Submitted URL: https://mailing.ebulletins.co.uk/t/4137243/139952123/8859528/0/?e5e2987d=NDEzNzI0Mw%3d%3d&c73c8e04=aW50X256X2l0&4f415564=MTM5OTUy...
Effective URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Submission: On December 04 via manual from AU

Summary

This website contacted 43 IPs in 7 countries across 37 domains to perform 120 HTTP transactions. The main IP is 185.113.25.60, located in United Kingdom and belongs to FUTURE, GB. The main domain is www.gizmodo.co.uk.
TLS certificate: Issued by Let's Encrypt Authority X3 on October 15th 2019. Valid for: 3 months.
This is the only time www.gizmodo.co.uk was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 13.57.152.229 16509 (AMAZON-02)
1 1 2.19.45.224 20940 (AKAMAI-ASN1)
9 185.113.25.60 20596 (FUTURE)
9 8.241.91.124 3356 (LEVEL3)
2 2606:2800:135... 15133 (EDGECAST)
2 185.113.25.51 20596 (FUTURE)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 2a04:fa87:fff... 2635 (AUTOMATTIC)
5 185.113.25.59 20596 (FUTURE)
2 172.217.22.34 15169 (GOOGLE)
1 184.31.90.128 20940 (AKAMAI-ASN1)
1 2a00:1450:400... 15169 (GOOGLE)
7 151.101.114.2 54113 (FASTLY)
1 151.101.12.134 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
2 151.101.113.181 54113 (FASTLY)
2 6 2.19.43.224 20940 (AKAMAI-ASN1)
2 2a00:1450:400... 15169 (GOOGLE)
1 3 2a00:1450:400... 15169 (GOOGLE)
1 143.204.101.25 16509 (AMAZON-02)
1 4 52.213.7.200 16509 (AMAZON-02)
1 143.204.101.125 16509 (AMAZON-02)
2 2a03:2880:f01... 32934 (FACEBOOK)
1 52.215.103.126 16509 (AMAZON-02)
1 23.67.136.71 20940 (AKAMAI-ASN1)
3 151.101.0.134 54113 (FASTLY)
1 2a03:2880:f01... 32934 (FACEBOOK)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 13.224.196.111 16509 (AMAZON-02)
1 143.204.101.9 16509 (AMAZON-02)
2 2a03:2880:f11... 32934 (FACEBOOK)
3 2606:4700::68... 13335 (CLOUDFLAR...)
1 185.113.25.52 20596 (FUTURE)
1 2600:9000:215... 16509 (AMAZON-02)
1 151.101.112.134 54113 (FASTLY)
1 185.113.25.53 20596 (FUTURE)
1 35.190.59.101 15169 (GOOGLE)
2 159.180.84.2 33047 (INSTART)
1 91.228.74.184 27281 (QUANTCAST)
1 2600:9000:20e... 16509 (AMAZON-02)
32 151.101.14.2 54113 (FASTLY)
1 151.101.114.49 54113 (FASTLY)
120 43
Apex Domain
Subdomains
Transfer
40 taboola.com
cdn.taboola.com
trc.taboola.com
15.taboola.com
images-dup.taboola.com
1 MB
14 gizmodo.co.uk
www.gizmodo.co.uk
media.gizmodo.co.uk
consent.cmp.gizmodo.co.uk
209 KB
9 futurecdn.net
gmg.futurecdn.net
129 KB
6 scorecardresearch.com
sb.scorecardresearch.com
4 KB
5 gumgum.com
g2.gumgum.com
js.gumgum.com
35 KB
5 disqus.com
gizmodouk.disqus.com
disqus.com
referrer.disqus.com
30 KB
3 disquscdn.com
c.disquscdn.com
217 KB
3 facebook.com
graph.facebook.com
www.facebook.com
916 B
3 google-analytics.com
www.google-analytics.com
18 KB
3 google.de
adservice.google.de
www.google.de
396 B
3 doubleclick.net
securepubads.g.doubleclick.net
stats.g.doubleclick.net
56 KB
2 digitru.st
cdn.digitru.st
11 KB
2 google.com
www.google.com
709 B
2 facebook.net
connect.facebook.net
111 KB
2 onscroll.com
tags.onscroll.com
impl.onscroll.com
44 KB
2 gstatic.com
fonts.gstatic.com
18 KB
2 perfectmarket.com
widget.perfectmarket.com
32 KB
2 googleapis.com
ajax.googleapis.com
fonts.googleapis.com
6 KB
2 future-fie.co.uk
gizmos.future-fie.co.uk
widgets.future-fie.co.uk
42 KB
2 oath.com
consent.cmp.oath.com
service.cmp.oath.com
10 KB
2 ebulletins.co.uk
mailing.ebulletins.co.uk
a.ebulletins.co.uk
2 KB
1 quantcount.com
rules.quantcount.com
359 B
1 quantserve.com
secure.quantserve.com
6 KB
1 skimresources.com
r.skimresources.com
397 B
1 future.net.uk
search-api.fie.future.net.uk
30 KB
1 consensu.org
vendorlist.consensu.org
17 KB
1 bluekai.com
stags.bluekai.com
1 ml314.com
ml314.com
12 KB
1 cpx.to
p.cpx.to
2 KB
1 googletagmanager.com
www.googletagmanager.com
23 KB
1 bkrtx.com
tags.bkrtx.com
10 KB
1 googletagservices.com
www.googletagservices.com
16 KB
1 gravatar.com
1.gravatar.com
3 KB
1 onesignal.com
cdn.onesignal.com
3 KB
1 future-fie-assets.co.uk
widgets.future-fie-assets.co.uk
22 KB
0 cloudfront.net Failed
d3ezl4ajpp2zy8.cloudfront.net Failed
0 amazon-adsystem.com Failed
c.amazon-adsystem.com Failed
120 37
Domain Requested by
22 images-dup.taboola.com cdn.taboola.com
10 trc.taboola.com cdn.taboola.com
9 gmg.futurecdn.net www.gizmodo.co.uk
7 cdn.taboola.com www.gizmodo.co.uk
cdn.taboola.com
6 sb.scorecardresearch.com 2 redirects cdn.taboola.com
www.gizmodo.co.uk
6 www.gizmodo.co.uk www.gizmodo.co.uk
consent.cmp.gizmodo.co.uk
5 media.gizmodo.co.uk www.gizmodo.co.uk
4 g2.gumgum.com 1 redirects www.gizmodo.co.uk
3 c.disquscdn.com gizmodouk.disqus.com
3 consent.cmp.gizmodo.co.uk consent.cmp.oath.com
consent.cmp.gizmodo.co.uk
3 disqus.com gmg.futurecdn.net
gizmodouk.disqus.com
3 www.google-analytics.com 1 redirects www.gizmodo.co.uk
2 cdn.digitru.st www.gizmodo.co.uk
cdn.digitru.st
2 www.facebook.com www.gizmodo.co.uk
connect.facebook.net
2 www.google.de www.gizmodo.co.uk
2 www.google.com 2 redirects
2 stats.g.doubleclick.net 2 redirects
2 connect.facebook.net www.gizmodo.co.uk
connect.facebook.net
2 fonts.gstatic.com www.gizmodo.co.uk
2 widget.perfectmarket.com cdn.taboola.com
widget.perfectmarket.com
1 15.taboola.com cdn.taboola.com
1 rules.quantcount.com secure.quantserve.com
1 secure.quantserve.com www.gizmodo.co.uk
1 r.skimresources.com gizmos.future-fie.co.uk
1 search-api.fie.future.net.uk gizmos.future-fie.co.uk
1 referrer.disqus.com
1 vendorlist.consensu.org consent.cmp.gizmodo.co.uk
1 widgets.future-fie.co.uk widgets.future-fie-assets.co.uk
1 impl.onscroll.com tags.onscroll.com
1 js.gumgum.com www.gizmodo.co.uk
1 graph.facebook.com gmg.futurecdn.net
1 service.cmp.oath.com consent.cmp.oath.com
1 stags.bluekai.com tags.bkrtx.com
1 ml314.com www.gizmodo.co.uk
1 tags.onscroll.com www.googletagmanager.com
1 p.cpx.to www.gizmodo.co.uk
1 fonts.googleapis.com ajax.googleapis.com
1 adservice.google.de www.googletagservices.com
1 securepubads.g.doubleclick.net www.googletagservices.com
1 www.googletagmanager.com www.gizmodo.co.uk
1 gizmodouk.disqus.com www.gizmodo.co.uk
1 ajax.googleapis.com www.gizmodo.co.uk
1 tags.bkrtx.com www.gizmodo.co.uk
1 www.googletagservices.com www.gizmodo.co.uk
1 1.gravatar.com www.gizmodo.co.uk
1 cdn.onesignal.com www.gizmodo.co.uk
1 gizmos.future-fie.co.uk www.gizmodo.co.uk
1 widgets.future-fie-assets.co.uk www.gizmodo.co.uk
1 consent.cmp.oath.com www.gizmodo.co.uk
1 a.ebulletins.co.uk 1 redirects
1 mailing.ebulletins.co.uk 1 redirects
0 d3ezl4ajpp2zy8.cloudfront.net Failed www.gizmodo.co.uk
0 c.amazon-adsystem.com Failed www.gizmodo.co.uk
120 53
Subject Issuer Validity Valid
gizmodo.co.uk
Let's Encrypt Authority X3
2019-10-15 -
2020-01-13
3 months crt.sh
*.futurecdn.net
DigiCert SHA2 High Assurance Server CA
2017-07-20 -
2020-07-01
3 years crt.sh
service.cmp.oath.com
DigiCert SHA2 Secure Server CA
2018-03-22 -
2020-03-26
2 years crt.sh
future-fie-assets.co.uk
Let's Encrypt Authority X3
2019-10-14 -
2020-01-12
3 months crt.sh
future-fie.co.uk
Let's Encrypt Authority X3
2019-11-24 -
2020-02-22
3 months crt.sh
ssl898578.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-10-11 -
2020-04-18
6 months crt.sh
*.gravatar.com
COMODO RSA Domain Validation Secure Server CA
2018-09-06 -
2020-09-05
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
*.bkrtx.com
DigiCert SHA2 Secure Server CA
2018-12-03 -
2020-03-03
a year crt.sh
*.googleapis.com
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.disqus.com
DigiCert SHA2 Secure Server CA
2018-03-28 -
2020-04-27
2 years crt.sh
*.google-analytics.com
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
*.google.com
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
p.ssl.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-09-03 -
2021-02-22
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
p.cpx.to
COMODO RSA Domain Validation Secure Server CA
2015-02-10 -
2020-02-09
5 years crt.sh
*.gumgum.com
Amazon
2019-07-31 -
2020-08-31
a year crt.sh
*.onscroll.com
Go Daddy Secure Certificate Authority - G2
2018-07-15 -
2020-09-13
2 years crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-11-06 -
2020-02-04
3 months crt.sh
*.ml314.com
Amazon
2019-03-16 -
2020-04-16
a year crt.sh
odc-prod-01.oracle.com
DigiCert ECC Secure Server CA
2018-12-10 -
2020-03-10
a year crt.sh
www.google.de
GTS CA 1O1
2019-11-05 -
2020-01-28
3 months crt.sh
ssl565697.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-25 -
2020-03-02
6 months crt.sh
vendorlist.consensu.org
Amazon
2019-03-06 -
2020-04-06
a year crt.sh
search-api.fie.future.net.uk
Let's Encrypt Authority X3
2019-11-10 -
2020-02-08
3 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
cdn.digitru.st
Sectigo RSA Organization Validation Secure Server CA
2019-05-09 -
2021-05-08
2 years crt.sh
*.quantserve.com
DigiCert SHA2 High Assurance Server CA
2019-10-04 -
2020-10-07
a year crt.sh
g2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-11-21 -
2020-11-12
a year crt.sh

This page contains 6 frames:

Primary Page: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Frame ID: B8BB8247D1465E59D8CD5C49F258D03E
Requests: 110 HTTP requests in this frame

Frame: https://stags.bluekai.com/site/75865?ret=html&phint=__bk_t%3DVulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&phint=__bk_k%3D&phint=__bk_l%3Dhttps%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&phint=__bk_v%3D3.1.3&limit=1&r=90755019
Frame ID: 04E519E2D4CC6DC36645FE4349F1924C
Requests: 1 HTTP requests in this frame

Frame: https://consent.cmp.gizmodo.co.uk/cmpui.html
Frame ID: 66FF6843456B8DC24FF3A51732684AB5
Requests: 7 HTTP requests in this frame

Frame: https://disqus.com/embed/comments/?base=default&f=gizmodouk&t_u=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&t_d=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door&t_t=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door&s_o=default
Frame ID: B355F1A8D6E231CAC382B9491077362C
Requests: 1 HTTP requests in this frame

Frame: https://cdn.digitru.st/prod/1.5.37/dt.html
Frame ID: A5B7E9D065762410E0A8D5E727B9DE44
Requests: 1 HTTP requests in this frame

Frame: https://secure.quantserve.com/quant.js
Frame ID: AECFE33466572F8D03610458CEA5914A
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://mailing.ebulletins.co.uk/t/4137243/139952123/8859528/0/?e5e2987d=NDEzNzI0Mw%3d%3d&c73c8e04=aW50X256X2... HTTP 302
    https://a.ebulletins.co.uk/core/click/?acct=b2b-email&direct=true&rt=https%3a%2f%2fwww.gizmodo.co.uk%2f... HTTP 302
    https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-op... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • script /googleapis\.com\/.+webfont/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Page Statistics

120
Requests

98 %
HTTPS

39 %
IPv6

37
Domains

53
Subdomains

43
IPs

7
Countries

2473 kB
Transfer

4593 kB
Size

12
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://mailing.ebulletins.co.uk/t/4137243/139952123/8859528/0/?e5e2987d=NDEzNzI0Mw%3d%3d&c73c8e04=aW50X256X2l0&4f415564=MTM5OTUyMTIz&x=3d10476f HTTP 302
    https://a.ebulletins.co.uk/core/click/?acct=b2b-email&direct=true&rt=https%3a%2f%2fwww.gizmodo.co.uk%2f2019%2f11%2fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2f&mailing_id=4137243&list=int_nz_it&member_id=139952123&engine_id=1 HTTP 302
    https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 40
  • https://g2.gumgum.com/javascripts/ggv2.js HTTP 301
  • https://js.gumgum.com/services.js
Request Chain 44
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1575419385973&ns_c=UTF-8&cv=3.1e&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1575419385973&ns_c=UTF-8&cv=3.1e&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c9=
Request Chain 52
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-48457802-2&cid=388745368.1575419386&jid=520861388&gjid=1874640761&_gid=987689776.1575419386&_u=IGBAgEAB~&z=1858852924 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=520861388&_v=j79&z=1858852924 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=520861388&_v=j79&z=1858852924&slf_rd=1&random=411557566
Request Chain 77
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1301473728&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&ul=en-us&de=UTF-8&dt=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&ec=Affiliates&ea=HawkLink%20appeared&el=reported&_u=qHDAAEAB~&jid=827373286&gjid=997432434&cid=388745368.1575419386&tid=UA-48457802-2&_gid=987689776.1575419386&_r=1&cd1=article&cd2=ring&cd3=ring&cd4=10518929%2Ftech_gizmodo%2Farticle&cd5=880188-a&cd6=ring%7Camazon&cd7=whitney_kimball&cd8=08-11-2019&cd9=1&cd12=null&cd34=ring%7Camazon&cd14=null&cd16=null&cd17=36&cd24=exact&cd25=null&cd31=303d241e8977&cd37=null&cd48=reported&cd53=null&cd61=null&cd62=null&cd73=null&cd76=null&cd90=1218655122345937050&cd105=null&cd111=null&cd112=null&cd114=null&cd115=null&cd116=null&cd117=null&cd118=null&cd124=null&cd125=null&z=1742963512 HTTP 302
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-48457802-2&cid=388745368.1575419386&jid=827373286&_gid=987689776.1575419386&gjid=997432434&_v=j79&z=1742963512 HTTP 302
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=827373286&_v=j79&z=1742963512 HTTP 302
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=827373286&_v=j79&z=1742963512&slf_rd=1&random=2760050984
Request Chain 78
  • https://sb.scorecardresearch.com/p?c1=8&c2=15039634&c3=9&c4=04728e3b&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c9=&cv=2.0&cj=1&ns__t=1575419390070 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=8&c2=15039634&c3=9&c4=04728e3b&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c9=&cv=2.0&cj=1&ns__t=1575419390070

