginx/1.17.9 /
Resource Hash
4b5b6b15c6255109e06720cce42a06d3aead8b7874423d9c52cb0303212c25ef
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 23 Mar 2021 14:40:29 GMT
X-Proxy-Origin
185.212.171.67; 185.212.171.67; 733.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.59:80
AN-X-Request-Uuid
0cc499d2-fd9a-49eb-b44e-05ca60df7c72
Server
nginx/1.17.9
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, private
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Tue, 23 Mar 2021 14:40:29 GMT
X-Proxy-Origin
185.212.171.67; 185.212.171.67; 733.bm-nginx-loadbalancer.mgmt.ams1; *.adnxs.com; 185.33.220.187:80
AN-X-Request-Uuid
ea31a2d3-7d59-432a-b93b-7a3c41194ef9
Server
nginx/1.17.9
P3P
policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Location
https://ib.adnxs.com/bounce?%2Fmapuid%3Fmember%3D7239%26user%3D40b955c4-c195-4a19-8ec2-cf4fcfa12b0b
Cache-Control
no-store, no-cache, private
Connection
keep-alive
Content-Type
text/html; charset=utf-8
Content-Length
0
X-XSS-Protection
0
Expires
Sat, 15 Nov 2008 16:00:00 GMT
usermatch.gif
beacon.krxd.net/
0
338 B
Image
General
Full URL
https://beacon.krxd.net/usermatch.gif?partner=newsiq&partner_uid=40b955c4-c195-4a19-8ec2-cf4fcfa12b0b
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.77.62.253 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-77-62-253.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:29 GMT
cache-control
private, no-cache, no-store
x-request-time
D=43 t=1616510429
x-served-by
beacon-n015-dub-prod.krxd.net
p3p
policyref="https://cdn.krxd.net/kruxcontent/p3p.xml", CP="NON DSP COR NID OUR DEL SAM OTR UNR COM NAV INT DEM CNT STA PRE LOC OTC"
465646.gif
idsync.rlcdn.com/
0
66 B
Image
General
Full URL
https://idsync.rlcdn.com/465646.gif?partner_uid=40b955c4-c195-4a19-8ec2-cf4fcfa12b0b
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.244.174.68 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
68.174.244.35.bc.googleusercontent.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:29 GMT
via
1.1 google
alt-svc
clear
content-length
0
i
us.pixel.newscgp.com/
43 B
608 B
Image
General
Full URL
https://us.pixel.newscgp.com/i?stm=1616510429002&e=se&se_ca=aka&se_ac=link%3Adomain&se_la=40b955c4-c195-4a19-8ec2-cf4fcfa12b0b&se_pr=wsj.com&tv=js-2.9.0&tna=_ncg__0&aid=newsconnect-global&p=web&tz=Europe%2FBerlin&lang=en-US&cs=UTF-8&res=1600x1200&cd=24&cookie=1&eid=d46c9850-2826-41f9-8637-ef80b670a694&dtm=1616510428997&vp=1600x1200&ds=1600x3230&vid=1&sid=a5ca5aa6-7872-4354-8669-92d05b958704&duid=40b955c4-c195-4a19-8ec2-cf4fcfa12b0b&fp=99543720&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.231.78.127 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-231-78-127.compute-1.amazonaws.com
Software
nginx /
Resource Hash
caa849b179befa2645a8e2c474d2e82a76777a3305315ece911013e8ee9a916c

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:29 GMT
Server
nginx
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
put.html
widgets.outbrain.com/nanoWidget/externals/cookie/ Frame 78EE
416 B
815 B
Document
General
Full URL
https://widgets.outbrain.com/nanoWidget/externals/cookie/put.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.25.80 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-25-80.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
4f3b933077b738b503f7543ffc82fa0a061f0fe7d0ff1470865fde561a324bcc

Request headers

:method
GET
:authority
widgets.outbrain.com
:scheme
https
:path
/nanoWidget/externals/cookie/put.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

accept-ranges
bytes
content-type
text/html
etag
"c0311cf15c21ddda054005e92fad3f9e:1616342831.377797"
last-modified
Sun, 21 Mar 2021 15:30:54 GMT
server
AkamaiNetStorage
content-length
416
cache-control
max-age=345600
date
Tue, 23 Mar 2021 14:40:29 GMT
timing-allow-origin
* *
access-control-allow-credentials
false
access-control-allow-methods
GET,POST
access-control-allow-origin
*
cookie
CheetahStaging=true
set-cookie
akacd_widgets_routing=1616510429~rv=38~id=318373ac439208cb6661213ea922aa92; path=/; Expires=Tue, 23 Mar 2021 14:40:29 GMT; Secure; SameSite=None
d3d3Lndzai5jb20=
tcheck.outbrainimg.com/tcheck/check/
16 B
464 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/d3d3Lndzai5jb20=
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.108.145.205 Berlin, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-108-145-205.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:29 GMT
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=28965
Access-Control-Allow-Credentials
false
Connection
keep-alive
X-TraceId
6a5a1a8c2703a018b9d84bb577ee4e27
Content-Length
16
Expires
Tue, 23 Mar 2021 22:43:14 GMT
px.gif
widget-pixels.outbrain.com/widget/detect/
43 B
468 B
Image
General
Full URL
https://widget-pixels.outbrain.com/widget/detect/px.gif?ch=1&rn=5.891403188939429
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.25.80 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-25-80.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:29 GMT
last-modified
Wed, 30 Sep 2020 14:22:29 GMT
server
AkamaiNetStorage
etag
"ad4b0f606e0f8465bc4c4c170b37e1a3:1601475749.911431"
access-control-allow-methods
GET,POST
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=2592000
access-control-allow-credentials
false
cookie
CheetahStaging=true
accept-ranges
bytes
timing-allow-origin
*, *
content-length
43
expires
Thu, 22 Apr 2021 14:40:29 GMT
m
secure-us.imrworldwide.com/cgi-bin/
Redirect Chain
  • https://secure-us.imrworldwide.com/cgi-bin/m?rnd=1616510429211&ci=us-403743h&js=1&cg=0&ts=cachedClickId?marketerId=00b266f4449d0269d75a7ebfb8cb3bb5e3&vn=6.0.104&cc=1&cd=24&ck=y&je=n&lg=en-US&si=htt...
  • https://secure-us.imrworldwide.com/cgi-bin/m?rnd=1616510429211&ci=us-403743h&js=1&cg=0&ts=cachedClickId?marketerId=00b266f4449d0269d75a7ebfb8cb3bb5e3&vn=6.0.104&cc=1&cd=24&ck=y&je=n&lg=en-US&si=htt...
44 B
336 B
Image
General
Full URL
https://secure-us.imrworldwide.com/cgi-bin/m?rnd=1616510429211&ci=us-403743h&js=1&cg=0&ts=cachedClickId?marketerId=00b266f4449d0269d75a7ebfb8cb3bb5e3&vn=6.0.104&cc=1&cd=24&ck=y&je=n&lg=en-US&si=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&sr=1600x1200&tz=1&ja=1
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.214.158.139 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx /
Resource Hash
5ecb58845a9ac30e4eb4b18eb0e7431ba1fb195ce035309735efaee67421c7a3

