URL: http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%...
Submission: On March 01 via manual from ES

Summary

This website contacted 5 IPs in 1 countries across 6 domains to perform 7 HTTP transactions. The main IP is 104.18.51.178, located in San Francisco, United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is leakedfiles.org.
This is the only time leakedfiles.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 104.18.50.178 13335 (CLOUDFLAR...)
1 4 104.18.51.178 13335 (CLOUDFLAR...)
1 104.19.194.102 13335 (CLOUDFLAR...)
1 2 216.58.214.46 15169 (GOOGLE)
1 1 74.125.133.155 15169 (GOOGLE)
1 1 216.58.206.4 15169 (GOOGLE)
1 216.58.214.35 15169 (GOOGLE)
7 5
Apex Domain
Subdomains
Transfer
5 leakedfiles.org
leakedfiles.org
21 KB
2 google-analytics.com
www.google-analytics.com
15 KB
1 google.de
www.google.de
453 B
1 google.com
www.google.com
535 B
1 doubleclick.net
stats.g.doubleclick.net
427 B
1 cloudflare.com
ajax.cloudflare.com
32 KB
7 6
Domain Requested by
5 leakedfiles.org 1 redirects leakedfiles.org
2 www.google-analytics.com 1 redirects leakedfiles.org
1 www.google.de leakedfiles.org
1 www.google.com 1 redirects
1 stats.g.doubleclick.net 1 redirects
1 ajax.cloudflare.com leakedfiles.org
7 6

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Frame ID: (ABFEE233A70871567062EC58AC27B6E7)
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d... Page URL
  2. http://leakedfiles.org/cdn-cgi/l/chk_jschl?jschl_vc=85ca89c89a3b305b9245be834b6f8437&pass=151991066... HTTP 302
    http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|(analytics))\.js/i
  • env /^gaGlobal$/i

Page Statistics

7
Requests

0 %
HTTPS

0 %
IPv6

6
Domains

6
Subdomains

5
IPs

1
Countries

67 kB
Transfer

177 kB
Size

5
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners Page URL
  2. http://leakedfiles.org/cdn-cgi/l/chk_jschl?jschl_vc=85ca89c89a3b305b9245be834b6f8437&pass=1519910665.631-5C7SfphrDB&jschl_answer=540628 HTTP 302
    http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 3
  • http://www.google-analytics.com/analytics.js HTTP 307
  • https://www.google-analytics.com/analytics.js
Request Chain 5
  • http://www.google-analytics.com/r/collect?v=1&_v=j66&a=1321712710&t=pageview&_s=1&dl=http%3A%2F%2Fleakedfiles.org%2FArchive%2FMalware%2FBotnet%2520Files%2FQboT%2520Sources%2F%255b%25252A%2520Scanners%2520%25252A%255d%2FPython%2FLove%2520ares%2520bot%2520scanners&ul=en-us&de=windows-1252&dt=404%20Not%20Found&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEAB~&jid=1053961340&gjid=212530895&cid=1162017130.1519910666&tid=UA-97401965-1&_gid=850239394.1519910666&_r=1&z=1072036975 HTTP 307
  • https://www.google-analytics.com/r/collect?v=1&_v=j66&a=1321712710&t=pageview&_s=1&dl=http%3A%2F%2Fleakedfiles.org%2FArchive%2FMalware%2FBotnet%2520Files%2FQboT%2520Sources%2F%255b%25252A%2520Scanners%2520%25252A%255d%2FPython%2FLove%2520ares%2520bot%2520scanners&ul=en-us&de=windows-1252&dt=404%20Not%20Found&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAEAB~&jid=1053961340&gjid=212530895&cid=1162017130.1519910666&tid=UA-97401965-1&_gid=850239394.1519910666&_r=1&z=1072036975 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-97401965-1&cid=1162017130.1519910666&jid=1053961340&_gid=850239394.1519910666&gjid=212530895&_v=j66&z=1072036975 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-97401965-1&cid=1162017130.1519910666&jid=1053961340&_v=j66&z=1072036975 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-97401965-1&cid=1162017130.1519910666&jid=1053961340&_v=j66&z=1072036975&slf_rd=1&random=2759855432