120 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Redirect Chain
  • https://mailing.ebulletins.co.uk/t/4137243/139952123/8859528/0/?e5e2987d=NDEzNzI0Mw%3d%3d&c73c8e04=aW50X256X2l0&4f415564=MTM5OTUyMTIz&x=3d10476f
  • https://a.ebulletins.co.uk/core/click/?acct=b2b-email&direct=true&rt=https%3a%2f%2fwww.gizmodo.co.uk%2f2019%2f11%2fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2f...
  • https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
51 KB
16 KB
Document
General
Full URL
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
2dfff0f17b44c587a6ac4b0b81b2262c6f94fd8ce105e5952d7c477d75ae0665

Request headers

Host
www.gizmodo.co.uk
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-User
?1

Response headers

Date
Tue, 03 Dec 2019 20:43:02 GMT
Content-Type
text/html; charset=UTF-8
Xkey
gizmodo-2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/ gizmodo-19362
Content-Encoding
gzip
Vary
Accept-Encoding
Age
13603
X-Country-Code
GB
X-FTR-Cache-Status
HIT
X-FTR-Expires
Wed, 04 Dec 2019 20:43:02 GMT
Expires
Wed, 04 Dec 2019 00:34:45 GMT
Cache-Control
max-age=300,public
Set-Cookie
FTR_Country_Code=DE; path=/; domain=www.gizmodo.co.uk
X-Country-Code-Real
DE
Accept-Ranges
bytes
Content-Length
15365
X-FTR-Request-ID
00000000:A990_00000000:01BB_5DE6FDF9_A7EF:7F55
X-FTR-Realm
pip
X-FTR-DC
IX
X-FTR-Balancer
webproxyprod01
X-FTR-Backend
www-live-sites-varnish
X-FTR-Backend-Server
ftevarnishprodgreen

Redirect headers

Content-Type
text/html; charset=utf-8
Content-Length
0
Cache-Control
no-cache, no-store, must-revalidate
Pragma
no-cache
Expires
0
P3P
CP="ALL DSP COR NID"
Access-Control-Allow-Credentials
true
Access-Control-Allow-Origin
*
Location
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Date
Wed, 04 Dec 2019 00:29:45 GMT
Connection
keep-alive
gizmodo.css
gmg.futurecdn.net/gizmodo/20190400300000/media/css/
72 KB
15 KB
Stylesheet
General
Full URL
https://gmg.futurecdn.net/gizmodo/20190400300000/media/css/gizmodo.css
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
f167dd939df2ed38d08f3e2c2fe2997c948ed44f69124affa4353cbeddea809e

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 07 Nov 2019 17:21:14 GMT
Content-Encoding
gzip
Age
2272111
Transfer-Encoding
chunked
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:D20E_00000000:0050_5D0DF354_5F47E:713F
Last-Modified
Tue, 11 Jun 2019 04:22:44 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5cff2c94-121a9"
access-control-allow-methods
GET
Content-Type
text/css
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
access-control-allow-credentials
true
access-control-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sat, 07 Dec 2019 17:21:14 GMT
cmp3p.js
consent.cmp.oath.com/
27 KB
10 KB
Script
General
Full URL
https://consent.cmp.oath.com/cmp3p.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:135:155a:23ba:b2a:25ff:122d , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECD (fcn/40D5) /
Resource Hash
ff2afe841fcb88b6cd9bf6197edf5abefab68f61f9cfd81de65458d7141e8e4e

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:45 GMT
content-encoding
gzip
x-amz-request-id
F06B3BA2E7961628
x-cache
HIT
status
200
content-length
9438
x-amz-id-2
oJwFatxZPmBnAZfGEUzlgLAS4780msyzAQawi/nloRxC3aiaOR35avgRErwInRaBTd1yf8F3S20=
x-amz-expiration
expiry-date="Thu, 07 Jan 2021 00:00:00 GMT", rule-id="aolp-ds-prd-cmp-us-east-1"
last-modified
Tue, 03 Dec 2019 21:10:56 GMT
server
ECD (fcn/40D5)
etag
"adc92bcdfbe1321cf2144925c7adaa95+gzip"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=300
accept-ranges
bytes
expires
Wed, 04 Dec 2019 00:34:45 GMT
giz.js
widgets.future-fie-assets.co.uk/js/w/
66 KB
22 KB
Script
General
Full URL
https://widgets.future-fie-assets.co.uk/js/w/giz.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
6c9a38809d5979dfeac3fdf6c034a19d0c748e27eb1b18241105c1419802fa3b

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:13:32 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
973
X-Hawk-Area
DE
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
21302
X-FTR-Expires
Wed, 04 Dec 2019 00:33:32 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:BCCA_00000000:01BB_5DE6FDF9_1499FF8:506C
Last-Modified
Thu, 28 Nov 2019 13:25:52 GMT
X-Country-Code-Real
DE
ETag
"5ddfcae0-10600"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 04 Dec 2019 01:13:32 GMT
hawklinks.js
gizmos.future-fie.co.uk/hl/
103 KB
35 KB
Script
General
Full URL
https://gizmos.future-fie.co.uk/hl/hawklinks.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.51 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif14.web.future.net.uk
Software
/
Resource Hash
a9db8149ab4cf177fe7a0e91d2c196cf168fb995a7bcc3654278e34085512667

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:27:44 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-hawklinks
Age
121
X-Hawk-Area
DE
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
35557
X-FTR-Expires
Wed, 04 Dec 2019 00:47:44 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-40
X-FTR-Request-ID
00000000:BCC6_00000000:01BB_5DE6FDF9_D3AE39:506B
Last-Modified
Wed, 27 Nov 2019 17:04:48 GMT
X-Country-Code-Real
DE
ETag
"5ddeacb0-19bba"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
fievarnishprodwhite
Cache-Control
max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 04 Dec 2019 01:27:44 GMT
master.js
gmg.futurecdn.net/gizmodo/media/scripts/
155 KB
53 KB
Script
General
Full URL
https://gmg.futurecdn.net/gizmodo/media/scripts/master.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
11f25081dba37ce1a0b33c9502097a69af1bd47541e58de8b476635c2496fe38

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 26 Nov 2019 03:26:38 GMT
Content-Encoding
gzip
Age
680587
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
Content-Length
53426
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A79E_00000000:0050_5D4C1228_45790:0E6C
Last-Modified
Wed, 12 Jun 2019 04:25:31 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5d007ebb-26b7a"
access-control-allow-methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Thu, 26 Dec 2019 03:26:45 GMT
OneSignalSDK.js
cdn.onesignal.com/sdks/
8 KB
3 KB
Script
General
Full URL
https://cdn.onesignal.com/sdks/OneSignalSDK.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2606:4700::6812:e234 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
44aae6fbe386483965d5e393b0618b2bf5e27a6910b8f3e9ff3cadd62bacbabd

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:45 GMT
content-encoding
gzip
cf-cache-status
HIT
server
cloudflare
age
773
etag
W/"967648c5f43f1acc3f64970983a5d03f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=43200
cf-ray
53f9aaf96d84cbcc-VIE
expires
Wed, 04 Dec 2019 12:29:45 GMT
logo--gizmodo.svg
www.gizmodo.co.uk/media/images/
5 KB
3 KB
Image
General
Full URL
https://www.gizmodo.co.uk/media/images/logo--gizmodo.svg
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
6f93a0a0657a88912d74270e3f7511214583e82a958eb410c4678e003fd5d639

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 22 Nov 2019 13:27:26 GMT
Content-Encoding
gzip
Age
990139
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
2268
X-FTR-Expires
Sun, 22 Dec 2019 13:27:26 GMT
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A990_00000000:01BB_5DE6FDF9_A7F0:7F55
Last-Modified
Tue, 11 Jun 2019 04:22:43 GMT
X-Country-Code-Real
DE
ETag
W/"5cff2c93-139e"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
image/svg+xml
X-FTR-Backend-Server
ftevarnishprodred
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
GB
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sun, 22 Dec 2019 13:27:26 GMT
5361d26d16ec46ac328de3759c01e5b3
1.gravatar.com/avatar/
3 KB
3 KB
Image
General
Full URL
https://1.gravatar.com/avatar/5361d26d16ec46ac328de3759c01e5b3
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:fa87:fffe::c000:4902 , Ireland, ASN2635 (AUTOMATTIC - Automattic, Inc, US),
Reverse DNS
Software
nginx /
Resource Hash
991b89e27049fdb8d2db1c46db95b9809e5f5a7d2afc3377634144cfea680f70

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-nc
HIT vie 1
date
Wed, 04 Dec 2019 00:29:45 GMT
last-modified
Wed, 11 Jan 1984 08:00:00 GMT
server
nginx
access-control-allow-origin
*
source-age
3256088
content-type
image/jpeg
status
200
cache-control
max-age=300
content-disposition
inline; filename="5361d26d16ec46ac328de3759c01e5b3.jpg"
accept-ranges
bytes
link
<https://www.gravatar.com/avatar/5361d26d16ec46ac328de3759c01e5b3>; rel="canonical"
content-length
2637
expires
Wed, 04 Dec 2019 00:34:45 GMT
nrqfpfri5ggr97t2lutb-140x79.jpg
media.gizmodo.co.uk/wp-content/uploads/2019/11/
4 KB
5 KB
Image
General
Full URL
https://media.gizmodo.co.uk/wp-content/uploads/2019/11/nrqfpfri5ggr97t2lutb-140x79.jpg
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.59 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif04.web.future.net.uk
Software
/
Resource Hash
1c29d8b5f5e74dfbb717055ab5514141ff2eec2003ea6d7757f61fa5d17f5924

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:45 GMT
Last-Modified
Fri, 08 Nov 2019 13:40:26 GMT
X-FTR-Backend-Server
legacyphpweb05
Access-Control-Allow-Methods
GET
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
X-FTR-DC
IX
X-FTR-Request-ID
00000000:A728_00000000:01BB_5DE6FDF9_3E62:12BF
Access-Control-Allow-Credentials
true
X-FTR-Realm
pip
X-FTR-Backend
gizmodo-cms
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Content-Length
4240
X-FTR-Balancer
webproxyprodred
coffee-smartphone-twitter-application-58639-140x79.jpg
media.gizmodo.co.uk/wp-content/uploads/2019/11/
4 KB
4 KB
Image
General
Full URL
https://media.gizmodo.co.uk/wp-content/uploads/2019/11/coffee-smartphone-twitter-application-58639-140x79.jpg
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.59 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif04.web.future.net.uk
Software
/
Resource Hash
951c1954744b21c7731746682aee2a45c7853fa2b41f098ba1e32e01f45f4e16

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:45 GMT
Last-Modified
Thu, 28 Nov 2019 16:14:06 GMT
X-FTR-Backend-Server
legacyphpweb05
Access-Control-Allow-Methods
GET
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
X-FTR-DC
IX
X-FTR-Request-ID
00000000:A726_00000000:01BB_5DE6FDF9_2D7C:12BE
Access-Control-Allow-Credentials
true
X-FTR-Realm
pip
X-FTR-Backend
gizmodo-cms
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Content-Length
3911
X-FTR-Balancer
webproxyprodred
IMG_20191127_234404-140x79.jpg
media.gizmodo.co.uk/wp-content/uploads/2019/11/
5 KB
6 KB
Image
General
Full URL
https://media.gizmodo.co.uk/wp-content/uploads/2019/11/IMG_20191127_234404-140x79.jpg
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.59 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif04.web.future.net.uk
Software
/
Resource Hash
6db8a4e27f3e280503ca33f95d461f42e526b3c21951bce8254e7e1450839c5e

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:45 GMT
Last-Modified
Fri, 29 Nov 2019 00:38:37 GMT
X-FTR-Backend-Server
legacyphpweb05
Access-Control-Allow-Methods
GET
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
X-FTR-DC
IX
X-FTR-Request-ID
00000000:A72A_00000000:01BB_5DE6FDF9_6DA0:12C0
Access-Control-Allow-Credentials
true
X-FTR-Realm
pip
X-FTR-Backend
gizmodo-cms
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Content-Length
5104
X-FTR-Balancer
webproxyprodred
r6smvif7qcszdbuv8jhn-140x79.png
media.gizmodo.co.uk/wp-content/uploads/2019/11/
27 KB
27 KB
Image
General
Full URL
https://media.gizmodo.co.uk/wp-content/uploads/2019/11/r6smvif7qcszdbuv8jhn-140x79.png
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.59 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif04.web.future.net.uk
Software
/
Resource Hash
05e623e30192a3abfe06db51186eac6ed5b334ef3bc3fa9c04ec0d11264c1493

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:45 GMT
Last-Modified
Thu, 28 Nov 2019 02:00:28 GMT
X-FTR-Backend-Server
legacyphpweb05
Access-Control-Allow-Methods
GET
Content-Type
image/png
Access-Control-Allow-Origin
*
X-FTR-DC
IX
X-FTR-Request-ID
00000000:A72C_00000000:01BB_5DE6FDF9_6DA1:12C0
Access-Control-Allow-Credentials
true
X-FTR-Realm
pip
X-FTR-Backend
gizmodo-cms
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Content-Length
27339
X-FTR-Balancer
webproxyprodred
logo--gizmodo--white.svg
www.gizmodo.co.uk/media/images/
5 KB
3 KB
Image
General
Full URL
https://www.gizmodo.co.uk/media/images/logo--gizmodo--white.svg
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
0c8f59298b13c2b540a5f6ef8af10d102803f6396532b76b0944cb81c3c2ae6c

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 18:50:10 GMT
Content-Encoding
gzip
Age
20375
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
2262
X-FTR-Expires
Thu, 02 Jan 2020 18:50:10 GMT
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A990_00000000:01BB_5DE6FDF9_A7F2:7F55
Last-Modified
Tue, 11 Jun 2019 04:22:43 GMT
X-Country-Code-Real
DE
ETag
W/"5cff2c93-139e"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
image/svg+xml
X-FTR-Backend-Server
ftevarnishprodblue
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
GB
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Thu, 02 Jan 2020 18:50:10 GMT
abp.js
gmg.futurecdn.net/gizmodo/media/scripts/gawker/
1 KB
1 KB
Script
General
Full URL
https://gmg.futurecdn.net/gizmodo/media/scripts/gawker/abp.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
75edcfc8e6e829b7a620287d7c7c7f465bf432c732ffdf7402d7dc24bf2122e7

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 08 Nov 2019 23:23:01 GMT
Content-Encoding
gzip
Age
2164004
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
Content-Length
419
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:5ABB_00000000:0050_5D0DD6EB_1A359D:7142
Last-Modified
Tue, 11 Jun 2019 04:22:44 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5cff2c94-417"
access-control-allow-methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sat, 14 Dec 2019 21:12:55 GMT
dfp_skin.js
gmg.futurecdn.net/gizmodo/media/scripts/gawker/
2 KB
1 KB
Script
General
Full URL
https://gmg.futurecdn.net/gizmodo/media/scripts/gawker/dfp_skin.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
933cd086d62072bb30292a2ccae3f8e2ac374570f890557d302f6a5e21d02cd1

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 28 Nov 2019 10:35:08 GMT
Content-Encoding
gzip
Age
482077
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
Content-Length
649
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:6766_00000000:0050_5DB815DB_1E765:2000
Last-Modified
Tue, 11 Jun 2019 04:22:44 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5cff2c94-837"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Sat, 28 Dec 2019 10:35:09 GMT
ads.js
gmg.futurecdn.net/gizmodo/media/scripts/gawker/
23 KB
5 KB
Script
General
Full URL
https://gmg.futurecdn.net/gizmodo/media/scripts/gawker/ads.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
0f7b3be99735fa15d0f2a0443e227acb5dd462202cd19e7ab263d1988317cc2e

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sat, 16 Nov 2019 23:23:15 GMT
Content-Encoding
gzip
Age
1472790
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
Content-Length
4691
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:7CBC_00000000:0050_5D275E45_18C8CB:0BF1
Last-Modified
Wed, 12 Jun 2019 04:25:31 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5d007ebb-5ccf"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Tue, 31 Dec 2019 20:28:32 GMT
dfp.min.js
gmg.futurecdn.net/dfp-helper/20190400300000/v1/
9 KB
4 KB
Script
General
Full URL
https://gmg.futurecdn.net/dfp-helper/20190400300000/v1/dfp.min.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
bb044f58201b187ec45e2f0f167a01b56932cf5571ebb710f3286c1db786a3fc

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 17 Nov 2019 16:33:42 GMT
Content-Encoding
gzip
Age
1410963
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
Content-Length
3646
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:C540_00000000:0050_5D1B7E12_57085:02BF
Last-Modified
Wed, 12 Jun 2019 04:25:30 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5d007eba-25cb"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Tue, 17 Dec 2019 16:33:42 GMT
gpt.js
www.googletagservices.com/tag/js/
51 KB
16 KB
Script
General
Full URL
https://www.googletagservices.com/tag/js/gpt.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
sffe /
Resource Hash
26a312391d82de0b2d7f9af997ad3226382d8146a459bc2d1a2bc55d72c7d8c7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"356 / 464 of 1000 / last-modified: 1575402695"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15747
x-xss-protection
0
expires
Wed, 04 Dec 2019 00:29:45 GMT
core.js
gmg.futurecdn.net/gizmodo/20190400300000/media/scripts/gawker/
3 KB
2 KB
Script
General
Full URL
https://gmg.futurecdn.net/gizmodo/20190400300000/media/scripts/gawker/core.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
53bc09affaa385a00bc078adffdc300abd7cb26e3e025932aec5b98e28a0b8d6