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:29 GMT
server
nginx
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://secure-us.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
access-control-allow-origin
*
cache-control
no-cache
content-type
image/gif
content-length
44
expires
Thu, 01 Dec 1994 16:00:00 GMT

Redirect headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:29 GMT
server
nginx
location
https://secure-us.imrworldwide.com/cgi-bin/m?rnd=1616510429211&ci=us-403743h&js=1&cg=0&ts=cachedClickId?marketerId=00b266f4449d0269d75a7ebfb8cb3bb5e3&vn=6.0.104&cc=1&cd=24&ck=y&je=n&lg=en-US&si=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&sr=1600x1200&tz=1&ja=1
access-control-allow-methods
POST, OPTIONS
p3p
P3P policyref="http://secure-us.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
access-control-allow-origin
*
cache-control
no-cache
content-length
0
expires
Thu, 01 Dec 1994 16:00:00 GMT
fd886588-e5a4-4fe2-9d09-006f6d3c3aab
consumer.krxd.net/consent/get/
221 B
294 B
Script
General
Full URL
https://consumer.krxd.net/consent/get/fd886588-e5a4-4fe2-9d09-006f6d3c3aab?idt=device&dt=kxcookie&callback=Krux.ns.dowjones.kxjsonp_consent_get_0
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
1dc04a0de6e3212ae8f01b69bf9baef06651bb2b86d4ca33c5092f638ad69008

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:29 GMT
via
1.1 varnish
age
0
x-served-by
consumer-a003-dub-prod.krxd.net, cache-hhn4053-HHN
vary
Accept-Encoding
x-cache
MISS, MISS
content-type
text/javascript; charset=UTF-8
content-encoding
gzip
cache-control
max-age=1800
x-age
0
accept-ranges
bytes
x-timer
S1616510429.285142,VS0,VE30
content-length
182
x-cache-hits
0, 0
fd886588-e5a4-4fe2-9d09-006f6d3c3aab
consumer.krxd.net/consent/set/
257 B
463 B
Script
General
Full URL
https://consumer.krxd.net/consent/set/fd886588-e5a4-4fe2-9d09-006f6d3c3aab?idt=device&dt=kxcookie&dc=0&al=0&tg=0&cd=0&sh=0&re=0&callback=Krux.ns.dowjones.kxjsonp_consent_set_1
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
339a1e13e131873bc6bcffd6c8ff1d48b833b73c4c5ebc7d39f7d638bfbfe86e

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:29 GMT
via
1.1 varnish
x-timer
S1616510429.285132,VS0,VE27
x-served-by
consumer-a015-dub-prod.krxd.net, cache-hhn4053-HHN
vary
Accept-Encoding
x-cache
MISS, MISS
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=10
x-age
0
accept-ranges
bytes
content-encoding
gzip
content-length
222
x-cache-hits
0, 0
t
jadserve.postrelease.com/
97 B
524 B
Script
General
Full URL
https://jadserve.postrelease.com/t?ntv_url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&ntv_mvi
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.9.156.34 San Jose, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
nginx/1.12.1 /
Resource Hash
5de79bd33c164a62fe3389aeef0af2f54b82e7f8ba5fd7d0721f8080823babcb

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:29 GMT
content-encoding
gzip
server
nginx/1.12.1
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
text/javascript;charset=UTF-8
content-length
108
expires
Mon, 1 Jan 1990 12:00:00 GMT
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
325 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1616510429336&sessionId=7137dd95-3f1d-e821-c20e-8a594e8f9b1b&url=www.wsj.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.95 , United States, ASN13789 (INTERNAP-BLK3, US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 23 Mar 2021 14:40:29 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
X-TraceId
b404c4a46fe829ab091db7a44bdef0ce
Content-Length
4
Expires
0
test.html
widgets.outbrain.com/nanoWidget/externals/cookie/ Frame 78EE
610 B
1009 B
Document
General
Full URL
https://widgets.outbrain.com/nanoWidget/externals/cookie/test.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nanoWidget/externals/cookie/put.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.30.25.80 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a184-30-25-80.deploy.static.akamaitechnologies.com
Software
AkamaiNetStorage /
Resource Hash
6139e1fc0d3709eebbe2b18510cf24361b9f8a538c3529a73c282bafe6c78474

Request headers

:method
GET
:authority
widgets.outbrain.com
:scheme
https
:path
/nanoWidget/externals/cookie/test.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
same-origin
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://widgets.outbrain.com/nanoWidget/externals/cookie/put.html
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
thirdparty=yes
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://widgets.outbrain.com/nanoWidget/externals/cookie/put.html

Response headers

accept-ranges
bytes
content-type
text/html
etag
"48053d50141031b1511dbd30f9a31288:1616342832.127557"
last-modified
Sun, 21 Mar 2021 15:30:54 GMT
server
AkamaiNetStorage
content-length
610
cache-control
max-age=345600
date
Tue, 23 Mar 2021 14:40:29 GMT
timing-allow-origin
* *
access-control-allow-credentials
false
access-control-allow-methods
GET,POST
access-control-allow-origin
*
cookie
CheetahStaging=true
set-cookie
akacd_widgets_routing=1616510429~rv=39~id=48eb2682fe52d5c83c91edd9e69ce38d; path=/; Expires=Tue, 23 Mar 2021 14:40:29 GMT; Secure; SameSite=None
cookie.html
www.ncaudienceexchange.com/prod/ncg/ Frame FF9A
6 KB
3 KB
Document
General
Full URL
https://www.ncaudienceexchange.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.32.21.123 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-32-21-123.fra56.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

:method
GET
:authority
www.ncaudienceexchange.com
:scheme
https
:path
/prod/ncg/cookie.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