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set Love%20ares%20bot%20scanners
leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/
4 KB
5 KB
Document
General
Full URL
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Protocol
HTTP/1.1
Server
104.18.50.178 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ad2ec5c7a0f493c97c92ad10743c6331b6e97d04cb9eea150217c83f50130b29
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Connection
keep-alive
Accept-Encoding
gzip, deflate
Host
leakedfiles.org
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Thu, 01 Mar 2018 13:24:21 GMT
X-Content-Type-Options
nosniff
Server
cloudflare
X-Frame-Options
SAMEORIGIN
Content-Type
text/html; charset=UTF-8
Set-Cookie
__cfduid=dd182f8c314b0d0600b925402d38ed3601519910661; expires=Fri, 01-Mar-19 13:24:21 GMT; path=/; domain=.leakedfiles.org; HttpOnly
Cache-Control
no-cache
Transfer-Encoding
chunked
Connection
close
CF-RAY
3f4bf18322df26c0-FRA
Primary Request Love%20ares%20bot%20scanners
leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/
Redirect Chain
  • http://leakedfiles.org/cdn-cgi/l/chk_jschl?jschl_vc=85ca89c89a3b305b9245be834b6f8437&pass=1519910665.631-5C7SfphrDB&jschl_answer=540628
  • http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
738 B
816 B
Document
General
Full URL
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Protocol
HTTP/1.1
Server
104.18.51.178 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ee0991f3d1d1998589293ad47e3e6d37729f8ccf7f43e6ddfaa0f71f07f553ff
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
leakedfiles.org
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Cookie
__cfduid=d8d62e0cdad5e6a75d0eb12022e8642c51519910665; cf_clearance=ba84cf2e47a3c848209d9843caa17a55c92b287f-1519910665-300
Connection
keep-alive
Cache-Control
no-cache
Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Thu, 01 Mar 2018 13:24:25 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
cloudflare
Transfer-Encoding
chunked
Content-Type
text/html; charset=iso-8859-1
Connection
keep-alive
CF-RAY
3f4bf19c60a496e8-FRA

Redirect headers

Date
Thu, 01 Mar 2018 13:24:25 GMT
Server
cloudflare-nginx
X-Frame-Options
SAMEORIGIN
Content-Type
text/html
Location
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Set-Cookie
__cfduid=d8d62e0cdad5e6a75d0eb12022e8642c51519910665; expires=Fri, 01-Mar-19 13:24:25 GMT; path=/; domain=.leakedfiles.org; HttpOnly cf_clearance=ba84cf2e47a3c848209d9843caa17a55c92b287f-1519910665-300; path=/; expires=Thu, 01-Mar-18 14:29:25 GMT; domain=.leakedfiles.org; HttpOnly
Connection
keep-alive
CF-RAY
3f4bf19c509996e8-FRA
Content-Length
165
ukoROejdmWrEvP9aSgeKz3kiREk.js
leakedfiles.org/cdn-cgi/apps/head/
6 KB
3 KB
Script
General
Full URL
http://leakedfiles.org/cdn-cgi/apps/head/ukoROejdmWrEvP9aSgeKz3kiREk.js
Requested by
Host: leakedfiles.org
URL: http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Protocol
HTTP/1.1
Server
104.18.51.178 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
70d1e4c5a0264d3778d6ee3b5e97f2212e4d2ae88b67939d9ef0607922841fac
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
leakedfiles.org
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Cookie
__cfduid=d8d62e0cdad5e6a75d0eb12022e8642c51519910665; cf_clearance=ba84cf2e47a3c848209d9843caa17a55c92b287f-1519910665-300
Connection
keep-alive
Cache-Control
no-cache
Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Thu, 01 Mar 2018 13:24:25 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
CF-Cache-Status
HIT
x-amz-request-id
659D0594F9C1574B
CF-RAY
3f4bf19cb0c196e8-FRA
Connection
keep-alive
Content-Length
2183
x-amz-id-2
75H395GKVaMzVPPKx8aqnjDZvynRNutfTob79B+h3q5KUOrkCWhRIkjlty9nXu0URRcBbce3Ys8=
Last-Modified
Sat, 04 Nov 2017 12:42:47 GMT
Server
cloudflare
ETag
"7cde6a1c76d4ea2bcf71489066fba3ab"
Vary
Accept-Encoding
x-amz-version-id
gjHMSYIttskSHh2AdJpQ.qxxG81fOyHS
Cache-Control
public, max-age=31536000
Content-Type
application/javascript; charset=utf-8
Expires
Fri, 01 Mar 2019 13:24:25 GMT
rocket.min.js
ajax.cloudflare.com/cdn-cgi/scripts/935cb224/cloudflare-static/
102 KB
32 KB
Script
General
Full URL
https://ajax.cloudflare.com/cdn-cgi/scripts/935cb224/cloudflare-static/rocket.min.js
Requested by
Host: leakedfiles.org
URL: http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Protocol
SPDY
Server
104.19.194.102 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare-nginx /
Resource Hash
8a4a166fe00cbeae541569d1bcabe1bcbe25b55744d2004f461432c09a5921a1
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains
X-Frame-Options SAMEORIGIN