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 11 Nov 2019 16:20:03 GMT
Content-Encoding
gzip
Age
1930182
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
Content-Length
1298
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:A96C_00000000:0050_5D0BAFF5_272CC:12E4
Last-Modified
Wed, 12 Jun 2019 04:25:31 GMT
Server
Footprint Distributor V6.1.1162
ETag
W/"5d007ebb-c8f"
Access-Control-Allow-Methods
GET
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Wed, 11 Dec 2019 16:20:15 GMT
bk-coretag.js
tags.bkrtx.com/js/
27 KB
10 KB
Script
General
Full URL
https://tags.bkrtx.com/js/bk-coretag.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.128 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-128.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
5cc280e965102224e1c7c0bd1df536c524c3a6fc9762205f4d7f7b345382c724

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:45 GMT
Content-Encoding
gzip
Last-Modified
Wed, 21 Aug 2019 15:56:57 GMT
Server
Apache
ETag
"31600f9-6afc-590a29f6f4dd4"
Vary
Accept-Encoding
Content-Type
text/javascript
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
9603
Expires
Wed, 11 Dec 2019 00:29:45 GMT
amzn_ads.js
c.amazon-adsystem.com/aax2/
0
0

webfont.js
ajax.googleapis.com/ajax/libs/webfont/1/
13 KB
5 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/webfont/1/webfont.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
81016ac6be850b72df5d4faa0c3cec8e2c1b0ba0045712144a6766adfad40bee
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 21 Nov 2019 06:59:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
1099814
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
5437
x-xss-protection
0
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Fri, 20 Nov 2020 06:59:31 GMT
loader.js
cdn.taboola.com/libtrc/futureplc-network/
258 KB
30 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/futureplc-network/loader.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
obaker.257.1.1-10.31.4 /
Resource Hash
80b7c91ad5c75931a1c31456dca4b01d82128bd5127e69e695378d3a7cc30437

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
F47jLqqiiLMpplVnnY0EgNs94Wyxkcre
content-encoding
gzip
age
10028
via
1.1 varnish
x-cache
HIT
status
200
date
Wed, 04 Dec 2019 00:29:45 GMT
content-length
30259
x-amz-id-2
chp+wyqKMvUti86oR4SzXHl3t1dG1TzZJTX89hJIXXur+PkpNWhp8OxAaFpN6yaKFAI55pG3bzQ=
x-served-by
cache-hhn4065-HHN
x-from-cache
1
last-modified
Tue, 03 Dec 2019 12:23:19 UTC
server
obaker.257.1.1-10.31.4
x-timer
S1575419386.840983,VS0,VE0
etag
"be27f96f1ad5e24a8395c4fd2d2bf6621f3afef4"
vary
Accept-Encoding, Accept-Encoding
x-amz-request-id
E59DF8F8804ACEB5
access-control-allow-origin
*
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
12
x-cache-hits
2
ajax-loader__circle--small.gif
gmg.futurecdn.net/gizmodo/20190400300000/media/images/
2 KB
3 KB
Image
General
Full URL
https://gmg.futurecdn.net/gizmodo/20190400300000/media/images/ajax-loader__circle--small.gif
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
ed1c2c6b7b77b966dd42dbec5cda78e14595383a75aa465912cbd75c0e2dc569

Request headers

Referer
https://gmg.futurecdn.net/gizmodo/20190400300000/media/css/gizmodo.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 24 Nov 2019 16:54:45 GMT
Age
804900
X-FTR-DC
TC
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
Content-Length
1849
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:C5BF_00000000:0050_5D122CF3_BAF4F:2B8A
Last-Modified
Wed, 12 Jun 2019 04:25:31 GMT
Server
Footprint Distributor V6.1.1162
ETag
"5d007ebb-739"
Access-Control-Allow-Methods
GET
Content-Type
image/gif
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Thu, 02 Jan 2020 13:56:04 GMT
fontawesome-webfont.woff
gmg.futurecdn.net/gizmodo/media/fonts/
43 KB
44 KB
Font
General
Full URL
https://gmg.futurecdn.net/gizmodo/media/fonts/fontawesome-webfont.woff?v=4.0.3
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
8.241.91.124 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Footprint Distributor V6.1.1162 /
Resource Hash
0fd28fece9ebd606b8b071460ebd3fc2ed7bc7a66ef91c8834f11dfacab4a849

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://gmg.futurecdn.net/gizmodo/20190400300000/media/css/gizmodo.css
Origin
https://www.gizmodo.co.uk

Response headers

Date
Wed, 06 Nov 2019 18:35:32 GMT
Age
2354053
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Connection
keep-alive
Content-Length
44432
X-FTR-Balancer
webproxyprodred
X-FTR-Request-ID
00000000:CAAB_00000000:0050_5DC31274_AE4BD:6E96
Last-Modified
Tue, 11 Jun 2019 04:22:44 GMT
Server
Footprint Distributor V6.1.1162
ETag
"5cff2c94-ad90"
access-control-allow-methods
GET
Content-Type
application/font-woff
X-FTR-Backend-Server
http.van-prod
Cache-Control
max-age=2592000
access-control-allow-credentials
true
Accept-Ranges
bytes
access-control-allow-origin
*
access-control-allow-headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Tue, 24 Dec 2019 16:52:56 GMT
embed.js
gizmodouk.disqus.com/
65 KB
22 KB
Script
General
Full URL
https://gizmodouk.disqus.com/embed.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.12.134 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
openresty /
Resource Hash
e2b3c37dbfe361c8154b164b82386d530234686faee6319b97dcf29d0c12232a
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:46 GMT
Content-Encoding
gzip
Server
openresty
Age
0
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=utf-8
Cache-Control
private, max-age=60
X-Service
router
Connection
keep-alive
Link
<https://disqus.com>; rel=preconnect, <https://c.disquscdn.com>; rel=preconnect
Content-Length
21622
gtm.js
www.googletagmanager.com/
66 KB
23 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-TMD5RH
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
8a7ad41d7f3be747c187ea9a37b20223e4fa4a6eed98692036746e94fff404b0
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:45 GMT
content-encoding
br
last-modified
Wed, 04 Dec 2019 00:00:00 GMT
server
Google Tag Manager
access-control-allow-origin
http://www.googletagmanager.com
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
content-length
23553
x-xss-protection
0
expires
Wed, 04 Dec 2019 00:29:45 GMT
abp.gif
www.gizmodo.co.uk/media/images/
56 B
964 B
Image
General
Full URL
https://www.gizmodo.co.uk/media/images/abp.gif?ch=1&rn=6.246577186687164
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
c63b039507d40774f49e71ae810957dbf82b684a6a199799def556d45d03e3bf

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 18:50:09 GMT
Age
20376
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
56
X-FTR-Expires
Thu, 02 Jan 2020 18:50:09 GMT
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A990_00000000:01BB_5DE6FDF9_A7F3:7F55
Last-Modified
Tue, 11 Jun 2019 04:22:43 GMT
X-Country-Code-Real
DE
ETag
"5cff2c93-38"
Access-Control-Allow-Methods
GET
Content-Type
image/gif
X-FTR-Backend-Server
ftevarnishprodblue
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
GB
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Thu, 02 Jan 2020 18:50:09 GMT
abp.gif
www.gizmodo.co.uk/media/images/
56 B
964 B
Image
General
Full URL
https://www.gizmodo.co.uk/media/images/abp.gif?ch=2&rn=6.246577186687164
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
c63b039507d40774f49e71ae810957dbf82b684a6a199799def556d45d03e3bf

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 18:50:09 GMT
Age
20376
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
56
X-FTR-Expires
Thu, 02 Jan 2020 18:50:09 GMT
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:A990_00000000:01BB_5DE6FDF9_A7F4:7F55
Last-Modified
Tue, 11 Jun 2019 04:22:43 GMT
X-Country-Code-Real
DE
ETag
"5cff2c93-38"
Access-Control-Allow-Methods
GET
Content-Type
image/gif
X-FTR-Backend-Server
ftevarnishprodblue
Cache-Control
max-age=2592000
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
GB
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Expires
Thu, 02 Jan 2020 18:50:09 GMT
pubads_impl_modern_2019112101.js
securepubads.g.doubleclick.net/gpt/
147 KB
56 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_modern_2019112101.js?21065216
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.22.34 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s16-in-f2.1e100.net
Software
sffe /
Resource Hash
ba6927119abe893b5ac99aeb20a2b94c6aad8e751c8afcf87543c78410ea7cde
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Wed, 04 Dec 2019 00:29:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 21 Nov 2019 14:10:31 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
57290
x-xss-protection
0
expires
Wed, 04 Dec 2019 00:29:45 GMT
integrator.sync.js
adservice.google.de/adsid/
113 B
178 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.sync.js?domain=www.gizmodo.co.uk
Requested by
Host: www.googletagservices.com
URL: https://www.googletagservices.com/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ea03bfd7fdda1eac185ebc3e8e74b33065b04c8e0adc48cbbd4136748dbd2742
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:45 GMT
content-encoding
gzip
x-content-type-options
nosniff
content-type
application/javascript; charset=UTF-8
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
timing-allow-origin
*
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
108
x-xss-protection
0
css
fonts.googleapis.com/
5 KB
667 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans:300,600&subset=latin
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/webfont/1/webfont.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
daefeed16d76567f70b983b5468c089d4740107fdbf64cd18efe6739fbc806d3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
br
last-modified
Wed, 04 Dec 2019 00:29:45 GMT
server
ESF
access-control-allow-origin
*
date
Wed, 04 Dec 2019 00:29:45 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
x-xss-protection
0
expires
Wed, 04 Dec 2019 00:29:45 GMT
load.js
widget.perfectmarket.com/futureplc-network/
4 KB
2 KB
Script
General
Full URL
https://widget.perfectmarket.com/futureplc-network/load.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/futureplc-network/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.113.181 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
bb1688b0dcbef1b20d304700be81e8a87823d3d65786cb8cbd3cfb589f4fc02d

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
.7k3QXOo7MIuECeXDHaORDvgVMAVR_YG
content-encoding
gzip
age
27
x-cache
HIT, HIT
status
200
date
Wed, 04 Dec 2019 00:29:45 GMT
content-length
1457
x-amz-id-2
74PPmkJFGy0TxH2yjNTLebmwGM4U5k+n2Cq1kO5eOTCYUknePhDVlAx2Bgdj6WN8WfFWzJ2V0Ac=
x-served-by
cache-lax8640-LAX, cache-hhn4028-HHN
last-modified
Thu, 21 Nov 2019 07:34:27 GMT
server
AmazonS3
x-timer
S1575419386.927367,VS0,VE0
etag
"fc52a52f7fcbda0af4773f41d419c472"
vary
Accept-Encoding,,
x-amz-request-id
0C9E696FAA2FA0D9
via
1.1 varnish, 1.1 varnish
cache-control
max-age=300
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
1, 1
impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
cdn.taboola.com/libtrc/
418 KB
118 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/futureplc-network/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
adddfa5738305892763ddd93ad3217af166ad356451c4cce5b2901f95b96ef7f

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
jR.NkP1cjM3BD14djGWpXwjatazT6Fkz
content-encoding
gzip
age
104
x-cache
HIT
status
200
date
Wed, 04 Dec 2019 00:29:45 GMT
x-amz-replication-status
FAILED
content-length
120428
x-amz-id-2
J6q87i1fXsrC9pZoxLCSTXa3/42QIXpMD1BQ0/pqGwHShMvfO0RDOTUA9HQg+7YAO0qlG76DD2c=
x-served-by
cache-hhn4065-HHN
x-amz-expiration
expiry-date="Sat, 28 Dec 2019 00:00:00 GMT", rule-id="expire-versioned-static"
last-modified
Wed, 27 Nov 2019 09:59:51 GMT
server
AmazonS3
x-timer
S1575419386.909456,VS0,VE0
etag
"633455a178a440d1cbc68689eded2335"
vary
Accept-Encoding
x-amz-request-id
271EFAA259D055D2
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
16
x-cache-hits
9
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/futureplc-network/loader.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:45 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Thu, 05 Dec 2019 00:29:45 GMT
tr5
cdn.taboola.com/libtrc/
3 B
78 B
Image
General
Full URL
https://cdn.taboola.com/libtrc/tr5?abgroup=enc-img-3-vB
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:45 GMT
via
1.1 varnish
server
Varnish
x-timer
S1575419386.909912,VS0,VE0
x-cache
HIT
content-type
text/html
status
200
cache-control
private,max-age=14400
x-cache-hits
0
accept-ranges
bytes
content-length
3
retry-after
0
x-served-by
cache-hhn4065-HHN
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300,600&subset=latin
Origin
https://www.gizmodo.co.uk

Response headers

date
Thu, 21 Nov 2019 07:11:58 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:44 GMT
server
sffe
age
1099067
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9180
x-xss-protection
0
expires
Fri, 20 Nov 2020 07:11:58 GMT
mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/
9 KB
9 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN_r8OUuhpKKSTjw.woff2
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
5e261f7e11c39ff6f4c8fe884e5c9de2fa15f29085a1adefdd36603ef2e23c00
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open+Sans:300,600&subset=latin
Origin
https://www.gizmodo.co.uk

Response headers

date
Thu, 21 Nov 2019 20:31:01 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 19:30:37 GMT
server
sffe
age
1051124
content-type
font/woff2
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-origin
*
content-length
9016
x-xss-protection
0
expires
Fri, 20 Nov 2020 20:31:01 GMT
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
6968
date
Tue, 03 Dec 2019 22:33:37 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Wed, 04 Dec 2019 00:33:37 GMT
px.js
p.cpx.to/p/11215/
1 KB
2 KB
Script
General
Full URL
https://p.cpx.to/p/11215/px.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.25 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-25.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
4f7bbdb5f3f0aaa57ebaefacd33b399c5a7304573cb5b59c078d23301e4ae70e

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Fri, 18 Oct 2019 13:37:58 GMT
Content-Encoding
UTF-8
Last-Modified
Wed, 10 Oct 2018 10:48:57 GMT
Server
AmazonS3
Age
1593901
ETag
"1179766671eee922ad94c35d6a8822c7"
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 c6702f5f3b6e77da6f394e67ef1a6aab.cloudfront.net (CloudFront)
Cache-Control
max-age=2419200
X-Amz-Cf-Pop
FRA50-C1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1498
X-Amz-Cf-Id
3M1Z3r0qhP97ENHpu5lMG_lDu1A-Fufl09-PpGZDgylpLhliXjZl9A==
services.js
js.gumgum.com/
Redirect Chain
  • https://g2.gumgum.com/javascripts/ggv2.js
  • https://js.gumgum.com/services.js
0
-1 B
XHR
General
Full URL
https://js.gumgum.com/services.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.213.7.200 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-213-7-200.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
301
date
Wed, 04 Dec 2019 00:29:46 GMT
server
nginx
access-control-allow-origin
*
content-length
162
location
https://js.gumgum.com/services.js
content-type
text/html

Redirect headers

status
301
date
Wed, 04 Dec 2019 00:29:46 GMT
server
nginx
access-control-allow-origin
*
content-length
162
location
https://js.gumgum.com/services.js
content-type
text/html
tag.min.js
tags.onscroll.com/32529e0e-557a-462d-85a0-98003fd62f78/
37 KB
37 KB
Script
General
Full URL
https://tags.onscroll.com/32529e0e-557a-462d-85a0-98003fd62f78/tag.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-TMD5RH
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.125 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-125.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
30b6dfd9188f6721a602407ce5c2cd317e937c6a0010cc3732ed16f8bc6e98a5

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
JDC.bpSuRHpDsE79TrnOU.dCNT55twwi
Content-Encoding
utf8
Last-Modified
Fri, 15 Mar 2019 15:08:13 GMT
Server
AmazonS3
Age
46528
ETag
"d52ba38b603be6dc78f418af336144ba"
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 9128c49d19c76fd86ec4c647434ccb0a.cloudfront.net (CloudFront)
Date
Tue, 03 Dec 2019 11:34:18 GMT
X-Amz-Cf-Pop
FRA50-C1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
37436
X-Amz-Cf-Id
4K1MADcy-kSXe18dtYvpYySGoDs0mmqKeY6G33gfPysmCKW59PwaHw==
fbevents.js
connect.facebook.net/en_US/
121 KB
26 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
71b52274b1b43661e6523b2774c9fa98a673e1861703bea5f32d75a32a850394
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
26702
x-xss-protection
0
pragma
public
x-fb-debug
soJsIpNIBCPn3Ve5PXG7HDu71n5vbWKs8KrYscLIwGHpjywBw8W7+4TQ834qM4MSC9ADqWT8s4JLGg/MiHiM7Q==
x-fb-trip-id
2000377899
date
Wed, 04 Dec 2019 00:29:45 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
tag.aspx
ml314.com/
26 KB
12 KB
Script
General
Full URL
https://ml314.com/tag.aspx?411
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.215.103.126 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-215-103-126.eu-west-1.compute.amazonaws.com
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
c293a28e23c66b27bd04bc1742f3aab0ebf6c382961c1e83140f035a08ea5e5d

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:45 GMT
Content-Encoding
gzip
Last-Modified
Tue, 03 Dec 2019 22:34:54 GMT
Server
Microsoft-IIS/10.0
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Cache-Control
public, max-age=79508
Connection
keep-alive
Content-Length
11932
Expires
Wed, 04 Dec 2019 22:34:54 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=7&c2=13739933&c3=20121515121&ns__t=1575419385973&ns_c=UTF-8&cv=3.1e&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20...
  • https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1575419385973&ns_c=UTF-8&cv=3.1e&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%2...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1575419385973&ns_c=UTF-8&cv=3.1e&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c9=
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 04 Dec 2019 00:29:46 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=7&c2=13739933&c3=20121515121&ns__t=1575419385973&ns_c=UTF-8&cv=3.1e&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c9=
Pragma
no-cache
Date
Wed, 04 Dec 2019 00:29:45 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
pmk-201902002.5.js
widget.perfectmarket.com/futureplc-network/
111 KB
31 KB
Script
General
Full URL
https://widget.perfectmarket.com/futureplc-network/pmk-201902002.5.js
Requested by
Host: widget.perfectmarket.com
URL: https://widget.perfectmarket.com/futureplc-network/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.113.181 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4560085e1116f3c5bfff079e562f020c8e14d22551a2c24c9a0594cf3d2c8c4b

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
7ic5zyi8YsyVGZSzFv4unyIhQrLJb6OV
content-encoding
gzip
age
1097709
x-cache
HIT, HIT
status
200
date
Wed, 04 Dec 2019 00:29:46 GMT
content-length
30971
x-amz-id-2
b7zySwp8C7C1ubz8xBc7+MA17uqlqk/ieqble7dI6RVkmxaVztHOnFVC7EAgmwGcpouseRJu1bQ=
x-served-by
cache-lax8651-LAX, cache-hhn4028-HHN
last-modified
Thu, 21 Nov 2019 07:34:26 GMT
server
AmazonS3
x-timer
S1575419386.013324,VS0,VE0
etag
"291e3646a032cecf3a504c115cd09a4e"
vary
Accept-Encoding,,
x-amz-request-id
9E16DDFBACF3EE7B
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31536000
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
x-cache-hits
1, 20508
Cookie set 75865
stags.bluekai.com/site/ Frame 04E5
0
0
Document
General
Full URL
https://stags.bluekai.com/site/75865?ret=html&phint=__bk_t%3DVulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&phint=__bk_k%3D&phint=__bk_l%3Dhttps%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&phint=__bk_v%3D3.1.3&limit=1&r=90755019
Requested by
Host: tags.bkrtx.com
URL: https://tags.bkrtx.com/js/bk-coretag.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
23.67.136.71 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-67-136-71.deploy.static.akamaitechnologies.com
Software
/
Resource Hash

Request headers

Host
stags.bluekai.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/

Response headers

Content-Type
text/html
Content-Length
71
P3P
CP="NOI DSP COR CUR ADMo DEVo PSAo PSDo OUR SAMo BUS UNI NAV", policyref="http://tags.bluekai.com/w3c/p3p.xml"
BK-Server
3a13
Date
Wed, 04 Dec 2019 00:29:46 GMT
Connection
keep-alive
Set-Cookie
bkdc=phx; expires=Mon, 01-Jun-2020 00:29:46 GMT; path=/; domain=.bluekai.com; SameSite=None; Secure bkpa=KJhPMNagyM9DCU2BIoqR+cu5e6PW6R6BC1ctV3hsW8GZJqNS83d43jtLQlOwfg67TErppoYS857pDfR/iQoBMRNSqHyPjP7PJqa6dUVhEGP2jS0Cq8qWgyfkyfQpjmN23JuNcKfFbAxx6rol95ZNS7Y4fLlndkYg1aMJdIlIIPZIx+tSVImwQI4pqDoEQtqSVduS3mNRrZEJO34FKlWKUTrea8zSL0uVzTiDvB5oaZTzeXMOMTXDlY/eO2a2he6/m5i8cLA8IUctzmecvzXPwvZx/GtLSxyP1Qgaw1bpe9xdgZatm9==; expires=Mon, 01-Jun-2020 00:29:46 GMT; path=/; domain=.bluekai.com; SameSite=None; Secure bku=VuQO9wg28klaKrAI; expires=Mon, 01-Jun-2020 00:29:46 GMT; path=/; domain=.bluekai.com; SameSite=None; Secure
eu
service.cmp.oath.com/cmp/v0/location/
15 B
238 B
XHR
General
Full URL
https://service.cmp.oath.com/cmp/v0/location/eu
Requested by
Host: consent.cmp.oath.com
URL: https://consent.cmp.oath.com/cmp3p.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2606:2800:135:155a:23ba:b2a:25ff:122d , United States, ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US),
Reverse DNS
Software
ECD (fcn/409E) /
Resource Hash
39d160e97e2bea07b0cf1c647259ffa4f0bd07069dba4e6c19a22d38b408510f
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'none'
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Frame-Options SAMEORIGIN

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk

Response headers

content-security-policy
frame-ancestors 'none'
server
ECD (fcn/409E)
status
200
date
Wed, 04 Dec 2019 00:29:46 GMT
x-frame-options
SAMEORIGIN
content-type
application/json
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
strict-transport-security
max-age=31536000; includeSubDomains; preload
set.json
disqus.com/api/3.0/threads/
5 KB
6 KB
XHR
General
Full URL
https://disqus.com/api/3.0/threads/set.json?api_key=nsFBMiU40JsQJzkYtRRyqhkAoKj5ejiEiyPtLVUe4kIkVTlfEUbtsHASjoGnDRgh&forum=gizmodouk&thread%5B%5D=link%3Ahttps%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&thread%5B%5D=link%3Ahttps%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&thread%5B%5D=link%3Ahttps%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F12%2Fthe-philips-hue-sync-box-turned-my-living-room-into-a-whirlwind-of-colour%2F&thread%5B%5D=link%3Ahttps%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F12%2Fone-word-to-mute-on-twitter-every-day-until-christmas%2F&thread%5B%5D=link%3Ahttps%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Flego-1989-batmobile-review-has-its-problems-but-definitely-worth-it%2F&thread%5B%5D=link%3Ahttps%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fstar-wars-galaxys-edge-is-almost-too-alien-for-its-own-good%2F&_=1575419385760
Requested by
Host: gmg.futurecdn.net
URL: https://gmg.futurecdn.net/gizmodo/media/scripts/master.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
2b089c83f04be35e862d688d0305c7e72cb895b5f6d948ae71bf8b69a4ec3580
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:46 GMT
X-Content-Type-Options
nosniff
Server
nginx
Age
0, 0
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=300; includeSubdomains
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Access-Control-Allow-Origin
https://www.gizmodo.co.uk
Access-Control-Expose-Headers
Last-Modified
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Vary
Origin, Cookie
Content-Length
5153
X-XSS-Protection
1; mode=block
/
graph.facebook.com/
129 B
584 B
XHR
General
Full URL
https://graph.facebook.com/?id=https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/&_=1575419385761
Requested by
Host: gmg.futurecdn.net
URL: https://gmg.futurecdn.net/gizmodo/media/scripts/master.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:800e:face:b00c:0:2 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
ab3def96c81e37702a6f34c5730846564c7da4aa3f5b2a8feab360ffafd97309
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; preload

Request headers

Accept
*/*
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=15552000; preload
etag
"700ac6543175f4daf8dc40e4c94552d3ae908ebf"
x-app-usage
{"call_count":0,"total_cputime":0,"total_time":0}
status
200
x-fb-rev
1001489394
alt-svc
h3-23=":443"; ma=3600
content-length
129
pragma
no-cache
x-fb-debug
Bvb99dJ5cIRlcI/fJtcNfOBZuzSNWbfQqON7j9UggA21bJkZ08Lx2MpL+RE/KxNXl8O2NrTeetvUTQ+aoAaovw==
x-fb-trace-id
GiVlu3jPWmG
date
Wed, 04 Dec 2019 00:29:46 GMT
content-type
application/json; charset=UTF-8
access-control-allow-origin
*
x-fb-request-id
ARyYU6DCHlF1aAVfPSXapuZ
cache-control
private, no-cache, no-store, must-revalidate
facebook-api-version
v2.11
expires
Sat, 01 Jan 2000 00:00:00 GMT
j5tw53lghntq49hrindx-620x349.jpg
media.gizmodo.co.uk/wp-content/uploads/2019/11/
34 KB
34 KB
Image
General
Full URL
https://media.gizmodo.co.uk/wp-content/uploads/2019/11/j5tw53lghntq49hrindx-620x349.jpg
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.59 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif04.web.future.net.uk
Software
/
Resource Hash
269486606b7a861d1e8f0939ef6c33f7d145edde7b42816a5d328c0707cbc215

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:46 GMT
Last-Modified
Thu, 07 Nov 2019 20:20:26 GMT
X-FTR-Backend-Server
legacyphpweb05
Access-Control-Allow-Methods
GET
Content-Type
image/jpeg
Access-Control-Allow-Origin
*
X-FTR-DC
IX
X-FTR-Request-ID
00000000:A72C_00000000:01BB_5DE6FDF9_6DA3:12C0
Access-Control-Allow-Credentials
true
X-FTR-Realm
pip
X-FTR-Backend
gizmodo-cms
Accept-Ranges
bytes
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
Content-Length
34711
X-FTR-Balancer
webproxyprodred
collect
www.google-analytics.com/
35 B
102 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=1301473728&t=pageview&_s=1&dl=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&ul=en-us&de=UTF-8&dt=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&sd=24-bit&sr=1600x1200&vp=1585x1200&je=0&_u=IGBAgEAB~&jid=520861388&gjid=1874640761&cid=388745368.1575419386&tid=UA-48457802-2&_gid=987689776.1575419386&cd1=article&cd2=ring&cd3=ring&cd4=10518929%2Ftech_gizmodo%2Farticle&cd5=880188-a&cd6=ring%7Camazon&cd7=whitney_kimball&cd8=08-11-2019&cd9=1&cd34=ring%7Camazon&z=1245045928
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 28 Nov 2019 19:53:35 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
448571
content-type
image/gif
status
200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate
access-control-allow-origin
*
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&v=1&_v=j79&tid=UA-48457802-2&cid=388745368.1575419386&jid=520861388&gjid=1874640761&_gid=987689776.1575419386&_u=IGBAgEAB~&z=1858852924
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=520861388&_v=j79&z=1858852924
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=520861388&_v=j79&z=1858852924&slf_rd=1&random=411557566
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=520861388&_v=j79&z=1858852924&slf_rd=1&random=411557566
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 04 Dec 2019 00:29:46 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 04 Dec 2019 00:29:46 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=520861388&_v=j79&z=1858852924&slf_rd=1&random=411557566
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
230404523817416
connect.facebook.net/signals/config/
349 KB
85 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/230404523817416?v=2.9.14&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
79e3c6d6a338ef802d9239af1a3f789101fe57d512e3571a70de6f70b4334b37
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
86995
x-xss-protection
0
pragma
public
x-fb-debug
8+4jc1ZgULPPAqksheIe9FxZBUCb6DS7AFuQDxy8Xn5elkmRQdDlpg+FMpGJPHw8QoQdwavfaDxmgHETFEHxzA==
x-fb-trip-id
2000377899
date
Wed, 04 Dec 2019 00:29:46 GMT
x-frame-options
DENY
content-type
application/x-javascript; charset=utf-8
vary
Accept-Encoding
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
b
sb.scorecardresearch.com/
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b?c1=2&c2=10055482&cs_ucfr=&ns__t=1575419386074&ns_c=UTF-8&cv=3.1e&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c9=
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 04 Dec 2019 00:29:46 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
services.js
js.gumgum.com/
88 KB
34 KB
XHR
General
Full URL
https://js.gumgum.com/services.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.111 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-111.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
1b0792243c4a1a65e7bb757391063578324e0d16a30031549b96ebcb6c31d8a3

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
null

Response headers

date
Wed, 04 Dec 2019 00:29:47 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin
x-amz-cf-pop
FRA2-C1
x-cache
Miss from cloudfront
status
200
x-amz-meta-version
3.20.3
x-amz-meta-timing-allow-origin
*
x-amz-meta-access-control-allow-origin
*
access-control-allow-origin
*
last-modified
Mon, 25 Nov 2019 20:00:11 GMT
server
AmazonS3
access-control-max-age
3000
access-control-allow-methods
GET
x-amz-version-id
NoWZgOptiG1fi6wn949oJtA8MBlubfGi
via
1.1 d7e55181ad8192e74c103c6003cd4d9c.cloudfront.net (CloudFront)
cache-control
max-age=7200
content-type
application/javascript
x-amz-cf-id
egpHZWfPAckDw_2dxOO7ruqKg3sp32ViUphySuJE5kmb4TvJv1oZSg==
cmpui.html
consent.cmp.gizmodo.co.uk/ Frame 66FF
502 B
817 B
Document
General
Full URL
https://consent.cmp.gizmodo.co.uk/cmpui.html
Requested by
Host: consent.cmp.oath.com
URL: https://consent.cmp.oath.com/cmp3p.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
df0c12742c43417ba9d49ac3bb45a9a8ffc404e5b8c78f6cb15966190f21030a
Security Headers
Name Value
Content-Security-Policy frame-ancestors *.gizmodo.co.uk *.futureplc.engineering preview.vanilla.tools;

Request headers

Host
consent.cmp.gizmodo.co.uk
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
same-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Accept-Encoding
gzip, deflate, br
Cookie
_ga=GA1.3.388745368.1575419386; _gid=GA1.3.987689776.1575419386; _gat=1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/

Response headers

Date
Wed, 04 Dec 2019 00:29:46 GMT
Content-Type
text/html; charset=utf-8
Transfer-Encoding
chunked
Last-Modified
Thu, 14 Nov 2019 15:15:15 GMT
ETag
W/"5dcd6f83-1f6"
Content-Security-Policy
frame-ancestors *.gizmodo.co.uk *.futureplc.engineering preview.vanilla.tools;
Content-Encoding
gzip
X-FTR-Request-ID
00000000:AA66_00000000:01BB_5DE6FDFA_17A8C:7F57
X-FTR-Realm
pip
X-FTR-DC
IX
X-FTR-Balancer
webproxyprod01
X-FTR-Backend
van-prod
X-FTR-Backend-Server
http.van-prod
1481103489249.js
impl.onscroll.com/engaged-refresh/2016/12/
7 KB
7 KB
Script
General
Full URL
https://impl.onscroll.com/engaged-refresh/2016/12/1481103489249.js
Requested by
Host: tags.onscroll.com
URL: https://tags.onscroll.com/32529e0e-557a-462d-85a0-98003fd62f78/tag.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.9 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-9.fra50.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
e1fa0d75de58b4c8e1e48cbdd713e3a9068c4262db21164989d28de56f29eab5

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 20:07:11 GMT
Content-Encoding
utf8
Last-Modified
Wed, 07 Dec 2016 09:37:37 GMT
Server
AmazonS3
Age
15756
ETag
"0061ceb983244e0935ed73ed5928f059"
X-Cache
Hit from cloudfront
Content-Type
text/javascript
Via
1.1 f6c241b75ae7d21ac836339454ab90b8.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50-C1
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
6815
X-Amz-Cf-Id
4Peii5OVSST-vdJu2f_R3R8Z6ppTdvvgHCpne5Fp9oPLQ9yvgVSUxQ==
/
www.facebook.com/tr/
44 B
247 B
Image
General
Full URL
https://www.facebook.com/tr/?id=230404523817416&ev=PageView&dl=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&rl=&if=false&ts=1575419386184&sw=1600&sh=1200&v=2.9.14&r=stable&ec=0&o=30&fbp=fb.2.1575419386183.954407815&it=1575419386070&coo=false&rqm=GET
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:46 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Wed, 04 Dec 2019 00:29:46 GMT
lounge.953a2bd009935f47a8e815c3ee2bfc5a.css
c.disquscdn.com/next/embed/styles/
0
21 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/styles/lounge.953a2bd009935f47a8e815c3ee2bfc5a.css
Requested by
Host: gizmodouk.disqus.com
URL: https://gizmodouk.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
600434
cf-ray
53f9aafbbe8e8c6e-VIE
status
200
vary
Accept-Encoding
content-length
21493
x-xss-protection
1; mode=block
last-modified
Wed, 02 Oct 2019 01:07:45 GMT
server
cloudflare
etag
"5d93f861-53f5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=300; includeSubdomains
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 01 Oct 2020 01:12:47 GMT
common.bundle.5f8b92104a5a7633e982c8a37c2b8c8e.js
c.disquscdn.com/next/embed/
0
89 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/common.bundle.5f8b92104a5a7633e982c8a37c2b8c8e.js
Requested by
Host: gizmodouk.disqus.com
URL: https://gizmodouk.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
857327
cf-ray
53f9aafbbe908c6e-VIE
status
200
vary
Accept-Encoding
content-length
90527
x-xss-protection
1; mode=block
last-modified
Sun, 24 Nov 2019 01:47:57 GMT
server
cloudflare
etag
"5dd9e14d-1619f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=300; includeSubdomains
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
expires
Mon, 23 Nov 2020 02:20:57 GMT
lounge.bundle.ab05c2323d22a58cd2266f3e2cf4a6fc.js
c.disquscdn.com/next/embed/
0
108 KB
Other
General
Full URL
https://c.disquscdn.com/next/embed/lounge.bundle.ab05c2323d22a58cd2266f3e2cf4a6fc.js
Requested by
Host: gizmodouk.disqus.com
URL: https://gizmodouk.disqus.com/embed.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:4ea6 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
cf-cache-status
HIT
age
7773
cf-ray
53f9aafbbe918c6e-VIE
status
200
vary
Accept-Encoding
content-length
109939
x-xss-protection
1; mode=block
last-modified
Tue, 03 Dec 2019 20:00:05 GMT
server
cloudflare
etag
"5de6bec5-1ad73"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=300; includeSubdomains
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31536000, public, immutable, no-transform
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 02 Dec 2020 21:41:05 GMT
config.js
disqus.com/next/
0
3 KB
Other
General
Full URL
https://disqus.com/next/config.js
Requested by
Host: gizmodouk.disqus.com
URL: https://gizmodouk.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:46 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Age
57
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Connection
keep-alive
Content-Length
2253
X-XSS-Protection
1; mode=block
Server
nginx
X-Frame-Options
SAMEORIGIN
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
Content-Type
application/javascript; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
public, stale-while-revalidate=300, s-stalewhilerevalidate=3600, max-age=60
Timing-Allow-Origin
*
cmpui.js
consent.cmp.gizmodo.co.uk/ Frame 66FF
310 KB
93 KB
Script
General
Full URL
https://consent.cmp.gizmodo.co.uk/cmpui.js
Requested by
Host: consent.cmp.gizmodo.co.uk
URL: https://consent.cmp.gizmodo.co.uk/cmpui.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
6fc257cd39bb3ea6ba8058e29307e76fb5fd3f2d0b38a2018e71aa580adf6239
Security Headers
Name Value
Content-Security-Policy frame-ancestors *.gizmodo.co.uk *.futureplc.engineering preview.vanilla.tools;

Request headers

Referer
https://consent.cmp.gizmodo.co.uk/cmpui.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:46 GMT
Content-Encoding
gzip
Last-Modified
Thu, 14 Nov 2019 15:15:15 GMT
ETag
W/"5dcd6f83-4d743"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
X-FTR-Backend-Server
http.van-prod
X-FTR-DC
IX
X-FTR-Request-ID
00000000:AA66_00000000:01BB_5DE6FDFA_17A8F:7F57
Transfer-Encoding
chunked
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Content-Security-Policy
frame-ancestors *.gizmodo.co.uk *.futureplc.engineering preview.vanilla.tools;
X-FTR-Balancer
webproxyprod01
cmpui.css
consent.cmp.gizmodo.co.uk/ Frame 66FF
207 KB
13 KB
Stylesheet
General
Full URL
https://consent.cmp.gizmodo.co.uk/cmpui.css
Requested by
Host: consent.cmp.gizmodo.co.uk
URL: https://consent.cmp.gizmodo.co.uk/cmpui.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
894f6f213a22bf25f94d2df700369da7792ee386318377784fc8710b9553f650
Security Headers
Name Value
Content-Security-Policy frame-ancestors *.gizmodo.co.uk *.futureplc.engineering preview.vanilla.tools;

Request headers

Referer
https://consent.cmp.gizmodo.co.uk/cmpui.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:46 GMT
Content-Encoding
gzip
Last-Modified
Thu, 14 Nov 2019 15:15:15 GMT
ETag
W/"5dcd6f83-33dab"
Vary
Accept-Encoding
Content-Type
text/css
X-FTR-Backend-Server
http.van-prod
X-FTR-DC
IX
X-FTR-Request-ID
00000000:AA80_00000000:01BB_5DE6FDFA_7D4C:7F54
Transfer-Encoding
chunked
X-FTR-Realm
pip
X-FTR-Backend
van-prod
Content-Security-Policy
frame-ancestors *.gizmodo.co.uk *.futureplc.engineering preview.vanilla.tools;
X-FTR-Balancer
webproxyprod01
en-GB.json
widgets.future-fie.co.uk/json/
19 KB
7 KB
Fetch
General
Full URL
https://widgets.future-fie.co.uk/json/en-GB.json
Requested by
Host: widgets.future-fie-assets.co.uk
URL: https://widgets.future-fie-assets.co.uk/js/w/giz.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.52 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif13.web.future.net.uk
Software
/
Resource Hash
23f13b7db5833db10e6aa23740528c75afc8880667f8a5a2769eb52549be3db7

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk

Response headers

Date
Wed, 04 Dec 2019 00:12:55 GMT
Content-Encoding
gzip
X-Hawk-Country
Xkey
asset-type-fie-widgets
Age
1011
X-Hawk-Area
DE
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-assets
X-FTR-Cache-Status
HIT
Content-Length
6245
X-FTR-Expires
Wed, 04 Dec 2019 00:32:55 GMT
X-FTR-Balancer
hawk-proxy-185-113-25-36
X-FTR-Request-ID
00000000:BFB2_00000000:01BB_5DE6FDFA_7DDF4:507B
Last-Modified
Thu, 28 Nov 2019 13:25:52 GMT
X-Country-Code-Real
DE
ETag
"5ddfcae0-4cf7"
Vary
Accept-Encoding
Content-Type
application/json
X-FTR-Backend-Server
fievarnishprodred
Cache-Control
max-age=300,public
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Expires
Wed, 04 Dec 2019 00:34:46 GMT
/
disqus.com/embed/comments/ Frame B355
0
0
Document
General
Full URL
https://disqus.com/embed/comments/?base=default&f=gizmodouk&t_u=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&t_d=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door&t_t=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door&s_o=default
Requested by
Host: gizmodouk.disqus.com
URL: https://gizmodouk.disqus.com/embed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.0.134 , United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
Content-Security-Policy script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Strict-Transport-Security max-age=300; includeSubdomains
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
disqus.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
nested-navigate
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/

Response headers

Server
nginx
Content-Security-Policy
script-src https://*.twitter.com:* https://www.gstatic.com/recaptcha/ https://a.disquscdn.com https://c.disquscdn.com c.disquscdn.com https://*.services.disqus.com:* https://cdn.boomtrain.com/p13n/ 'unsafe-inline' https://cdn.syndication.twimg.com/tweets.json https://connect.facebook.net/en_US/sdk.js https://referrer.disqus.com/juggler/ https://apis.google.com https://www.google.com/recaptcha/ https://disqus.com
Link
<https://c.disquscdn.com>;rel=preconnect,<https://c.disquscdn.com>;rel=dns-prefetch
Cache-Control
stale-if-error=3600, s-stalewhilerevalidate=3600, stale-while-revalidate=30, no-cache, must-revalidate, public, s-maxage=5
p3p
CP="DSP IDC CUR ADM DELi STP NAV COM UNI INT PHY DEM"
Timing-Allow-Origin
*
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Type
text/html; charset=utf-8
Last-Modified
Tue, 12 Nov 2019 15:39:23 GMT
ETag
W/"lounge:view:7710350450.d16401661f41b726afc9923d266b1b2e.2"
Content-Encoding
gzip
Content-Length
2759
Date
Wed, 04 Dec 2019 00:29:46 GMT
Age
24
Connection
keep-alive
Vary
Accept-Encoding
Strict-Transport-Security
max-age=300; includeSubdomains
services
g2.gumgum.com/zones/04728e3b/
618 B
759 B
XHR
General
Full URL
https://g2.gumgum.com/zones/04728e3b/services?dp=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&pu=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&ogu=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&rf=&r=3.20.3&jcsi=%7B%22t%22%3A0%2C%22rq%22%3A2%2C%22ren%22%3A2%2C%22fc%22%3A0%2C%22ctx%22%3A%5B2%5D%7D&ns=10240&bf=dd1425b44f9b167d4d43d2453c479e9a267ee3c8&ce=true&fs=false&dpr=1&sch=1200&scw=1600&lt=1575419386366&to=-60&vpii=false&vph=1200&vpw=1600
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.213.7.200 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-213-7-200.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
35a9c601a799db467b9999e1586a7324d6b964d41b7c59e27850994aaa5d5ad1

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk

Response headers

date
Wed, 04 Dec 2019 00:29:46 GMT
content-encoding
gzip
server
nginx
p3p
CP="This is not a P3P policy"
status
200
content-type
application/json;charset=UTF-8
access-control-allow-origin
https://www.gizmodo.co.uk
access-control-allow-credentials
true
timing-allow-origin
*
truncated
/ Frame 66FF
23 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9a041e17b2cae581d0817debdc63ae98ba959b6177d414b0c8939e07da5099fd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/svg+xml
vendorlist.json
vendorlist.consensu.org/ Frame 66FF
92 KB
17 KB
XHR
General
Full URL
https://vendorlist.consensu.org/vendorlist.json
Requested by
Host: consent.cmp.gizmodo.co.uk
URL: https://consent.cmp.gizmodo.co.uk/cmpui.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2156:f000:1:af78:4c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
87cbeab00a06ecdea6d059473f8223197b3e2e70c7023e50279a210de90815aa

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://consent.cmp.gizmodo.co.uk/cmpui.html
Origin
https://consent.cmp.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sun, 01 Dec 2019 07:15:13 GMT
content-encoding
gzip
vary
Accept-Encoding,Origin,Access-Control-Request-Headers,Access-Control-Request-Method
age
234874
x-cache
Hit from cloudfront
status
200
access-control-allow-origin
*
last-modified
Thu, 28 Nov 2019 16:00:26 GMT
server
AmazonS3
access-control-max-age
604800
access-control-allow-methods
GET
x-amz-version-id
s.mE4yKhUZITOXBYWuTuGEw4Fxd4sD4L
via
1.1 5f6905ea282e042ad3334bfed8a840ce.cloudfront.net (CloudFront)
cache-control
max-age=604800
x-amz-cf-pop
FRA50-C1
content-type
application/json; charset=utf-8
x-amz-cf-id
LMV5HuSrKCVEDubo_mwx0KAJhWJR04EU2FX13jve2kPEjLV0DfEoSg==
pubvendors.json
www.gizmodo.co.uk/ Frame 66FF
7 KB
1 KB
XHR
General
Full URL
https://www.gizmodo.co.uk/pubvendors.json
Requested by
Host: consent.cmp.gizmodo.co.uk
URL: https://consent.cmp.gizmodo.co.uk/cmpui.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.60 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif03.web.future.net.uk
Software
/
Resource Hash
80193fce734417b977d9b4e272c6d0a86dc4d7181f841281abaf93788337966f

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://consent.cmp.gizmodo.co.uk/cmpui.html
Origin
https://consent.cmp.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 03 Dec 2019 17:07:52 GMT
Content-Encoding
gzip
Age
26513
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
www-live-sites-varnish
X-FTR-Cache-Status
HIT
Content-Length
736
X-FTR-Expires
Wed, 04 Dec 2019 17:07:52 GMT
X-FTR-Balancer
webproxyprod01
X-FTR-Request-ID
00000000:AA98_00000000:01BB_5DE6FDFA_A7F9:7F55
Last-Modified
Tue, 11 Jun 2019 04:22:44 GMT
X-Country-Code-Real
DE
ETag
"5cff2c94-1d18"
Vary
Accept-Encoding
Content-Type
application/json
X-FTR-Backend-Server
ftevarnishprodgreen
Cache-Control
max-age=300,public
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
X-Country-Code
GB
Expires
Wed, 04 Dec 2019 00:34:46 GMT
futureplc-electronics_tag.js
d3ezl4ajpp2zy8.cloudfront.net/
0
0

truncated
/ Frame 66FF
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c6a088728ab5755512c945163c1e802c54ae682a3d34b8d96cabfc754811ec68

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Type
image/png
stat.gif
referrer.disqus.com/juggler/
43 B
295 B
Image
General
Full URL
https://referrer.disqus.com/juggler/stat.gif?event=cmp.present
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.134 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:46 GMT
X-Content-Type-Options
nosniff
Last-Modified
Mon, 28 Sep 1970 06:00:00 GMT
Server
nginx
Content-Type
image/gif
Connection
keep-alive
Content-Length
43
X-XSS-Protection
1; mode=block
/
www.facebook.com/tr/
0
85 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundary44yuRIQw5K1GIu7G

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
access-control-allow-origin
https://www.gizmodo.co.uk
date
Wed, 04 Dec 2019 00:29:46 GMT
content-type
text/plain
status
200
access-control-allow-credentials
true
alt-svc
h3-23=":443"; ma=3600
content-length
0
merchant-domains.php
search-api.fie.future.net.uk/
135 KB
30 KB
Fetch
General
Full URL
https://search-api.fie.future.net.uk/merchant-domains.php?site=GIZ
Requested by
Host: gizmos.future-fie.co.uk
URL: https://gizmos.future-fie.co.uk/hl/hawklinks.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_CBC
Server
185.113.25.53 , United Kingdom, ASN20596 (FUTURE, GB),
Reverse DNS
vif10.web.future.net.uk
Software
/
Resource Hash
ab1294b401f4022ccbf4cbec6e027bd9bb62e1563f87f5f0c6490c57de6bde21

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk

Response headers

Date
Wed, 04 Dec 2019 00:20:32 GMT
Content-Encoding
gzip
X-Hawk-Country
Age
554
X-Hawk-Area
DE
X-FTR-DC
IX
X-FTR-Realm
pip
X-FTR-Backend
fie-api
X-FTR-Cache-Status
HIT
Content-Length
29504
X-FTR-Expires
Wed, 04 Dec 2019 00:40:32 GMT
X-FTR-Balancer
hawkproxyprodblue
X-FTR-Request-ID
00000000:A72A_00000000:01BB_5DE6FDFB_7BE42:0471
X-Country-Code-Real
DE
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/json; charset=utf-8;
X-FTR-Backend-Server
fievarnishprodred
Cache-Control
max-age=300,public
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,X-Hawk-Country,X-Hawk-Area
Expires
Wed, 04 Dec 2019 00:34:47 GMT
/
r.skimresources.com/api/
145 B
397 B
Fetch
General
Full URL
https://r.skimresources.com/api/?persistence=1&xguid=01BT2SNRZKMTD96W8181AS0KKC&data={%22pubcode%22:%2292X791464%22,%22domains%22:[%22%22,%22gizmodo.co.uk%22,%22twitter.com%22,%22facebook.com%22,%22google.com%22,%22bitdefender.com%22,%22gizmodo.com%22,%22pcmag.com%22,%22theverge.com%22,%22buzzfeednews.com%22,%22gizmodo.fr%22,%22gizmodo.de%22,%22gizmodo.it%22,%22gizmodo.es%22,%22gizmodo.pl%22,%22gizmodo.jp%22,%22gizmodo.com.au%22,%22gizmodo.com.br%22,%22lifehacker.co.uk%22,%22kotaku.co.uk%22,%22techradar.com%22,%22feedburner.com%22],%22page%22:%22https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F%22}&checksum=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Requested by
Host: gizmos.future-fie.co.uk
URL: https://gizmos.future-fie.co.uk/hl/hawklinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
88484cc337cd67aeeef84ed2f06e0a0564d2d1db93259d9b66b2bb757df06636
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk

Response headers

date
Wed, 04 Dec 2019 00:29:47 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.gizmodo.co.uk
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
ga-audiences
www.google.de/ads/
Redirect Chain
  • https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1301473728&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-...
  • https://stats.g.doubleclick.net/r/collect?v=1&aip=1&t=dc&_r=3&tid=UA-48457802-2&cid=388745368.1575419386&jid=827373286&_gid=987689776.1575419386&gjid=997432434&_v=j79&z=1742963512
  • https://www.google.com/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=827373286&_v=j79&z=1742963512
  • https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=827373286&_v=j79&z=1742963512&slf_rd=1&random=2760050984
42 B
109 B
Image
General
Full URL
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=827373286&_v=j79&z=1742963512&slf_rd=1&random=2760050984
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 04 Dec 2019 00:29:48 GMT
x-content-type-options
nosniff
content-type
image/gif
server
cafe
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
cache-control
no-cache, no-store, must-revalidate
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
42
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Redirect headers

pragma
no-cache
date
Wed, 04 Dec 2019 00:29:48 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
location
https://www.google.de/ads/ga-audiences?v=1&aip=1&t=sr&_r=4&tid=UA-48457802-2&cid=388745368.1575419386&jid=827373286&_v=j79&z=1742963512&slf_rd=1&random=2760050984
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
302
cache-control
no-cache, no-store, must-revalidate
content-type
text/html; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
p2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=8&c2=15039634&c3=9&c4=04728e3b&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door...
  • https://sb.scorecardresearch.com/p2?c1=8&c2=15039634&c3=9&c4=04728e3b&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-doo...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=8&c2=15039634&c3=9&c4=04728e3b&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c9=&cv=2.0&cj=1&ns__t=1575419390070
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 04 Dec 2019 00:29:50 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Expires
Mon, 01 Jan 1990 00:00:00 GMT
Connection
keep-alive
Content-Length
43
Content-Type
image/gif

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=8&c2=15039634&c3=9&c4=04728e3b&c7=https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F&c8=Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%20%7C%20Gizmodo%20UK&c9=&cv=2.0&cj=1&ns__t=1575419390070
Pragma
no-cache
Date
Wed, 04 Dec 2019 00:29:50 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
digitrust.min.js
cdn.digitru.st/prod/1/
40 KB
11 KB
Script
General
Full URL
https://cdn.digitru.st/prod/1/digitrust.min.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
159.180.84.2 , United States, ASN33047 (INSTART - Instart Logic, Inc, US),
Reverse DNS
Software
DTOrigin /
Resource Hash
26ca840c9d02b5b4c1013bf1e2371ff3e04dea1fb2dc7b60cc7d21345359938d

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 10:37:07 GMT
content-encoding
gzip
last-modified
Mon, 23 Sep 2019 14:27:17 GMT
server
DTOrigin
access-control-allow-origin
*
etag
"651f6d3b36aa4bd56fedba685427757f"
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
status
200
cache-control
max-age=86400
x-instart-request-id
15483726667250555703:SEN01-CPVNPPRY16:1575419390:0
x-instart-cache-id
5:6566024674838611952::1575369426
accept-ranges
bytes
content-type
application/javascript
content-length
11230
expires
Wed, 04 Dec 2019 10:37:07 GMT
dt.html
cdn.digitru.st/prod/1.5.37/ Frame A5B7
0
0
Document
General
Full URL
https://cdn.digitru.st/prod/1.5.37/dt.html
Requested by
Host: cdn.digitru.st
URL: https://cdn.digitru.st/prod/1/digitrust.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
159.180.84.2 , United States, ASN33047 (INSTART - Instart Logic, Inc, US),
Reverse DNS
Software
DTOrigin /
Resource Hash

Request headers

:method
GET
:authority
cdn.digitru.st
:scheme
https
:path
/prod/1.5.37/dt.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
sec-fetch-mode
nested-navigate
referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/

Response headers

status
200
content-type
text/html
content-length
1303
expires
Wed, 04 Dec 2019 10:37:07 GMT
last-modified
Mon, 23 Sep 2019 14:27:17 GMT
cache-control
max-age=86400
content-encoding
gzip
date
Tue, 03 Dec 2019 10:37:07 GMT
accept-ranges
bytes
etag
"f62ec59165fc2a53f53d87b7d3f33f50"
x-instart-cache-id
6:425810947478441497::1575369426
x-instart-request-id
7542806521073583079:SEN01-CPVNPPRY16:1575419390:0
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
*
server
DTOrigin
quant.js
secure.quantserve.com/ Frame AECF
12 KB
6 KB
Script
General
Full URL
https://secure.quantserve.com/quant.js
Requested by
Host: www.gizmodo.co.uk
URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.228.74.184 , United Kingdom, ASN27281 (QUANTCAST - Quantcast Corporation, US),
Reverse DNS
Software
QS /
Resource Hash
404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 04 Dec 2019 00:29:50 GMT
Content-Encoding
gzip
Last-Modified
Wed, 04-Dec-2019 00:29:50 GMT
Server
QS
ETag
M0-e2b9884a
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=604800
Connection
keep-alive
Content-Length
5456
Expires
Wed, 11 Dec 2019 00:29:50 GMT
digitrust
g2.gumgum.com/visitor/
35 B
237 B
Image
General
Full URL
https://g2.gumgum.com/visitor/digitrust?dti=diATGt8ykm%2FBvak%2BleiCo6h4kCCtALwU%2BI62OxsELv3Tt45Wi3FMachM4FLyNLwn3phNAYcgtWu81g3KQ2q5KAYR6rbIkTRpAfCei6%2Bz3HEOtJ4IQgsdg6eMHAWYQSg9aH%2FTQ0VkJhgWmks2B2ukPeEPv5oVafnpD%2Bz%2BYdLJC0LILh4wfmwGFqDRJIx5gTLej9ejGK1tNcomwamI6Ai2eNv0G67rMm5ZaZuQyiwxmuYIGfF%2FCb1vA3YrlOJ1d37DsgqRwGt0YuRWP0PGSTXHf0mwuMUZgnll7xxsh%2Bnok1EsGxQ9f8decKIZ1lgd3c3y4w%2FGLJNaSsPHtvHZg8q5OA%3D%3D&dtk=4&domain=www.gizmodo.co.uk
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.213.7.200 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-213-7-200.eu-west-1.compute.amazonaws.com
Software
nginx /
Resource Hash
6adc3d4c1056996e4e8b765a62604c78b1f867cceb3b15d0b9bedb7c4857f992

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 04 Dec 2019 00:29:50 GMT
server
nginx
p3p
CP="This is not a P3P policy"
content-type
image/gif;charset=UTF-8
status
200
cache-control
private, no-store, must-revalidate, max-age=0
timing-allow-origin
*
content-length
35
expires
0
rules-p-00TsOkvHvnsZU.js
rules.quantcount.com/ Frame AECF
3 B
359 B
Script
General
Full URL
https://rules.quantcount.com/rules-p-00TsOkvHvnsZU.js
Requested by
Host: secure.quantserve.com
URL: https://secure.quantserve.com/quant.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:5800:6:44e3:f8c0:93a1 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 03 Dec 2019 19:54:22 GMT
via
1.1 37c215a6cf8b04439db2f97a633421e6.cloudfront.net (CloudFront)
last-modified
Sat, 04 Mar 2017 19:30:30 GMT
server
AmazonS3
age
16529
etag
"8a80554c91d9fca8acb82f023de02f11"
x-cache
Hit from cloudfront
content-type
application/x-javascript
status
200
cache-control
max-age=86400
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
3
x-amz-cf-id
pKOjotEztRBwkPXmrUVRZHhg3GVbTxdeUXvHLyR7NB5BUlZG4vFu8g==
perf
trc.taboola.com/futureplc-gizmodo/log/3/
0
367 B
XHR
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/perf?lti=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

x-vcl-time-ms
10
date
Wed, 04 Dec 2019 00:29:55 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.912123,VS0,VE10
content-type
image/gif
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
json
trc.taboola.com/futureplc-gizmodo/trc/3/
21 KB
8 KB
Script
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/trc/3/json?tim=01%3A29%3A56.048&lti=enc-img-3-vB&data=%7B%22id%22%3A335%2C%22ii%22%3A%22%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-1839697255%22%2C%22it%22%3A%22text%22%2C%22sd%22%3Anull%2C%22ui%22%3Anull%2C%22uifp%22%3Anull%2C%22vi%22%3A1575419395905%2C%22cv%22%3A%2220191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT%22%2C%22uiv%22%3A%22default%22%2C%22u%22%3A%22https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F%22%2C%22bv%22%3A%220%22%2C%22ul%22%3A%5B%22en-US%22%5D%2C%22pev%22%3A1410%2C%22cmps%22%3A1%2C%22ga%22%3Atrue%2C%22cdb%22%3A%22BOWteJlOWteJlCEABBAAABAAAAAMgAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAA%22%2C%22gwto%22%3Atrue%2C%22btv%22%3A%220%22%2C%22cos%22%3A%224g%22%2C%22bad%22%3A-1%2C%22sw%22%3A1600%2C%22sh%22%3A1200%2C%22bw%22%3A1600%2C%22sde%22%3A%221.000%22%2C%22bh%22%3A1200%2C%22dw%22%3A1585%2C%22dh%22%3A3124%2C%22nsid%22%3A%22futureplc-network%22%2C%22r%22%3A%5B%7B%22li%22%3A%22rbox-t2m%22%2C%22s%22%3A3%2C%22uim%22%3A%22thumbs-1r%3Apub%3Dfutureplc-network%3Aabp%3D0%22%2C%22uip%22%3A%22Below%20Article%20Thumbnails%22%2C%22orig_uip%22%3A%22Below%20Article%20Thumbnails%22%2C%22cd%22%3A2139.484375%2C%22mw%22%3A613.3125%7D%5D%2C%22cb%22%3A%22TRC.callbacks.recommendations_1%22%2C%22lt%22%3A%22enc-img-3-vB%22%7D
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
c639ef1b027786939b8ad48d218c8dfe87c59c09cc667e521ee33cbe4ed59efa

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-vcl-time-ms
154
date
Wed, 04 Dec 2019 00:29:56 GMT
content-encoding
gzip
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
200
via
1.1 varnish
x-served-by
cache-fra19131-FRA
server
nginx
x-timer
S1575419396.055080,VS0,VE154
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
tb
15.taboola.com/
0
89 B
Script
General
Full URL
https://15.taboola.com/tb?oid=15&pubnm=futureplc-gizmodo&unitType=244&tbloc=&pageType=text&pstn=Below%20Article%20Thumbnails&uuip=Feed%20-%20Below%20Article%20Thumbnails&cisrf=&cirf=https%3A%2F%2Fgizmodo.com%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-1839697255&encoded=1&uid=null&variant=-100|986&callback=TRC.videoTagCallbacks.videoCallback1&cb=1575419396214&tagid=&cntry=DE&platform=1&sesid=a8110a33985ac08030b5379b14749139&itemid=/vulnerability-in-ring-doorbells-left-the-door-open-for-1839697255&viewid=1575419395905&geolat=&geoing=&deviceifa=&appid=&sd=&ri=772ed186888e4f27ff35710b54d208d1&appname=&cdb=BOWteJlOWteJlCEABBAAABAAAAAMgAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAA&gdprApplies=true&rid=&sii=-1374754874495935395&oee=true&tpubid=1009888
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.49 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
server
nginx
x-timer
S1575419396.220548,VS0,VE8
machineid
1416
x-cache
MISS
status
200
x-cache-hits
0
accept-ranges
bytes
content-length
0
x-served-by
cache-hhn4062-HHN
feed-card-placeholder.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.es6.js
cdn.taboola.com/libtrc/
5 KB
2 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/feed-card-placeholder.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.es6.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/futureplc-network/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
3c2a5c9a45d4e469622cbec0dd95367c291fd13d68eb410cf69c66dcd638cf48

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
6MZ2_VkfqyTdFX3Xv9OJpfdvmrNTMh.B
content-encoding
gzip
age
48
x-cache
HIT
status
200
date
Wed, 04 Dec 2019 00:29:56 GMT
x-amz-replication-status
FAILED
content-length
1320
x-amz-id-2
62E+oMyvBs5Weu3utvRPer59RHrxPYe7G7mawJmbMmSIOTXwEpvy8LvgrztZhRrgj4G5hQ7wVxw=
x-served-by
cache-hhn4065-HHN
x-amz-expiration
expiry-date="Sat, 28 Dec 2019 00:00:00 GMT", rule-id="expire-versioned-static"
last-modified
Wed, 27 Nov 2019 10:00:08 GMT
server
AmazonS3
x-timer
S1575419396.224878,VS0,VE0
etag
"6e3988d20e74b3e088f69d66ea9378f1"
vary
Accept-Encoding
x-amz-request-id
89AC0DCC5EC03F8D
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
21
x-cache-hits
5
f89e1763-220d-4e09-ba69-9e040548fb7a.svg
cdn.taboola.com/static/f8/
4 KB
2 KB
Image
General
Full URL
https://cdn.taboola.com/static/f8/f89e1763-220d-4e09-ba69-9e040548fb7a.svg
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
39b076e4bb4fab9b8a142499cf6155f8c128464974691a04de7e764f71b72618

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
cMrDKn.emLmm9kiiOOF64ulDT4DRy6LK
content-encoding
gzip
age
57
x-cache
HIT
status
200
date
Wed, 04 Dec 2019 00:29:56 GMT
x-amz-replication-status
COMPLETED
content-length
1758
x-amz-id-2
l03aK5coDHMxIVw6UZl95levmMG8DMwBQ/PIj7cySTLGvEdRI+h9vWEhWmVryH43NVPNS4ftZQ8=
x-served-by
cache-hhn4065-HHN
access-control-allow-origin
*
last-modified
Wed, 07 Feb 2018 11:15:52 GMT
server
AmazonS3
x-timer
S1575419396.224906,VS0,VE0
etag
"b8b410e4b18d45aa2f3d9bc09cd335fb"
vary
Accept-Encoding
access-control-allow-methods
GET
x-amz-request-id
C1B09E8B7F992D0F
via
1.1 varnish
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/svg+xml
access-control-allow-headers
*
abp
21
x-cache-hits
33
userx.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.es6.js
cdn.taboola.com/libtrc/
22 KB
8 KB
Script
General
Full URL
https://cdn.taboola.com/libtrc/userx.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.es6.js
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/futureplc-network/loader.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
8064345e5373723e8a32fe962f00b92b1984e6d9438375a7fe2e8f2e84184e8c

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
F_hZNMH_H7HnbwLGt.FPgWyj4g8ncRvo
content-encoding
gzip
age
118
x-cache
HIT
status
200
date
Wed, 04 Dec 2019 00:29:56 GMT
x-amz-replication-status
FAILED
content-length
7766
x-amz-id-2
IeclK9I2qhssCJAAxTROD/sIaRtqzVSmZLMhTlC8Vo9NMfxfhG+ZY/Uo+ZnKGRuYaQcs1heD2UM=
x-served-by
cache-hhn4065-HHN
x-amz-expiration
expiry-date="Sat, 28 Dec 2019 00:00:00 GMT", rule-id="expire-versioned-static"
last-modified
Wed, 27 Nov 2019 10:00:00 GMT
server
AmazonS3
x-timer
S1575419396.236853,VS0,VE0
etag
"e1ca24c15e0c31ac2d3392772a15f098"
vary
Accept-Encoding
x-amz-request-id
9FB18C3F6846FCE7
via
1.1 varnish
cache-control
private,max-age=14400
accept-ranges
bytes
content-type
application/javascript; charset=utf-8
abp
21
x-cache-hits
4
social
trc.taboola.com/futureplc-gizmodo/log/3/
0
351 B
Image
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/social?route=AM:AM:V&lti=enc-img-3-vB&ri=772ed186888e4f27ff35710b54d208d1&sd=v2_a8110a33985ac08030b5379b14749139_919e0181-d4fd-4291-a5e5-fbc78039af4f-tuct4e08384_1575419396_1575419396_CNawjgYQ4NE9GMH-wPLsLSABKAEwODib4wlAgooQSJjEF1Cl7BBYAWAA&pi=/vulnerability-in-ring-doorbells-left-the-door-open-for-1839697255&wi=-1374754874495935395&pt=text&vi=1575419395905&st=social-available&d=%7B%22data%22%3A%5B%7B%22i%22%3A%22ctx%22%2C%22ism%22%3Afalse%2C%22srx%22%3A1600%2C%22sry%22%3A1200%2C%22pd%22%3Anull%2C%22tpl%22%3A%22%22%2C%22url%22%3A%22https%3A%2F%2Fwww.gizmodo.co.uk%2F2019%2F11%2Fvulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door%2F%22%2C%22rref%22%3A%22%22%2C%22sref%22%3A%22_sessionPending_%22%2C%22hdl%22%3A%22Vulnerability%20In%20Ring%20Doorbells%20Left%20the%20Door%20Open%20for%20Hackers%20to%20Open%20the%20Door%22%2C%22sec%22%3A%22%22%2C%22aut%22%3A%5B%5D%2C%22img%22%3A%22https%3A%2F%2Fmedia.gizmodo.co.uk%2Fwp-content%2Fuploads%2F2019%2F11%2Fj5tw53lghntq49hrindx.jpg%22%2C%22v%22%3A15%2C%22pw%22%3Afalse%7D%5D%7D&tim=01%3A29%3A56.280&id=2914&llvl=1&cv=20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT&
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-vcl-time-ms
9
date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.291503,VS0,VE9
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
available
trc.taboola.com/futureplc-gizmodo/log/3/
0
100 B
XHR
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/available?route=AM%3AAM%3AV&lti=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

x-vcl-time-ms
9
date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.293303,VS0,VE9
content-type
image/gif
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
g1dcqhocwb8hbfzxxqsy.png
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/
34 KB
35 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/g1dcqhocwb8hbfzxxqsy.png?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
3955da7c3a7406669b88689bc4b11628584276dfea08e9617cc0ee8dbcad90d0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
486304
edge-cache-tag
531646957187969411773363288269059058721,579179033019623958066548589099963835462,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Mon, 23 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/g1dcqhocwb8hbfzxxqsy.png?tb_expo_img=enc-img-3-vB
content-length
34802
x-served-by
cache-fra19123-FRA, cache-fra19131-FRA
last-modified
Fri, 22 Nov 2019 03:59:46 GMT
server
cloudinary
x-timer
S1575419396.297219,VS0,VE1
etag
"0376d1532670d33bb0acee7fd5b3544e"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
available
trc.taboola.com/futureplc-gizmodo/log/3/
0
57 B
XHR
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/available?route=AM%3AAM%3AV&lti=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

x-vcl-time-ms
9
date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.296349,VS0,VE9
content-type
image/gif
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
available
trc.taboola.com/futureplc-gizmodo/log/3/
0
385 B
XHR
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/available?route=AM%3AAM%3AV&lti=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

x-vcl-time-ms
9
date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.298576,VS0,VE9
content-type
image/gif
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
be34a6f712a7f21818b3cb22d70d66bc.jpeg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
250 KB
251 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/be34a6f712a7f21818b3cb22d70d66bc.jpeg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
4a8e377d8119fa5c9e3bce2d626f701f7300f3657be52dc3f83ed3d7a6600d17

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
644637
edge-cache-tag
614613569871367459187557384421352497372,579179033019623958066548589099963835462,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 26 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/be34a6f712a7f21818b3cb22d70d66bc.jpeg?tb_expo_img=enc-img-3-vB
content-length
256089
x-served-by
cache-fra19125-FRA, cache-fra19131-FRA
last-modified
Mon, 25 Nov 2019 21:16:45 GMT
server
cloudinary
x-timer
S1575419396.303877,VS0,VE3
etag
"ed401dc6283d1bed5f1205e42217e158"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
available
trc.taboola.com/futureplc-gizmodo/log/3/
0
367 B
XHR
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/available?route=AM%3AAM%3AV&lti=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

x-vcl-time-ms
9
date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.305008,VS0,VE9
content-type
image/gif
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
618a12a9def8807db62dd6997fb8f26f.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
107 KB
107 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/618a12a9def8807db62dd6997fb8f26f.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
3ae532db0a01e87fa34be867f2426f97a2fba26d886ed25111e366aba7484088

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
175631
edge-cache-tag
456119294135805012958032549499119823984,579179033019623958066548589099963835462,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Wed, 01 Jan 2020 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/618a12a9def8807db62dd6997fb8f26f.jpg?tb_expo_img=enc-img-3-vB
content-length
109328
x-served-by
cache-fra19134-FRA, cache-fra19131-FRA
last-modified
Sun, 01 Dec 2019 23:41:03 GMT
server
cloudinary
x-timer
S1575419396.305068,VS0,VE1
etag
"cd48e6ef4e1b1083b78eb035e4df74de"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
available
trc.taboola.com/futureplc-gizmodo/log/3/
0
95 B
XHR
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/available?route=AM%3AAM%3AV&lti=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

x-vcl-time-ms
9
date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.307975,VS0,VE9
content-type
image/gif
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
791c1fbb01e0a97bc3fb41122e380196.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
24 KB
24 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/791c1fbb01e0a97bc3fb41122e380196.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
f101022c8958a1285caea63bf5c968b6b2f6fe3a539fe7827cd3170fec75a688

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
1410307
edge-cache-tag
532643217274732696425623817273000772154,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Wed, 18 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/791c1fbb01e0a97bc3fb41122e380196.jpg?tb_expo_img=enc-img-3-vB
content-length
24227
x-served-by
cache-fra19132-FRA, cache-fra19131-FRA
last-modified
Sun, 17 Nov 2019 06:15:36 GMT
server
cloudinary
x-timer
S1575419396.312242,VS0,VE0
etag
"bf221360e4d5046b041975c51e3c782d"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
7235ed87322b972ca5e2f9fb5e5dfc81.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
34 KB
34 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/7235ed87322b972ca5e2f9fb5e5dfc81.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
f0c85db5a99e23ef99af0918928217cb305167dfd94644407081fad16222d2bd

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
728628
edge-cache-tag
337466396895283524623756543238478523278,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Fri, 29 Nov 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/7235ed87322b972ca5e2f9fb5e5dfc81.jpg?tb_expo_img=enc-img-3-vB
content-length
34717
x-served-by
cache-fra19131-FRA, cache-fra19131-FRA
last-modified
Tue, 29 Oct 2019 00:04:00 GMT
server
cloudinary
x-timer
S1575419396.312542,VS0,VE0
etag
"fa145a6e13c23322b4b6291913f4ea3f"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 179
available
trc.taboola.com/futureplc-gizmodo/log/3/
0
56 B
XHR
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/available?route=AM%3AAM%3AV&lti=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

x-vcl-time-ms
9
date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.312553,VS0,VE9
content-type
image/gif
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
db51e5f38c8ed8c1fb42a470af4c0051.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
24 KB
25 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/db51e5f38c8ed8c1fb42a470af4c0051.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
d73f695f7e61daad2f27fa558b7af705cebcea3aa9aa6292e8c7d2d2ce77563f

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
743792
edge-cache-tag
505257041879976578064921416972977542093,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 07 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/db51e5f38c8ed8c1fb42a470af4c0051.jpg?tb_expo_img=enc-img-3-vB
content-length
24796
x-served-by
cache-fra19178-FRA, cache-fra19131-FRA
last-modified
Wed, 06 Nov 2019 05:21:32 GMT
server
cloudinary
x-timer
S1575419396.313080,VS0,VE1
etag
"1b5e4e5e1552002adfbedf70f008d038"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
9ab60280f6aba63609490a79f31aa658.png
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
20 KB
21 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/9ab60280f6aba63609490a79f31aa658.png?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
66ff2cdf5e1695421a4e66a9681827198f218156e2e88043def70a284afe10dd

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
940572
edge-cache-tag
416486466543999798707754736720110443132,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 19 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/9ab60280f6aba63609490a79f31aa658.png?tb_expo_img=enc-img-3-vB
content-length
20810
x-served-by
cache-fra19154-FRA, cache-fra19131-FRA
last-modified
Mon, 18 Nov 2019 15:18:20 GMT
server
cloudinary
x-timer
S1575419396.313481,VS0,VE0
etag
"8fd92587f50bbb9985c08b9177d81f6b"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
available
trc.taboola.com/futureplc-gizmodo/log/3/
0
367 B
XHR
General
Full URL
https://trc.taboola.com/futureplc-gizmodo/log/3/available?route=AM%3AAM%3AV&lti=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/impl.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
Origin
https://www.gizmodo.co.uk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Content-Type
application/x-www-form-urlencoded

Response headers

x-vcl-time-ms
9
date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish
x-cache
MISS
p3p
policyref="http://trc.taboola.com/p3p.xml", CP="NOI DSP COR LAW NID CURa ADMa DEVa PSAa PSDa OUR BUS IND UNI COM NAV INT DEM"
status
204
x-served-by
cache-fra19131-FRA
pragma
no-cache
server
nginx
x-timer
S1575419396.315390,VS0,VE9
content-type
image/gif
access-control-allow-origin
https://www.gizmodo.co.uk
cache-control
no-cache
access-control-allow-credentials
true
accept-ranges
bytes
x-cache-hits
0
bmujaktaojewvygkx5tw.png
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/
17 KB
17 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/bmujaktaojewvygkx5tw.png?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
21138ee98ea3cba9faddf9c4c5d50519f16458fb2fb32b784e94eda1bf5704f1

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
452553
edge-cache-tag
442746087918003549443567395774793929356,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sun, 29 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/bmujaktaojewvygkx5tw.png?tb_expo_img=enc-img-3-vB
content-length
17186
x-served-by
cache-fra19149-FRA, cache-fra19131-FRA
last-modified
Thu, 28 Nov 2019 09:44:37 GMT
server
cloudinary
x-timer
S1575419396.323453,VS0,VE1
etag
"46c9103aa68b9fb5c14fae05be514cc8"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
john-lewis.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2017/09/
40 KB
40 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2017/09/john-lewis.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
48270385cc8a6df4a0cb8859a8b4e6f6b8ec83606d7c7ec69952a9caf9c95405

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
973803
edge-cache-tag
576729687529088688556963479743409929834,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Mon, 23 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2017/09/john-lewis.jpg?tb_expo_img=enc-img-3-vB
content-length
40739
x-served-by
cache-fra19147-FRA, cache-fra19131-FRA
last-modified
Fri, 22 Nov 2019 10:07:39 GMT
server
cloudinary
x-timer
S1575419396.361933,VS0,VE2
etag
"905af22485bd01aab0c88da1a9a821f8"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
249626371096242d29ebfdc11c4b251a.png
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
28 KB
29 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/249626371096242d29ebfdc11c4b251a.png?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
0aa859427f2d4f6a78de8ebcffa7d74397cd84bd0080a96e55d84786a7ef7547

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
554583
edge-cache-tag
506340133243083894976667882450490591611,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 28 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/249626371096242d29ebfdc11c4b251a.png?tb_expo_img=enc-img-3-vB
content-length
28941
x-served-by
cache-fra19178-FRA, cache-fra19131-FRA
last-modified
Wed, 27 Nov 2019 14:12:27 GMT
server
cloudinary
x-timer
S1575419396.361982,VS0,VE1
etag
"df966350c4f98e5a31cc8613b6f9213b"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 1
cb086933cc2da1ad77ec5e9ed2e71a56.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
10 KB
10 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/cb086933cc2da1ad77ec5e9ed2e71a56.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
2bb762559951f65aabc9ca33d03e585615eb2126cd322a90dbb74404a5d29db1

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
743683
edge-cache-tag
597466860424052205094521325713342200539,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Wed, 11 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/cb086933cc2da1ad77ec5e9ed2e71a56.jpg?tb_expo_img=enc-img-3-vB
content-length
10040
x-served-by
cache-fra19132-FRA, cache-fra19131-FRA
last-modified
Sun, 10 Nov 2019 23:45:11 GMT
server
cloudinary
x-timer
S1575419396.366543,VS0,VE0
etag
"8e8eea410c7f8439844ff46474ac9bfc"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 1
g1dcqhocwb8hbfzxxqsy.png
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/
34 KB
34 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/g1dcqhocwb8hbfzxxqsy.png?tb_expo_img=enc-img-3-vB
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/userx.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.es6.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
3955da7c3a7406669b88689bc4b11628584276dfea08e9617cc0ee8dbcad90d0

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
486304
edge-cache-tag
531646957187969411773363288269059058721,579179033019623958066548589099963835462,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Mon, 23 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/g1dcqhocwb8hbfzxxqsy.png?tb_expo_img=enc-img-3-vB
content-length
34802
x-served-by
cache-fra19123-FRA, cache-fra19131-FRA
last-modified
Fri, 22 Nov 2019 03:59:46 GMT
server
cloudinary
x-timer
S1575419396.366600,VS0,VE0
etag
"0376d1532670d33bb0acee7fd5b3544e"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
f539211219b796ffbb49949997c764f0.png
cdn.taboola.com/libtrc/static/thumbnails/
254 B
639 B
Image
General
Full URL
https://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
Requested by
Host: cdn.taboola.com
URL: https://cdn.taboola.com/libtrc/userx.20191120-26_b3-DEV-53277-use-encodeuri-instead-of-encodeuricompoenent-66b0b987e4f-SNAPSHOT.es6.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f68019eb4b4e5933301d4ee75969e0cb94ed8333bf514630fa749eb9c3e483c9

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

x-amz-version-id
hL.cyLD7Q4TL5ceY.7JQwF9m5IYI8mkC
via
1.1 varnish
age
3664
x-cache
HIT
status
200
date
Wed, 04 Dec 2019 00:29:56 GMT
x-amz-replication-status
COMPLETED
content-length
254
x-amz-id-2
grODyaFUyHwi27S6u2hd746yPHwUf+y1im5Wn93DxT7wozhn8KMFUP712WAAG3eD1t2rnF4k3Bs=
x-served-by
cache-hhn4065-HHN
last-modified
Wed, 24 Jun 2015 07:14:11 GMT
server
AmazonS3
x-amz-meta-s3cmd-attrs
uid:0/gname:root/uname:root/gid:0/mode:33188/mtime:1377415166/atime:1435052450/md5:dfa7b52c86e56bd67fa4002f6ed19854/ctime:1422381567
x-timer
S1575419396.352481,VS0,VE0
etag
"dfa7b52c86e56bd67fa4002f6ed19854"
x-amz-request-id
29D722C296265892
cache-control
private,max-age=31536000
accept-ranges
bytes
content-type
image/png
abp
21
x-cache-hits
1547
be34a6f712a7f21818b3cb22d70d66bc.jpeg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
250 KB
251 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/be34a6f712a7f21818b3cb22d70d66bc.jpeg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
4a8e377d8119fa5c9e3bce2d626f701f7300f3657be52dc3f83ed3d7a6600d17

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
644637
edge-cache-tag
614613569871367459187557384421352497372,579179033019623958066548589099963835462,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 26 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/be34a6f712a7f21818b3cb22d70d66bc.jpeg?tb_expo_img=enc-img-3-vB
content-length
256089
x-served-by
cache-fra19125-FRA, cache-fra19131-FRA
last-modified
Mon, 25 Nov 2019 21:16:45 GMT
server
cloudinary
x-timer
S1575419396.376166,VS0,VE0
etag
"ed401dc6283d1bed5f1205e42217e158"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
618a12a9def8807db62dd6997fb8f26f.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
107 KB
107 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/618a12a9def8807db62dd6997fb8f26f.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
3ae532db0a01e87fa34be867f2426f97a2fba26d886ed25111e366aba7484088

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
175631
edge-cache-tag
456119294135805012958032549499119823984,579179033019623958066548589099963835462,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Wed, 01 Jan 2020 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_370%2Cw_740%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/618a12a9def8807db62dd6997fb8f26f.jpg?tb_expo_img=enc-img-3-vB
content-length
109328
x-served-by
cache-fra19134-FRA, cache-fra19131-FRA
last-modified
Sun, 01 Dec 2019 23:41:03 GMT
server
cloudinary
x-timer
S1575419396.376250,VS0,VE0
etag
"cd48e6ef4e1b1083b78eb035e4df74de"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
791c1fbb01e0a97bc3fb41122e380196.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
24 KB
24 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/791c1fbb01e0a97bc3fb41122e380196.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
f101022c8958a1285caea63bf5c968b6b2f6fe3a539fe7827cd3170fec75a688

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
1410307
edge-cache-tag
532643217274732696425623817273000772154,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Wed, 18 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/791c1fbb01e0a97bc3fb41122e380196.jpg?tb_expo_img=enc-img-3-vB
content-length
24227
x-served-by
cache-fra19132-FRA, cache-fra19131-FRA
last-modified
Sun, 17 Nov 2019 06:15:36 GMT
server
cloudinary
x-timer
S1575419396.376727,VS0,VE0
etag
"bf221360e4d5046b041975c51e3c782d"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 3
7235ed87322b972ca5e2f9fb5e5dfc81.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
34 KB
35 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/7235ed87322b972ca5e2f9fb5e5dfc81.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
f0c85db5a99e23ef99af0918928217cb305167dfd94644407081fad16222d2bd