content-type
text/html
last-modified
Wed, 28 Aug 2019 23:03:03 GMT
server
AmazonS3
content-encoding
gzip
date
Tue, 23 Mar 2021 11:42:23 GMT
etag
W/"27a77bbc87eed7c50fbccf9c936e316d"
vary
Accept-Encoding
x-cache
Hit from cloudfront
via
1.1 aff6ac5c98fa897349204752e5877c81.cloudfront.net (CloudFront)
x-amz-cf-pop
FRA56-C2
x-amz-cf-id
Ih6xWAomurMMRdQA5ROSdcBOWCAAysmYfCHGaDC_lkVGbFp6HhssFQ==
age
10687
cookie.html
tags.realtor.com/prod/ncg/ Frame A4A8
6 KB
3 KB
Document
General
Full URL
https://tags.realtor.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.66 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.realtor.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Tue, 23 Mar 2021 00:17:16 GMT
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 673c96d1f19de21216629aa48d90ac92.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
3MnvE_ovtbJrEYQDCt2uwBnOw__Pe43aZiewScsFoRwlmLTYHxyXgA==
Age
51794
cookie.html
tags.barrons.com/prod/ncg/ Frame 6549
6 KB
3 KB
Document
General
Full URL
https://tags.barrons.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.66 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.barrons.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Tue, 23 Mar 2021 00:17:16 GMT
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 98997c223299d9efd138e7fb9a08a072.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
x23LS8nFIR0ZxOnSkkgbUgYDpkkyTkxVGVoVHri3WjZMQ_B9K9O6dQ==
Age
51794
cookie.html
tags.mansionglobal.com/prod/ncg/ Frame 8A8E
6 KB
3 KB
Document
General
Full URL
https://tags.mansionglobal.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.22 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.mansionglobal.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Tue, 23 Mar 2021 00:17:16 GMT
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 cc763905c39a59494c951c09271b0422.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
8pcYazSn9c4UmMgDR4Dd55aKgZGOiZIgiYbuvh02YX-0rkLLKb6kdw==
Age
51794
cookie.html
tags.marketwatch.com/prod/ncg/ Frame BBF8
6 KB
3 KB
Document
General
Full URL
https://tags.marketwatch.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.22 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.marketwatch.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Tue, 23 Mar 2021 00:17:16 GMT
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 2fc0d20914c32e5cd76477ed042298d1.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
4WWTP6tL3FKioSRcL9OiDviG-1PkIDLSrZ0-dcXQkT6sPMaIzWLSWw==
Age
51794
cookie.html
tags.nypost.com/prod/ncg/ Frame 6C93
6 KB
3 KB
Document
General
Full URL
https://tags.nypost.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.44 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.nypost.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Tue, 23 Mar 2021 00:17:16 GMT
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 cc763905c39a59494c951c09271b0422.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
lctsU3wK8KbRKp2ZVvtj1cDPSmEcawOchmBKUebQ-yqdIVRFBSMELA==
Age
51794
cookie.html
tags.decider.com/prod/ncg/ Frame 7532
6 KB
3 KB
Document
General
Full URL
https://tags.decider.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.44 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.decider.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Tue, 23 Mar 2021 00:17:16 GMT
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 cae542650fb32c773cc494fc6e7e71e7.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
MFc8CvzOYB0tHYpQR0oxGBqLZccsuxAIFYhB9TwnbIwx9rAOPWCs_g==
Age
51794
cookie.html
tags.pagesix.com/prod/ncg/ Frame 98E1
6 KB
3 KB
Document
General
Full URL
https://tags.pagesix.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.22 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.pagesix.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Date
Tue, 23 Mar 2021 00:17:16 GMT
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Server
AmazonS3
Content-Encoding
gzip
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 58b39782bf40f627ace295c1c6f59840.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
0kgzmfZVfuP2SGIDFwrAKn3FWBQhB_HQacL-Gzlx6IvdNbFtOZtW8A==
Age
51794
cookie.html
tags.knewz.com/prod/ncg/ Frame B4EC
6 KB
6 KB
Document
General
Full URL
https://tags.knewz.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.44 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.knewz.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Content-Length
5976
Connection
keep-alive
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
Accept-Ranges
bytes
Server
AmazonS3
Date
Mon, 22 Mar 2021 23:44:13 GMT
ETag
"27a77bbc87eed7c50fbccf9c936e316d"
X-Cache
Hit from cloudfront
Via
1.1 14b10bd09a0531ef477d0a404ca26900.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
T1ixL55Sw9j7ohD_DudIKXbnArYjdWJFUdH4L1LksntkUbQRVtcc8w==
Age
53787
cookie.html
tags.penews.com/prod/ncg/ Frame 977B
6 KB
3 KB
Document
General
Full URL
https://tags.penews.com/prod/ncg/cookie.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
65.9.58.44 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
be33c364e784f14ebca2c4a7caba16a3b32046c6f0dedc1f1caf0d05d280a9c4

Request headers

Host
tags.penews.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
iframe
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Last-Modified
Wed, 28 Aug 2019 23:03:03 GMT
Server
AmazonS3
Content-Encoding
gzip
Date
Mon, 22 Mar 2021 20:49:49 GMT
ETag
W/"27a77bbc87eed7c50fbccf9c936e316d"
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Via
1.1 910fc18161f0602555cc5b6397ca26f3.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C1
X-Amz-Cf-Id
hVIJf2CVFhtP5aSxZ3b9TeZfDwwsvym7moP3tUAT2KcCAhPRKJeKjQ==
Age
64242
i
us.pixel.newscgp.com/
43 B
608 B
Image
General
Full URL
https://us.pixel.newscgp.com/i?stm=1616510429455&e=pv&url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&page=Microsoft%20Probes%20Whether%20Leak%20Played%20Role%20in%20Suspected%20Chinese%20Hack%20-%20WSJ&tv=js-2.9.0&tna=_ncg__0&aid=newsconnect-global&p=web&tz=Europe%2FBerlin&lang=en-US&cs=UTF-8&res=1600x1200&cd=24&cookie=1&eid=c148ae1a-4f0b-44d3-96f5-697d0b32f315&dtm=1616510429359&vp=1600x1200&ds=1600x3230&vid=1&sid=a5ca5aa6-7872-4354-8669-92d05b958704&duid=40b955c4-c195-4a19-8ec2-cf4fcfa12b0b&fp=99543720&cx=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
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.231.78.127 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-231-78-127.compute-1.amazonaws.com
Software
nginx /
Resource Hash
caa849b179befa2645a8e2c474d2e82a76777a3305315ece911013e8ee9a916c

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:29 GMT
Server
nginx
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
get
odb.outbrain.com/utils/
2 KB
1 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&idx=0&rand=38060&key=NANOWDGT01&widgetJSId=TR_1&va=true&et=true&format=html&pdobuid=-1&adblck=false&abwl=false&px=0&py=3211&vpd=2011&cw=1600&settings=true&recs=true&version=2000257&sig=W74alh00&apv=false&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&dpr=1&secured=true&cnsntv2=CPDd0E3PDd0E3AGABCENBSCgAAAAAELAABpYAAAN1gDAAgAEdAQcBCADAgH2AbqAOEgAgCOFAAgBHAN1GAAgBHAN1HQAQBHEAAIAjiQAEARxSACACAAA.YAAAAAAAAAAA&cmpStat=1&ccpaStat=0&wdr-natlaz=true
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.14.132 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
f982b5be206528edd230a3f2a16fc32a5abb575969e6671c4ead2f17a0252dba

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:29 GMT
via
1.1 varnish, 1.1 varnish
traffic-path
CHIDC2, MDW, FRA, Europe2
x-timer
S1616510430.549888,VS0,VE127
accept-ranges
bytes
vary
Accept-Encoding, User-Agent
x-cache
MISS, MISS
content-type
text/javascript; charset=UTF-8
backend-ip
157.52.75.45
expires
Thu, 01 Jan 1970 00:00:00 GMT
x-cache-hits
0, 0
x-traceid
ff7daa145ddc37dfac9ecec75debd7c
content-encoding
gzip
content-length
834
x-served-by
cache-mdw17345-MDW, cache-fra19136-FRA
l
mcdp-chidc2.outbrain.com/
2 B
292 B
Fetch
General
Full URL
https://mcdp-chidc2.outbrain.com/l?token=84dfa98d19aa93cb248a7dfeab3a4489_659_1616510429616&tm=524&eT=6&wRV=2000257&pVis=0&lsd=-1&eIdx=&cnsntV2=CPDd0E3PDd0E3AGABCENBSCgAAAAAELAABpYAAAN1gDAAgAEdAQcBCADAgH2AbqAOEgAgCOFAAgBHAN1GAAgBHAN1HQAQBHEAAIAjiQAEARxSACACAAA.YAAAAAAAAAAA&cheq=0&ab=0&wl=0
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.74.236.191 , United States, ASN22075 (AS-OUTBRAIN, US),
Reverse DNS
chi.outbrain.com
Software
/
Resource Hash
2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

access-control-allow-origin
*
Date
Tue, 23 Mar 2021 14:40:30 GMT
content-encoding
gzip
X-TraceId
2c156c57cb24af5b2e5a272cd18d6ef1
Content-Type
text/plain; charset=UTF-8
Content-Length
28
access-control-expose-headers
content-range
data
api.cxense.com/public/widget/
24 KB
8 KB
Script
General
Full URL
https://api.cxense.com/public/widget/data?json=%7B%22context%22%3A%7B%22referrer%22%3A%22%22%2C%22categories%22%3A%7B%22subscriber%22%3A%22nonsubscriber%22%2C%22edition%22%3A%22naus%22%2C%22pwcampaign%22%3A%2210%22%2C%22bucket%22%3A%222%22%2C%22testgroup%22%3A%2233%22%7D%2C%22parameters%22%3A%5B%7B%22key%22%3A%22subscriber%22%2C%22value%22%3A%22nonsubscriber%22%7D%2C%7B%22key%22%3A%22edition%22%2C%22value%22%3A%22naus%22%7D%2C%7B%22key%22%3A%22pwcampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22bucket%22%2C%22value%22%3A%222%22%7D%2C%7B%22key%22%3A%22ver%22%2C%22value%22%3A%222.40%22%7D%2C%7B%22key%22%3A%22testGroup%22%2C%22value%22%3A%2233%22%7D%2C%7B%22key%22%3A%22env%22%2C%22value%22%3A%22prod%22%7D%2C%7B%22key%22%3A%22topDomain%22%2C%22value%22%3A%22wsj.com%22%7D%2C%7B%22key%22%3A%22pwTag%22%2C%22value%22%3A%22default%22%7D%2C%7B%22key%22%3A%22pwPlacement%22%2C%22value%22%3A%22cx-snippetad%22%7D%2C%7B%22key%22%3A%22pwCampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22pwType%22%2C%22value%22%3A%22personalized%22%7D%2C%7B%22key%22%3A%22retina%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22type%22%2C%22value%22%3A%22Technology%22%7D%2C%7B%22key%22%3A%22template%22%2C%22value%22%3A%22preview%22%7D%2C%7B%22key%22%3A%22access%22%2C%22value%22%3A%22paid%22%7D%2C%7B%22key%22%3A%22section%22%2C%22value%22%3A%22Tech%22%7D%2C%7B%22key%22%3A%22isSubscriber%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22ab_bucket%22%2C%22value%22%3A%2287%22%7D%2C%7B%22key%22%3A%22pageContentTypeDetai%22%2C%22value%22%3A%22article%22%7D%2C%7B%22key%22%3A%22pageSiteProduct%22%2C%22value%22%3A%22WSJ%22%7D%2C%7B%22key%22%3A%22testgroup%22%2C%22value%22%3A%2233%22%7D%5D%2C%22autoRefresh%22%3Afalse%2C%22url%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%7D%2C%22widgetId%22%3A%222de24eadb5f96a9436a375f0d2087dac83093d90%22%2C%22user%22%3A%7B%22ids%22%3A%7B%22usi%22%3A%22kmm4kkxnaic4weu6%22%7D%7D%2C%22prnd%22%3A%22kmm4kjzbrql6u1vp%22%7D&media=javascript&sid=9222318613852486900&widgetId=2de24eadb5f96a9436a375f0d2087dac83093d90&resizeToContentSize=true&useSecureUrls=true&usi=kmm4kkxnaic4weu6&rnd=320467327&prnd=kmm4kjzbrql6u1vp&tzo=-60&callback=cXJsonpCBkmm4kmd0mwm2ch5w
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.120 Schiphol, Netherlands, ASN54825 (PACKET, US),
Reverse DNS
Software
Jetty(9.4.28.v20200408) /
Resource Hash
542d79c45c3435920c556acd9acab886a0c7a242b34d00cc2f0c7b3b93b9c4d6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
Jetty(9.4.28.v20200408)
strict-transport-security
max-age=31536000
p3p
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
cache-control
no-store, no-cache, must-revalidate
content-type
text/javascript;charset=utf-8
content-length
7027
expires
Mon, 26 Jul 1997 05:00:00 GMT
data
api.cxense.com/public/widget/
24 KB
8 KB
Script
General
Full URL
https://api.cxense.com/public/widget/data?json=%7B%22context%22%3A%7B%22referrer%22%3A%22%22%2C%22categories%22%3A%7B%22subscriber%22%3A%22nonsubscriber%22%2C%22edition%22%3A%22naus%22%2C%22pwcampaign%22%3A%2210%22%2C%22bucket%22%3A%222%22%2C%22testgroup%22%3A%2233%22%7D%2C%22parameters%22%3A%5B%7B%22key%22%3A%22subscriber%22%2C%22value%22%3A%22nonsubscriber%22%7D%2C%7B%22key%22%3A%22edition%22%2C%22value%22%3A%22naus%22%7D%2C%7B%22key%22%3A%22pwcampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22bucket%22%2C%22value%22%3A%222%22%7D%2C%7B%22key%22%3A%22ver%22%2C%22value%22%3A%222.40%22%7D%2C%7B%22key%22%3A%22testGroup%22%2C%22value%22%3A%2233%22%7D%2C%7B%22key%22%3A%22env%22%2C%22value%22%3A%22prod%22%7D%2C%7B%22key%22%3A%22topDomain%22%2C%22value%22%3A%22wsj.com%22%7D%2C%7B%22key%22%3A%22pwTag%22%2C%22value%22%3A%22default%22%7D%2C%7B%22key%22%3A%22pwPlacement%22%2C%22value%22%3A%22cx-snippetad%22%7D%2C%7B%22key%22%3A%22pwCampaign%22%2C%22value%22%3A%2210%22%7D%2C%7B%22key%22%3A%22pwType%22%2C%22value%22%3A%22personalized%22%7D%2C%7B%22key%22%3A%22retina%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22type%22%2C%22value%22%3A%22Technology%22%7D%2C%7B%22key%22%3A%22template%22%2C%22value%22%3A%22preview%22%7D%2C%7B%22key%22%3A%22access%22%2C%22value%22%3A%22paid%22%7D%2C%7B%22key%22%3A%22section%22%2C%22value%22%3A%22Tech%22%7D%2C%7B%22key%22%3A%22isSubscriber%22%2C%22value%22%3A%22n%22%7D%2C%7B%22key%22%3A%22ab_bucket%22%2C%22value%22%3A%2287%22%7D%2C%7B%22key%22%3A%22pageContentTypeDetai%22%2C%22value%22%3A%22article%22%7D%2C%7B%22key%22%3A%22pageSiteProduct%22%2C%22value%22%3A%22WSJ%22%7D%2C%7B%22key%22%3A%22testgroup%22%2C%22value%22%3A%2233%22%7D%5D%2C%22autoRefresh%22%3Afalse%2C%22url%22%3A%22https%3A%2F%2Fwww.wsj.com%2Farticles%2Fmicrosoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793%22%7D%2C%22widgetId%22%3A%222de24eadb5f96a9436a375f0d2087dac83093d90%22%2C%22user%22%3A%7B%22ids%22%3A%7B%22usi%22%3A%22kmm4kkxnaic4weu6%22%7D%7D%2C%22prnd%22%3A%22kmm4kjzbrql6u1vp%22%7D&media=javascript&sid=9222318613852486900&widgetId=2de24eadb5f96a9436a375f0d2087dac83093d90&resizeToContentSize=true&useSecureUrls=true&usi=kmm4kkxnaic4weu6&rnd=458333440&prnd=kmm4kjzbrql6u1vp&tzo=-60&callback=cXJsonpCBkmm4kmd47jlm5xe7
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
147.75.85.120 Schiphol, Netherlands, ASN54825 (PACKET, US),
Reverse DNS
Software
Jetty(9.4.28.v20200408) /
Resource Hash
b4d105d22e437316e75206cf2ae96c7db093ae5632be308fc92911d27adea353
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
Jetty(9.4.28.v20200408)
strict-transport-security
max-age=31536000
p3p
policyref="http://www.cxense.com/w3c/p3p.xml", CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
cache-control
no-store, no-cache, must-revalidate
content-type
text/javascript;charset=utf-8
content-length
7026
expires
Mon, 26 Jul 1997 05:00:00 GMT
a301acef311b1fcef70792071828bcbc883204f8.png
content.cxpublic.com/creatives/
16 KB
16 KB
Image
General
Full URL
https://content.cxpublic.com/creatives/a301acef311b1fcef70792071828bcbc883204f8.png
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
92.123.148.223 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9fce096694d0ad58eca8d96bf239009fd1d1b6270b19072b503523073c921c84

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:30 GMT
Last-Modified
Thu, 14 Feb 2019 05:49:20 GMT
Server
AmazonS3
x-amz-request-id
ED78BCA87E2B87A6
ETag
"56a9f0ba211592d36c8e2d64d4518adf"
Content-Type
image/png
Cache-Control
public, max-age=31536000
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
16023
x-amz-id-2
A9qukFzc3aqDNeh+gnDcLYt1qRV/sff2Twce0etqdlN+Ix8dZxAV7upDOXgIkIf3WUle5L8tnaw=
Expires
Wed, 23 Mar 2022 14:40:30 GMT
frame.html
dntcl.qualaroo.com/ Frame 1914
323 B
666 B
Document
General
Full URL
https://dntcl.qualaroo.com/frame.html
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a00:f48:2000:1023::3 , Germany, ASN47447 (TTM, DE),
Reverse DNS
Software
BunnyCDN-DE1-481 /
Resource Hash
2e8900ba4a5768754de4fc21bcdde72bdcafa25c6c766a7f3bc44bf6c21fc412

Request headers

:method
GET
:authority
dntcl.qualaroo.com
:scheme
https
:path
/frame.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793

Response headers

date
Tue, 23 Mar 2021 14:40:30 GMT
content-type
text/html
vary
Accept-Encoding
server
BunnyCDN-DE1-481
cdn-pullzone
99568
cdn-uid
50c043fb-dcd1-4574-9faf-b60384f66f78
cdn-requestcountrycode
DE
cdn-edgestorageid
481
cdn-storageserver
DE-51
cache-control
public, max-age=604800
last-modified
Fri, 06 Dec 2019 12:46:59 GMT
cdn-cachedat
2021-03-20 21:44:37
cdn-requestpullsuccess
True
cdn-requestpullcode
206
cdn-requestid
38b92529f548b7cc4365ac6f4013b2ba
cdn-cache
HIT
content-encoding
gzip
nr-spa-1208.min.js
js-agent.newrelic.com/
42 KB
16 KB
Script
General
Full URL
https://js-agent.newrelic.com/nr-spa-1208.min.js
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.110 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
13e8b4f6220702a10a7566fb389055fedd388a364975146c8d2780c1d2fdc0d0

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-amz-version-id
Vh.geaSzxk269x8Ss.5iG8XR8B7_1taB
content-encoding
gzip
etag
"d9d4f5c3991c0454eca3e6b2ddfe31d9"
x-amz-request-id
V516W4VWYA9T9AMJ
x-cache
HIT
content-length
15815
x-amz-id-2
2hdpf34PbvrBdk5tV7KN6HyQxG5WGwsR8SKgCVfnk9qEIO/NvcZm76iSn6G/BeTtczsOhMfn0rE=
x-served-by
cache-hhn4033-HHN
last-modified
Wed, 10 Mar 2021 16:24:31 GMT
server
AmazonS3
x-timer
S1616510431.676793,VS0,VE0
date
Tue, 23 Mar 2021 14:40:30 GMT
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish
cache-control
public, max-age=7200, stale-if-error=604800
accept-ranges
bytes
x-cache-hits
7678
negotiate
wsjstream.wsj.net/bg2/signalr/
303 B
573 B
XHR
General
Full URL
https://wsjstream.wsj.net/bg2/signalr/negotiate?clientProtocol=2.1&connectionData=%5B%7B%22name%22%3A%22mainhub%22%7D%5D&_=1616510430666
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.236.128.245 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
3f2dc26ce0274016eee4285d17e7c908f1159d132076e25354790a1bcd5f0511
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
content-type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:30 GMT
x-content-type-options
nosniff
server
Microsoft-IIS/10.0
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.wsj.com
cache-control
no-cache
access-control-allow-credentials
true
expires
-1
optout_check
beacon.krxd.net/
81 B
239 B
Script
General
Full URL
https://beacon.krxd.net/optout_check?callback=Krux.ns.dowjones.kxjsonp_optOutCheck
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.77.62.253 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-54-77-62-253.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
ed561372c2a4625f839c5477f58731f39b1bd083d72bebc79121eaadb6afa60a

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:30 GMT
cache-control
private, max-age=0, s-max-age=0
x-request-time
D=60 t=1616510430
x-served-by
beacon-n021-dub-prod.krxd.net
content-type
text/javascript
cd2b77ba49
bam-cell.nr-data.net/1/
57 B
647 B
Script
General
Full URL
https://bam-cell.nr-data.net/1/cd2b77ba49?a=906054257&v=1208.49599aa&to=ZwEAbRQCWEVVVBYPVl5LJ0EWEVNFR10RSX51ME0WBxFCX1dbBxUWCgUQTQ8AWlN9Uw%3D%3D&rst=4321&ck=1&ref=https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793&ap=128.463536&be=647&fe=4248&dc=1205&tt=7661a01ef47b80b0&af=err,xhr,stn,ins,spa&perf=%7B%22timing%22:%7B%22of%22:1616510426416,%22n%22:0,%22f%22:0,%22dn%22:1,%22dne%22:2,%22c%22:2,%22s%22:10,%22ce%22:23,%22rq%22:23,%22rp%22:533,%22rpe%22:709,%22dl%22:537,%22di%22:1201,%22ds%22:1205,%22de%22:1207,%22dc%22:4241,%22l%22:4248,%22le%22:4294%7D,%22navigation%22:%7B%7D%7D&fp=732&fcp=732&ja=%7B%22browserWidth%22:1600,%22moat-loaded%22:1004,%22apstag-loaded%22:1124,%22gpt-tagLoaded%22:1246,%22apstag-firstBid%22:2122%7D&jsonp=NREUM.setToken
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN23467 (NEWRELIC-AS-1, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5e864c2e3f674c60970513411eaeeeafd2d615d842e65ec01d09ccfcb4a7b38d

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 23 Mar 2021 14:40:30 GMT
Content-Encoding
gzip
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
Content-Type
text/javascript;charset=ISO-8859-1
Transfer-Encoding
chunked
Connection
keep-alive
CF-Ray
63486a5078374bdd-AMS
cf-request-id
090120c64900004bdde42cf000000001
Expires
Thu, 01 Jan 1970 00:00:00 GMT
start
wsjstream.wsj.net/bg2/signalr/
25 B
294 B
XHR
General
Full URL
https://wsjstream.wsj.net/bg2/signalr/start?transport=webSockets&clientProtocol=2.1&connectionToken=73cb990b-ef22-451d-93a3-f4afc6b6a086%3A&connectionData=%5B%7B%22name%22%3A%22mainhub%22%7D%5D&_=1616510431287
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.236.128.245 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
c50a0366bab0d95bd0dfbbf67ed889b5fd383ee7464a77660088c32e4ef91c20
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
content-type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

pragma
no-cache
date
Tue, 23 Mar 2021 14:40:31 GMT
x-content-type-options
nosniff
server
Microsoft-IIS/10.0
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.wsj.com
cache-control
no-cache
access-control-allow-credentials
true
expires
-1
cd2b77ba49
bam-cell.nr-data.net/events/1/
24 B
487 B
XHR
General
Full URL
https://bam-cell.nr-data.net/events/1/cd2b77ba49?a=906054257&v=1208.49599aa&to=ZwEAbRQCWEVVVBYPVl5LJ0EWEVNFR10RSX51ME0WBxFCX1dbBxUWCgUQTQ8AWlN9Uw%3D%3D&rst=6339&ck=1&ref=https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN23467 (NEWRELIC-AS-1, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
content-type
text/plain

Response headers

Date
Tue, 23 Mar 2021 14:40:33 GMT
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.wsj.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
CF-Ray
63486a5ccb774bdd-AMS
Content-Length
24
cf-request-id
090120ce0100004bdd08b8f000000001
lookuplist
us.audience.newscgp.com/
119 B
481 B
XHR
General
Full URL
https://us.audience.newscgp.com/lookuplist?type=domain&site=wsj.com&value=40b955c4-c195-4a19-8ec2-cf4fcfa12b0b&&bust=16165104343820.1268928011389301&errors-in-body=1
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.226.159.16 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-159-16.dus51.r.cloudfront.net
Software
nginx /
Resource Hash
aebfd887d2559b45c70221487a839ac1e84ec04ccec046884573a12d9789b55d

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Tue, 23 Mar 2021 14:40:34 GMT
via
1.1 987c00b911316df568db602f83876a8e.cloudfront.net (CloudFront)
server
nginx
x-amz-cf-pop
DUS51-C1
x-cache
Miss from cloudfront
content-type
application/json
access-control-allow-origin
https://www.wsj.com
cache-control
no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
access-control-allow-credentials
true
content-length
119
x-amz-cf-id
H9RI9jkw4xArtOZ0FCQEW99ayRNTUhtTtPnEIzNRuIbTxD7rUxpjNw==
cd2b77ba49
bam-cell.nr-data.net/events/1/
24 B
487 B
XHR
General
Full URL
https://bam-cell.nr-data.net/events/1/cd2b77ba49?a=906054257&v=1208.49599aa&to=ZwEAbRQCWEVVVBYPVl5LJ0EWEVNFR10RSX51ME0WBxFCX1dbBxUWCgUQTQ8AWlN9Uw%3D%3D&rst=14330&ck=1&ref=https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Requested by
Host: www.wsj.com
URL: https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
162.247.243.147 , United States, ASN23467 (NEWRELIC-AS-1, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0c9cf152a0ad00d4f102c93c613c104914be5517ac8f8e0831727f8bfbe8b300

Request headers

Referer
https://www.wsj.com/articles/microsoft-probing-whether-leak-played-role-in-suspected-chinese-hack-11615575793
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
content-type
text/plain

Response headers

Date
Tue, 23 Mar 2021 14:40:40 GMT
CF-Cache-Status
DYNAMIC
Server
cloudflare
Expect-CT
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Vary
Accept-Encoding
Content-Type
image/gif
Access-Control-Allow-Origin
https://www.wsj.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
CF-Ray
63486a8ebfc34bdd-AMS
Content-Length
24
cf-request-id
090120ed3400004bdda9885000000001

Verdicts & Comments Add Verdict or Comment

239 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 object| 5 object| 6 object| 7 object| 8 object| 9 object| 10 object| 11 object| 12 object| 13 object| 14 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| __tcfapi function| djcmp object| utag_data boolean| supportsPreload function| loadCSS function| whenAvailable function| loadJs object| NREUM object| newrelic function| __nr_require object| observer object| _perfMarkAllowedList object| googletag object| pbjs function| djcmpCheck function| optimizelyWrapperWithoutGDPR object| _kiq object| scRec object| surveyStyles object| sessioncamConfiguration object| INITIAL_PROPS_SKIP object| ace function| moatYieldReady object| aceManifest object| apstag object| regeneratorRuntime object| _sp_ boolean| isMoatTimer boolean| moatReady object| moatQueue object| uacObservers object| adslots function| __buildAd object| INITIAL_PROPS_HEADER object| __articleUACQueue object| INITIAL_PROPS_ARTICLE_TOOLS object| INITIAL_PROPS_SHARETOOLS object| sessionCamRecorder function| SessionCamRecorder number| scInitTime0 function| sessionCamJQuery undefined| ct undefined| et undefined| hourElapsed undefined| msg undefined| pixelDomain undefined| isDomless undefined| documentReferrer undefined| isBeta undefined| viewHash undefined| pxSrc undefined| moat_px object| Moat#G26 object| MoatSuperV26 object| MoatNadoAllJsonpRequest_58232703 object| Moat#PML#26#1.2 boolean| Moat#EVA object| MoatDataJsonpRequest_58232703 object| moatPrebidApi function| readCookieValue object| prebidLogStorage function| isDebug function| debugMessage function| logMessage function| pbjs_log function| getMeta object| pb_keywords function| getPrebidPageConfigure number| PREBID_TIMEOUT_Initial_Load number| PREBID_TIMEOUT_Normal object| PAGE_LOAD_SETTING object| headertag string| PREBID_BidCode boolean| PREBID_UseBidCache string| prebidBrandSafetySegment string| prebidDomain function| pbjsChunk function| AppNexusPrebidAnalytics string| prebidDevice object| _pbjsGlobals boolean| apstagLOADED object| INITIAL_PROPS_WSJFOOTER boolean| videoLoaded undefined| videoScript undefined| videoCSS undefined| videoInit boolean| delayOptimizelyForVid string| ASSET_PATH object| webpackJsonp object| googleAdSlots string| pxSegmentIDs object| cxCandyObj object| cxdj object| cX function| initializeCxense object| cxenseOffers object| ggeac object| google_js_reporting_queue object| webpackJsonp$jQ111 object| _vidora_jsonp object| Conviva object| _comscore object| COMSCORE object| adobe function| Visitor number| s_objectID number| s_giq function| AppMeasurement function| $jQ111 function| cxCCE_callQueueExecute object| cxTest function| cx_callQueueExecute function| cx_pollActivity function| cx_pollActiveTime function| cx_pollFragmentMessage object| ReactDOM object| React function| setImmediate function| clearImmediate function| P undefined| cXJsonpCBkmm4kky8z68ahfg0 undefined| cXJsonpCBkmm4kkycm922mdup function| __buildAdForArticle object| uacQueue function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter undefined| google_measure_js_timing string| prebidSection object| KI boolean| utag_condload object| utag function| e boolean| __tealium_twc_switch object| CryptoJS number| google_srt function| googleCompanionsServicePresent function| googleGetCompanionAdSlots function| googleSetCompanionAdContents function| google_companion_error object| s_c_il number| s_c_in undefined| cXJsonpCBkmm4klfp62wdupe2 undefined| cXJsonpCBkmm4klfvn374gwha undefined| cXJsonpCBkmm4klg1ekbgcdas object| BlueGrass2 function| Nielsen_Event object| trac function| initializeCxenseCandy function| Krux object| ncg_data object| ns_ object| ns_p function| udm_ function| ns_order function| ns_onclick function| obApi object| _linkedin string| _linkedin_data_partner_id object| _ml string| hrefSelector undefined| cXJsonpCBkmm4kloe1qrp63f3 function| lintrk boolean| _already_called_lintrk object| nb object| GlobalSnowplowNamespace function| _ncg_snowplow object| Snowplow string| matchId object| OBR string| OB_releaseVer function| OBR$ object| OB_PROXY object| outbrain object| outbrain_rater function| NolTracker function| nol_t function| logger undefined| _rsCC undefined| _rsCG undefined| _rsDN undefined| v52v53_pvar undefined| v52v53_trac undefined| _rsEvent undefined| _rsLinkTrack undefined| _rsClick object| V60 object| NOLBUNDLE undefined| nQuery number| ntvLoadStart object| ntv object| prdom object| onFocusEvents function| ntvjQueryInit function| ntvExtends function| ntvAppendStylesheet function| ntvAppendScript function| ntvArticleTracker function| ntvGetElementViewability function| ntvViewableImpressionTracker object| PostRelease object| ntvToutAds boolean| onFocus undefined| cXJsonpCBkmm4kmd0mwm2ch5w undefined| cXJsonpCBkmm4kmd47jlm5xe7 function| cxActionSubscriberTopRhsTest function| cxRunHokTest54e function| cxRunHokTest75e function| cxUpdateSubscribeLinkWithPopupUrl function| cxHandleNonSubTopRhsHeaderClick function| cxHandlePopoutClick function| cxHandleAppDownloadCssInject function| cxHandleAppDownloadScriptInject function| cxHandleSubTileAppCtaButtonClick function| cxHandleDropdownDefaultCountries object| nonSubTopRhsHeaderCampaignData

39 Cookies

Domain/Path Name / Value
.newscgp.com/ Name: sp
Value: 1148b9d4-c748-412e-a366-ccf2a48bd07c
.demdex.net/ Name: demdex
Value: 13010086674621593890013812748369204575
www.wsj.com/ Name: ki_r
Value:
www.wsj.com/ Name: ki_t
Value: 1616510430659%3B1616510430659%3B1616510430659%3B1%3B1
www.wsj.com/ Name: outbrain_cid_fetch
Value: true
www.wsj.com/ Name: kxdowjones_cc
Value: %7B%22dt%22%3A%22kxcookie%22%2C%22settings%22%3A%7B%22dc%22%3A0%2C%22al%22%3A0%2C%22tg%22%3A0%2C%22cd%22%3A0%2C%22sh%22%3A0%2C%22re%22%3A0%7D%2C%22pr%22%3A%22gdpr%22%2C%22code%22%3A%22success%22%2C%22idt%22%3A%22device%22%2C%22idv%22%3A%22OBJAg0IQ%22%2C%22request_id%22%3A%2212c3UuPcSg7kL05JnHh3VW%22%2C%22timestamp%22%3A1616510429%7D
.wsj.com/ Name: hok_seg
Value: none
www.wsj.com/ Name: kxdowjones_iab_two_cs
Value: CPDd0E3PDd0E3AGABCENBSCgAAAAAELAABpYAAAN1gDAAgAEdAQcBCADAgH2AbqAOEgAgCOFAAgBHAN1GAAgBHAN1HQAQBHEAAIAjiQAEARxSACACAAA.YAAAAAAAAAAA
.wsj.com/ Name: AMCV_CB68E4BA55144CAA0A4C98A5%40AdobeOrg
Value: 1585540135%7CMCMID%7C12980351263266138210017032481283706495%7CMCAAMLH-1617115228%7C6%7CMCAAMB-1617115228%7C6G1ynYcLPuiQxYZrsz_pkqfLG9yMXBpb2zX5dvJdYQJzPXImdj0y%7CMCOPTOUT-1616517628s%7CNONE%7CMCSYNCSOP%7C411-18717%7CvVersion%7C4.4.0
.wsj.com/ Name: _ncg_id_
Value: 40b955c4-c195-4a19-8ec2-cf4fcfa12b0b
.wsj.com/ Name: _ncg_sp_id.5378
Value: 40b955c4-c195-4a19-8ec2-cf4fcfa12b0b.1616510429.1.1616510429.1616510429.a5ca5aa6-7872-4354-8669-92d05b958704
www.wsj.com/ Name: _sp_v1_csv
Value: null
.wsj.com/ Name: utag_main
Value: v_id:01785f87a4780048ecbf9451b4b400072006d06a00b08$_sn:1$_se:1$_ss:1$_st:1616512228283$ses_id:1616510428283%3Bexp-session$_pn:1%3Bexp-session$_prevpage:WSJ_Article_Tech_Microsoft%20Probing%20Whether%20Leak%20Played%20Role%20in%20Suspected%20Chinese%20Hack%3Bexp-1616514028296
.wsj.com/ Name: cX_P
Value: kmm4kkxnaic4weu6
.wsj.com/ Name: AMCVS_CB68E4BA55144CAA0A4C98A5%40AdobeOrg
Value: 1
www.wsj.com/ Name: sc.ASP.NET_SESSIONID
Value:
.wsj.com/ Name: consentUUID
Value: b1d90d4b-d364-4a30-9260-6ac021b7b149
www.wsj.com/ Name: _ncg_pv_
Value: 1
www.wsj.com/ Name: kxdowjones_visits
Value: 1
www.wsj.com/ Name: kxdowjones_iab_two_gdpr
Value: true
.wsj.com/ Name: cX_S
Value: kmm4kkxxcien2i5s
www.wsj.com/ Name: _sp_v1_ss
Value: 1:H4sIAAAAAAAAAItWqo5RKimOUbKKRmbkgRgGtbE6MUqpIGZeaU4OkF0CVlBdi1tCKRYAmuD4I1IAAAA%3D
www.wsj.com/ Name: _sp_v1_consent
Value: 1!0:-1:-1:-1:-1:-1
.wsj.com/ Name: _ncg_sp_ses.5378
Value: *
www.wsj.com/ Name: _sp_v1_uid
Value: 1:624:afb1e27b-ba82-4979-a638-9558b629938a
www.wsj.com/ Name: _sp_v1_opt
Value: 1:
www.wsj.com/ Name: _sp_v1_data
Value: 2:306234:1616510427:0:1:0:1:0:0:_:-1
.wsj.com/ Name: has_optimizely
Value: true
.wsj.com/ Name: usr_bkt
Value: 830nwKog3K
www.wsj.com/ Name: _ncg_dps_
Value: 1
.wsj.com/ Name: ccpaApplies
Value: false
www.wsj.com/ Name: sc.Status
Value: 2
www.wsj.com/ Name: _ncg_sch_
Value: %7B%22liveramp%22%3A%7B%22t%22%3A1%2C%22l%22%3Anull%7D%7D
.wsj.com/ Name: usr_prof_v2
Value: eyJpYyI6MH0%3D
www.wsj.com/ Name: _sp_v1_lt
Value: 1:
.wsj.com/ Name: ab_uuid
Value: c84740c6-b666-489b-971a-62552899e7ba
www.wsj.com/articles Name: ntvSession
Value: {}
.wsj.com/ Name: gdprApplies
Value: true
.wsj.com/ Name: wsjregion
Value: na%2Cus