Request headers

Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Thu, 01 Mar 2018 13:24:25 GMT
content-encoding
gzip
last-modified
Wed, 28 Feb 2018 10:54:47 GMT
server
cloudflare-nginx
etag
W/"5a968a77-1985d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800, public
strict-transport-security
max-age=15780000; includeSubDomains
cf-ray
3f4bf19ceb702690-FRA
expires
Sat, 03 Mar 2018 13:24:25 GMT
analytics.js
www.google-analytics.com/
Redirect Chain
  • http://www.google-analytics.com/analytics.js
  • https://www.google-analytics.com/analytics.js
35 KB
14 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: leakedfiles.org
URL: http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Protocol
SPDY
Server
216.58.214.46 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s09-in-f14.1e100.net
Software
Golfe2 /
Resource Hash
f8ef655ef916e39713ede9c6db56d7ca5618bd82cf5ac991dcd013f05e0fdfc7
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 13 Nov 2017 20:19:12 GMT
server
Golfe2
age
1823
date
Thu, 01 Mar 2018 12:54:02 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303431; quic=51303339; quic=51303338; quic=51303337; quic=51303335,quic=":443"; ma=2592000; v="41,39,38,37,35"
content-length
14597
expires
Thu, 01 Mar 2018 14:54:02 GMT