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
728628
edge-cache-tag
337466396895283524623756543238478523278,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Fri, 29 Nov 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/7235ed87322b972ca5e2f9fb5e5dfc81.jpg?tb_expo_img=enc-img-3-vB
content-length
34717
x-served-by
cache-fra19131-FRA, cache-fra19131-FRA
last-modified
Tue, 29 Oct 2019 00:04:00 GMT
server
cloudinary
x-timer
S1575419396.376705,VS0,VE0
etag
"fa145a6e13c23322b4b6291913f4ea3f"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 180
db51e5f38c8ed8c1fb42a470af4c0051.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
24 KB
25 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/db51e5f38c8ed8c1fb42a470af4c0051.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
d73f695f7e61daad2f27fa558b7af705cebcea3aa9aa6292e8c7d2d2ce77563f

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
743792
edge-cache-tag
505257041879976578064921416972977542093,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 07 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/db51e5f38c8ed8c1fb42a470af4c0051.jpg?tb_expo_img=enc-img-3-vB
content-length
24796
x-served-by
cache-fra19178-FRA, cache-fra19131-FRA
last-modified
Wed, 06 Nov 2019 05:21:32 GMT
server
cloudinary
x-timer
S1575419396.383899,VS0,VE0
etag
"1b5e4e5e1552002adfbedf70f008d038"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
9ab60280f6aba63609490a79f31aa658.png
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
20 KB
21 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/9ab60280f6aba63609490a79f31aa658.png?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
66ff2cdf5e1695421a4e66a9681827198f218156e2e88043def70a284afe10dd

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
940572
edge-cache-tag
416486466543999798707754736720110443132,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Thu, 19 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/9ab60280f6aba63609490a79f31aa658.png?tb_expo_img=enc-img-3-vB
content-length
20810
x-served-by
cache-fra19154-FRA, cache-fra19131-FRA
last-modified
Mon, 18 Nov 2019 15:18:20 GMT
server
cloudinary
x-timer
S1575419396.383952,VS0,VE0
etag
"8fd92587f50bbb9985c08b9177d81f6b"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
bmujaktaojewvygkx5tw.png
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/
17 KB
17 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/bmujaktaojewvygkx5tw.png?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
21138ee98ea3cba9faddf9c4c5d50519f16458fb2fb32b784e94eda1bf5704f1

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
452553
edge-cache-tag
442746087918003549443567395774793929356,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sun, 29 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2019/11/bmujaktaojewvygkx5tw.png?tb_expo_img=enc-img-3-vB
content-length
17186
x-served-by
cache-fra19149-FRA, cache-fra19131-FRA
last-modified
Thu, 28 Nov 2019 09:44:37 GMT
server
cloudinary
x-timer
S1575419396.402726,VS0,VE0
etag
"46c9103aa68b9fb5c14fae05be514cc8"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
john-lewis.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2017/09/
40 KB
40 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2017/09/john-lewis.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
48270385cc8a6df4a0cb8859a8b4e6f6b8ec83606d7c7ec69952a9caf9c95405

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
973803
edge-cache-tag
576729687529088688556963479743409929834,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Mon, 23 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/https%3A//media.gizmodo.co.uk/wp-content/uploads/2017/09/john-lewis.jpg?tb_expo_img=enc-img-3-vB
content-length
40739
x-served-by
cache-fra19147-FRA, cache-fra19131-FRA
last-modified
Fri, 22 Nov 2019 10:07:39 GMT
server
cloudinary
x-timer
S1575419396.409919,VS0,VE0
etag
"905af22485bd01aab0c88da1a9a821f8"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
249626371096242d29ebfdc11c4b251a.png
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
28 KB
29 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/249626371096242d29ebfdc11c4b251a.png?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
0aa859427f2d4f6a78de8ebcffa7d74397cd84bd0080a96e55d84786a7ef7547

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
554583
edge-cache-tag
506340133243083894976667882450490591611,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Sat, 28 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
HIT, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/249626371096242d29ebfdc11c4b251a.png?tb_expo_img=enc-img-3-vB
content-length
28941
x-served-by
cache-fra19178-FRA, cache-fra19131-FRA
last-modified
Wed, 27 Nov 2019 14:12:27 GMT
server
cloudinary
x-timer
S1575419396.410694,VS0,VE0
etag
"df966350c4f98e5a31cc8613b6f9213b"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
1, 2
cb086933cc2da1ad77ec5e9ed2e71a56.jpg
images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/
10 KB
10 KB
Image
General
Full URL
https://images-dup.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/cb086933cc2da1ad77ec5e9ed2e71a56.jpg?tb_expo_img=enc-img-3-vB
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
cloudinary /
Resource Hash
2bb762559951f65aabc9ca33d03e585615eb2126cd322a90dbb74404a5d29db1

Request headers

Referer
https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 04 Dec 2019 00:29:56 GMT
via
1.1 varnish, 1.1 varnish
age
743683
edge-cache-tag
597466860424052205094521325713342200539,309727233042263395173288000816347086757,29ecf9b93bbf306179626feeda1fab70
status
200
expiration
expiry-date="Wed, 11 Dec 2019 00:00:00 GMT", rule-id="delete fetch for taboola after 30 days"
x-cache
MISS, HIT
x-debug
/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_212%2Cw_380%2Cc_fill%2Cg_faces:auto%2Ce_sharpen/http%3A//cdn.taboola.com/libtrc/static/thumbnails/cb086933cc2da1ad77ec5e9ed2e71a56.jpg?tb_expo_img=enc-img-3-vB
content-length
10040
x-served-by
cache-fra19132-FRA, cache-fra19131-FRA
last-modified
Sun, 10 Nov 2019 23:45:11 GMT
server
cloudinary
x-timer
S1575419396.414063,VS0,VE0
etag
"8e8eea410c7f8439844ff46474ac9bfc"
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=2592000
accept-ranges
bytes
timing-allow-origin
*
access-control-allow-headers
X-Requested-With
x-cache-hits
0, 2

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
c.amazon-adsystem.com
URL
http://c.amazon-adsystem.com/aax2/amzn_ads.js
Domain
d3ezl4ajpp2zy8.cloudfront.net
URL
https://d3ezl4ajpp2zy8.cloudfront.net/futureplc-electronics_tag.js

Verdicts & Comments Add Verdict or Comment

241 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| __cmp string| hawk_links_selector number| hawk_links_tsid string| hawk_links_skimlinks boolean| askForConsent boolean| waitForConsent object| cmpConfig function| resolveFEP object| processFEP object| reliableDOMContentLoaded object| reliablePageLoad function| resolveBordeauxDone object| bordeauxDone object| reliableConsentGiven object| wadoinawdoijzxioznelknsdf string| __cmpEnv function| be_responsive function| width_to_respond_size function| hide_sticky_nav function| show_sticky_nav function| sticky_nav_waypoint function| page_setup_once function| page_setup_ongoing function| reset function| init_background_skin function| handle_background_click number| respond_size number| last_scroll_pos string| last_scroll_dir number| ongoing_setup_runs boolean| mmenu_enabled boolean| enable_jquery_animations boolean| enable_sticky_nav string| sticky_nav_state boolean| sticky_nav_ignore boolean| waiting_for_respondJS boolean| flipping_pages string| background_skin_click_url boolean| background_skin_loaded function| log function| $ function| jQuery object| html5 object| Modernizr object| MBP object| Socialite object| jQuery111006929505515877821 object| neededkeys boolean| started number| count object| analytics_ga_data object| WebFontConfig object| FEP_object string| dfpUnit string| dfpKeywords string| articleID string| theurl string| facebookPage function| fbAsyncInit object| _taboola object| OneSignal string| disqus_shortname function| disquscb function| disqus_config object| dataLayer object| AdblockPlus number| mobileMinWidth number| mobileMaxWidth number| tabletMinWidth number| tabletMaxWidth number| desktopMinWidth number| takeoverMinWidth string| skinSize object| advertBreakpoints number| currentWindowSize function| determineSkinSize object| googleAdsense function| loadAds object| googletag object| dfp object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleTokenSync object| WebFont object| TRC object| _tblConsole string| pm_pgtp undefined| msg object| _comscore object| google_tag_manager object| send_ga_data string| GoogleAnalyticsObject function| ga undefined| PageviewID string| captify_kw_query_11215 string| ggv2id function| fbq function| _fbq object| _ml number| google_srt undefined| google_measure_js_timing function| udm_ object| ns_p object| COMSCORE function| __trcCopyProps function| __trcFromError function| __trcClientTimestamp function| __trcLog function| __trcError function| __trcDebug function| __trcInfo function| __trcWarn function| __trcDOMWalker function| __trcPurgeEventHandlers function| __trcJSONify function| __trcUnJSONify function| __trcGetMargins function| __trcAttachResize function| __trcDetachResize function| __trcTrim function| __trcGetElementsByClass function| __trcToArray function| __trcObjectCreate function| PageManager function| addHashParam object| params number| trc_debug_level string| trc_article_id object| TRCImpl boolean| _tb_dis string| pm_ppy string| _pmep string| _pmep_geo string| _pmpmk boolean| _pmasync boolean| _pmoptimization boolean| _pmoptimizationmanipulation boolean| _pmhp boolean| _pmsb object| pmk object| pmglb object| pmfa object| pmad object| pmdebug_c object| _pmenv object| _pma undefined| _tb_d undefined| _tb_rand object| _pm_ecd string| _tb_vpx number| _tb_vpmd function| _pmloadfile function| pmws_request_done function| _tb_getUrlParameter number| pageReloads number| maxReloads function| mobilePaginate number| totalShares function| gawkerSocialLoad function| processDates function| findAndSetupTwitterPosts object| tags object| BKTAG function| bk_addUserCtx function| bk_addPageCtx function| bk_addEmailHash function| bk_addPhoneHash function| bk_doJSTag function| bk_doJSTag2 function| bk_doCarsJSTag function| bk_doPartnerAltTag function| bk_doCallbackTag function| bk_doCallbackTagWithTimeOut string| waypoints-context-id object| obj object| date string| hour string| minute string| second object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| hawkWebpackJsonP object| regeneratorRuntime function| setImmediate function| clearImmediate object| q object| urlFilters object| scriptLoaders function| QTag function| hasContainerLoaded object| qTag object| __onscroll function| TBClickToPlayVideo function| TBClickToPlayVideoElem function| TBVideoElem function| TBVideoEvents function| TBOptimizationAutoPlayInfoFromXPathAndURL object| _pmk function| TBWidgetVideoPlayer function| TBGenericVideoModule function| TBOtherPlayer function| TBVideoMetaData function| TBVideo function| TBVideoDetectionYoutubeAPI function| TBOptimizationTouchAndClickEventTracker function| TBWidgetStorage object| PMFileLoader object| PMPage object| PMTemplate function| PMTracking function| PMUniversalGA function| PMMdotLabs function| PMComScore function| PMPublisher function| TBOptimization function| PMGlobal function| pmws_getlocation_done object| pmdebug object| pmws object| qi object| _pm_mcg object| tbopt object| DISQUS string| countText object| ggevents undefined| bean object| GUMGUM object| ggData object| hawk object| _mag string| _uid_ object| DigiTrust number| taboola_view_id number| measureInterval

12 Cookies

Domain/Path Name / Value
.bluekai.com/ Name: bku
Value: VuQO9wg28klaKrAI
.bluekai.com/ Name: bkpa
Value: KJhPMNagyM9DCU2BIoqR+cu5e6PW6R6BC1ctV3hsW8GZJqNS83d43jtLQlOwfg67TErppoYS857pDfR/iQoBMRNSqHyPjP7PJqa6dUVhEGP2jS0Cq8qWgyfkyfQpjmN23JuNcKfFbAxx6rol95ZNS7Y4fLlndkYg1aMJdIlIIPZIx+tSVImwQI4pqDoEQtqSVduS3mNRrZEJO34FKlWKUTrea8zSL0uVzTiDvB5oaZTzeXMOMTXDlY/eO2a2he6/m5i8cLA8IUctzmecvzXPwvZx/GtLSxyP1Qgaw1bpe9xdgZatm9==
.gizmodo.co.uk/ Name: _fbp
Value: fb.2.1575419386183.954407815
.www.gizmodo.co.uk/ Name: FTR_Country_Code
Value: DE
www.gizmodo.co.uk/ Name: _tb_t_ppg
Value: https%3A//www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/
www.gizmodo.co.uk/ Name: HawkUID
Value: 303d241e8977
.bluekai.com/ Name: bkdc
Value: phx
www.gizmodo.co.uk/ Name: cmp
Value: j=1&t=1575419386
.gizmodo.co.uk/ Name: _ga
Value: GA1.3.388745368.1575419386
.gizmodo.co.uk/ Name: _gat
Value: 1
www.gizmodo.co.uk/ Name: _tb_sess_r
Value:
.gizmodo.co.uk/ Name: _gid
Value: GA1.3.987689776.1575419386

10 Console Messages

Source Level URL
Text
console-api log URL: https://cdn.onesignal.com/sdks/OneSignalSDK.js(Line 1)
Message:
OneSignal: Using fallback ES5 Stub for backwards compatibility.
console-api log (Line 1)
Message:
Sending pageview event with data: [object Object]
console-api log URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/(Line 101)
Message:
::DOMContentLoaded at 294
console-api log URL: https://gmg.futurecdn.net/gizmodo/media/scripts/master.js(Line 1)
Message:
Breakpoint hit: 992
console-api log URL: https://gmg.futurecdn.net/gizmodo/media/scripts/master.js(Line 1)
Message:
page_setup_ongoing()
console-api log URL: https://gmg.futurecdn.net/gizmodo/media/scripts/master.js(Line 1)
Message:
page_setup_once()
console-api log URL: https://gmg.futurecdn.net/gizmodo/media/scripts/master.js(Line 1)
Message:
page_setup_ongoing()
console-api log URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/(Line 102)
Message:
::PageLoad at 782
console-api error URL: https://consent.cmp.gizmodo.co.uk/cmpui.js(Line 66)
Message:
CMP Error: pubvendors.json references vendor id 309 which does not exist in the Global Vendor List
console-api log URL: https://www.gizmodo.co.uk/2019/11/vulnerability-in-ring-doorbells-left-the-door-open-for-hackers-to-open-the-door/(Line 102)
Message:
::BordeauxDone at 10000

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

1.gravatar.com
15.taboola.com
a.ebulletins.co.uk
adservice.google.de
ajax.googleapis.com
c.amazon-adsystem.com
c.disquscdn.com
cdn.digitru.st
cdn.onesignal.com
cdn.taboola.com
connect.facebook.net
consent.cmp.gizmodo.co.uk
consent.cmp.oath.com
d3ezl4ajpp2zy8.cloudfront.net
disqus.com
fonts.googleapis.com
fonts.gstatic.com
g2.gumgum.com
gizmodouk.disqus.com
gizmos.future-fie.co.uk
gmg.futurecdn.net
graph.facebook.com
images-dup.taboola.com
impl.onscroll.com
js.gumgum.com
mailing.ebulletins.co.uk
media.gizmodo.co.uk
ml314.com
p.cpx.to
r.skimresources.com
referrer.disqus.com
rules.quantcount.com
sb.scorecardresearch.com
search-api.fie.future.net.uk
secure.quantserve.com
securepubads.g.doubleclick.net
service.cmp.oath.com
stags.bluekai.com
stats.g.doubleclick.net
tags.bkrtx.com
tags.onscroll.com
trc.taboola.com
vendorlist.consensu.org
widget.perfectmarket.com
widgets.future-fie-assets.co.uk
widgets.future-fie.co.uk
www.facebook.com
www.gizmodo.co.uk
www.google-analytics.com
www.google.com
www.google.de
www.googletagmanager.com
www.googletagservices.com
c.amazon-adsystem.com
d3ezl4ajpp2zy8.cloudfront.net
13.224.196.111
13.57.152.229
143.204.101.125
143.204.101.25
143.204.101.9
151.101.0.134
151.101.112.134
151.101.113.181
151.101.114.2
151.101.114.49
151.101.12.134
151.101.14.2
159.180.84.2
172.217.22.34
184.31.90.128
185.113.25.51
185.113.25.52
185.113.25.53
185.113.25.59
185.113.25.60
2.19.43.224
2.19.45.224
23.67.136.71
2600:9000:20eb:5800:6:44e3:f8c0:93a1
2600:9000:2156:f000:1:af78:4c0:93a1
2606:2800:135:155a:23ba:b2a:25ff:122d
2606:4700::6810:4ea6
2606:4700::6812:e234
2a00:1450:4001:800::2004
2a00:1450:4001:800::200a
2a00:1450:4001:806::2003
2a00:1450:4001:809::2003
2a00:1450:4001:81a::200a
2a00:1450:4001:81b::200e
2a00:1450:4001:81d::2002
2a00:1450:4001:821::2008
2a00:1450:400c:c08::9b
2a03:2880:f01c:800e:face:b00c:0:2
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a04:fa87:fffe::c000:4902
35.190.59.101
52.213.7.200
52.215.103.126
8.241.91.124
91.228.74.184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