5 Console Messages

Source Level URL
Text
console-api log URL: https://www.wsj.com/asset/ace/wrapperMessagingWithoutDetection.1.0.5.js(Line 1)
Message:
Messaging without detection successfully executed.
console-api log URL: https://asset.barrons.com/article/public/wsj_resp_article_16u_snippet.e71757e1e91e.js(Line 62)
Message:
no newrelic support
console-api error URL: https://asset.barrons.com/article/public/03c85c64-f03f-4789-9e88-00158f0ea41e.2cd1a18dae6c.js(Line 12)
Message:
Moment Timezone requires Moment.js >= 2.6.0. You are using Moment.js 2.5.0. See momentjs.com
console-api log URL: https://us.tags.newscgp.com/prod/ncg/ncg.js(Line 4)
Message:
ncg:first-view-aapi-ready
console-api log URL: https://us.tags.newscgp.com/prod/ncg/ncg.js(Line 4)
Message:
value is not defined

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

accounts.wsj.com
amplify.outbrain.com
api.cxense.com
api.rlcdn.com
as-sec.casalemedia.com
asset.barrons.com
asset.wsj.net
assets.vidora.com
bam-cell.nr-data.net
beacon.krxd.net
c.amazon-adsystem.com
cdn-gl.imrworldwide.com
cdn.cxense.com
cdn.krxd.net
cdn.privacy-mgmt.com
cl.qualaroo.com
cm.everesttech.net
comcluster.cxense.com
consumer.krxd.net
content.cxpublic.com
d2oh4tlt9mrke9.cloudfront.net
dntcl.qualaroo.com
dowjones.demdex.net
dpm.demdex.net
geo.moatads.com
ib.adnxs.com
idsync.rlcdn.com
images.wsj.net
jadserve.postrelease.com
js-agent.newrelic.com
log.outbrainimg.com
m.wsj.net
match.adsrvr.org
mb.moatads.com
mcdp-chidc2.outbrain.com
mid.rkdms.com
ml314.com
odb.outbrain.com
pagead2.googlesyndication.com
pixel.videohub.tv
px.ads.linkedin.com
px.moatads.com
s.ntv.io
s3.amazonaws.com
sb.scorecardresearch.com
scomcluster.cxense.com
secure-us.imrworldwide.com
securepubads.g.doubleclick.net
segment-data.zqtk.net
snap.licdn.com
sts3.wsj.net
tags.barrons.com
tags.decider.com
tags.knewz.com
tags.mansionglobal.com
tags.marketwatch.com
tags.nypost.com
tags.pagesix.com
tags.penews.com
tags.realtor.com
tags.tiqcdn.com
tcheck.outbrainimg.com
tr.outbrain.com
us.audience.newscgp.com
us.pixel.newscgp.com
us.tags.newscgp.com
video-api.wsj.com
widget-pixels.outbrain.com
widgets.outbrain.com
ws.sessioncam.com
wsjstream.wsj.net
www.linkedin.com
www.ncaudienceexchange.com
www.wsj.com
z.moatads.com
104.108.145.205
13.226.156.142
13.226.158.204
13.226.159.16
13.226.159.31
13.32.21.123
142.250.185.162
147.75.85.120
151.101.114.110
151.101.114.133
151.101.14.132
162.247.243.147
178.63.12.147
18.200.157.96
184.30.24.241
184.30.25.161
184.30.25.59
184.30.25.80
185.33.221.11
185.59.220.197
199.127.207.184
2.17.181.157
2.19.34.195
23.79.129.43
2600:9000:206f:a200:1a:635e:8fc0:93a1
2600:9000:206f:f000:f:5016:900:93a1
2600:9000:211e:1800:4:77d:a0c0:93a1
2600:9000:211e:5000:16:f5f7:a380:93a1
2600:9000:2182:5000:e:b675:f600:93a1
2600:9000:2182:5e00:2:42d9:3100:93a1
2600:9000:2182:6000:3:4b0:de80:93a1
2620:119:50e1:101::6cae:b25
2620:1ec:21::14
2a00:1450:4001:800::2002
2a00:f48:2000:1023::3
2a02:26f0:7100:2a0::268b
2a02:26f0:7100:481::25ea
3.231.78.127
34.120.133.55
34.246.39.225
34.250.6.25
34.253.148.162
35.244.174.68
52.18.215.87
52.214.158.139
52.216.169.213
52.22.122.247
52.51.224.103
52.9.156.34
54.162.154.79
54.236.128.245
54.77.62.253
64.74.236.191
65.9.58.112
65.9.58.22
65.9.58.44
65.9.58.66
70.42.32.95
92.123.148.223
99.81.11.244
99.86.3.71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