Redirect headers

Location
https://www.google-analytics.com/analytics.js
Non-Authoritative-Reason
HSTS
TgLrkQ0kvdCb8hwjK3VFs5XW348.js
leakedfiles.org/cdn-cgi/apps/body/
28 KB
11 KB
Script
General
Full URL
http://leakedfiles.org/cdn-cgi/apps/body/TgLrkQ0kvdCb8hwjK3VFs5XW348.js
Requested by
Host: leakedfiles.org
URL: http://leakedfiles.org/cdn-cgi/apps/head/ukoROejdmWrEvP9aSgeKz3kiREk.js
Protocol
HTTP/1.1
Server
104.18.51.178 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ad7889897f24304e713548ac48c0f1e15ffa779763d0f172cf407a3bcc3020b8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
leakedfiles.org
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
*/*
Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Cookie
__cfduid=d8d62e0cdad5e6a75d0eb12022e8642c51519910665; cf_clearance=ba84cf2e47a3c848209d9843caa17a55c92b287f-1519910665-300
Connection
keep-alive
Cache-Control
no-cache
Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Thu, 01 Mar 2018 13:24:25 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
CF-Cache-Status
HIT
x-amz-request-id
5269D46B4B8E88E0
CF-RAY
3f4bf19cd0cf96e8-FRA
Connection
keep-alive
Content-Length
11039
x-amz-id-2
UUDDt9QJcTnYDbqaYw6M4Q5bZbbxYy2kuzfovMEGNPzTMKTc2pQnLKiSPdeVNaG4DYThrZs4W7o=
Last-Modified
Sat, 04 Nov 2017 12:42:46 GMT
Server
cloudflare
ETag
"716436241103566faf3be8b9405489b8"
Vary
Accept-Encoding
x-amz-version-id
HtNQx6sgkZOxyPIzReCQ2C5fn21O4zIM
Cache-Control
public, max-age=31536000
Content-Type
application/javascript; charset=utf-8
Expires
Fri, 01 Mar 2019 13:24:25 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • http://www.google-analytics.com/r/collect?v=1&_v=j66&a=1321712710&t=pageview&_s=1&dl=http%3A%2F%2Fleakedfiles.org%2FArchive%2FMalware%2FBotnet%2520Files%2FQboT%2520Sources%2F%255b%25252A%2520Scanne...
  • https://www.google-analytics.com/r/collect?v=1&_v=j66&a=1321712710&t=pageview&_s=1&dl=http%3A%2F%2Fleakedfiles.org%2FArchive%2FMalware%2FBotnet%2520Files%2FQboT%2520Sources%2F%255b%25252A%2520Scann...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-97401965-1&cid=1162017130.1519910666&jid=1053961340&_gid=850239394.1519910666&gjid=212530895&_v=j66&z=1072036975
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-97401965-1&cid=1162017130.1519910666&jid=1053961340&_v=j66&z=1072036975
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-97401965-1&cid=1162017130.1519910666&jid=1053961340&_v=j66&z=1072036975&slf_rd=1&random=2759855432
42 B
453 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-97401965-1&cid=1162017130.1519910666&jid=1053961340&_v=j66&z=1072036975&slf_rd=1&random=2759855432
Requested by
Host: leakedfiles.org
URL: http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
Protocol
SPDY
Server
216.58.214.35 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s09-in-f35.1e100.net
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://leakedfiles.org/Archive/Malware/Botnet%20Files/QboT%20Sources/%5b%252A%20Scanners%20%252A%5d/Python/Love%20ares%20bot%20scanners
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 01 Mar 2018 13:24:25 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
hq=":443"; ma=2592000; quic=51303431; quic=51303339; quic=51303338; quic=51303337; quic=51303335,quic=":443"; ma=2592000; v="41,39,38,37,35"
content-length
42
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Thu, 01 Mar 2018 13:24:25 GMT
x-content-type-options
nosniff
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
content-type
text/html; charset=UTF-8
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-97401965-1&cid=1162017130.1519910666&jid=1053961340&_v=j66&z=1072036975&slf_rd=1&random=2759855432
cache-control
no-cache, must-revalidate
timing-allow-origin
*
alt-svc
hq=":443"; ma=2592000; quic=51303431; quic=51303339; quic=51303338; quic=51303337; quic=51303335,quic=":443"; ma=2592000; v="41,39,38,37,35"
content-length
0
x-xss-protection
1; mode=block
expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| Eager object| CloudflareApps string| GoogleAnalyticsObject function| ga object| __cfRocketOptions object| gaplugins object| gaGlobal object| gaData object| __cfRl

5 Cookies

Domain/Path Name / Value
.leakedfiles.org/ Name: _gat
Value: 1
.leakedfiles.org/ Name: _gid
Value: GA1.2.850239394.1519910666
.leakedfiles.org/ Name: _ga
Value: GA1.2.1162017130.1519910666
.leakedfiles.org/ Name: cf_clearance
Value: ba84cf2e47a3c848209d9843caa17a55c92b287f-1519910665-300
.leakedfiles.org/ Name: __cfduid
Value: d8d62e0cdad5e6a75d0eb12022e8642c51519910665

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN