URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Submission Tags: falconsandbox
Submission: On December 02 via api from US — Scanned from DE

Summary

This website contacted 17 IPs in 3 countries across 12 domains to perform 32 HTTP transactions. The main IP is 104.20.59.209, located in and belongs to CLOUDFLARENET, US. The main domain is www.bleepingcomputer.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on May 16th 2020. Valid for: 2 years.
This is the only time www.bleepingcomputer.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
5 previously-uncommon-egret.edgecompute.app www.bleepingcomputer.com
4 serverless-benchmarks-js.radar-cfdata-org.workers.dev www.bleepingcomputer.com
4 strangely-perfect-amoeba.edgecompute.app www.bleepingcomputer.com
3 serverless-benchmarks-rust.radar-cfdata-org.workers.dev www.bleepingcomputer.com
2 www.bleepingcomputer.com www.bleepingcomputer.com
1 stackpath-map3.cedexis-test.com www.bleepingcomputer.com
1 jsdelivr.b-cdn.net www.bleepingcomputer.com
1 testingcf.jsdelivr.net www.bleepingcomputer.com
1 p29.cedexis-test.com www.bleepingcomputer.com
1 cdnetworks.cedexis-test.com www.bleepingcomputer.com
1 ptcfc.com www.bleepingcomputer.com
1 cedexis-test.akamaized.net www.bleepingcomputer.com
1 vdms-ssl.cedexis-test.com www.bleepingcomputer.com
1 benchmark.1e100cdn.net www.bleepingcomputer.com
1 essl-cdxs.edgekey.net www.bleepingcomputer.com
1 fastly.cedexis-test.com www.bleepingcomputer.com
1 static.cloudflareinsights.com www.bleepingcomputer.com
1 api.radar.cloudflare.com www.bleepingcomputer.com
0 limelight-ssl.cedexis-test.com Failed www.bleepingcomputer.com
32 19

This site contains links to these domains. Also see Links.

Domain
www.cloudflare.com
Subject Issuer Validity Valid
bleepingcomputer.com
Sectigo RSA Domain Validation Secure Server CA
2020-05-16 -
2022-05-15
2 years crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2021-07-14 -
2022-07-13
a year crt.sh
*.edgecompute.app
GlobalSign Atlas R3 DV TLS CA H2 2021
2021-10-18 -
2022-11-19
a year crt.sh
fastly.cedexis-test.com
GlobalSign Atlas R3 DV TLS CA 2020
2021-03-22 -
2022-04-23
a year crt.sh
essl-cdxs.test.edgekey.net
R3
2021-10-29 -
2022-01-27
3 months crt.sh
1e100cdn.net
GTS CA 1D4
2021-10-23 -
2022-01-21
3 months crt.sh
vdms-ssl.cedexis-test.com
DigiCert TLS RSA SHA256 2020 CA1
2021-05-27 -
2022-06-01
a year crt.sh
a248.e.akamai.net
DigiCert SHA2 Secure Server CA
2021-07-15 -
2022-07-20
a year crt.sh
p36.cedexis-test.com
DigiCert TLS RSA SHA256 2020 CA1
2021-06-28 -
2022-07-06
a year crt.sh
*.cedexis-test.com
Amazon
2021-11-16 -
2022-12-14
a year crt.sh
*.b-cdn.net
Sectigo RSA Domain Validation Secure Server CA
2021-11-07 -
2022-11-11
a year crt.sh
p45890.cedexis-test.com
DigiCert TLS RSA SHA256 2020 CA1
2021-06-28 -
2022-07-06
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Frame ID: 7D14391DE2D543F4D4E72E904CFB942B
Requests: 32 HTTP requests in this frame

Screenshot

Page Title

Access denied | www.bleepingcomputer.com used Cloudflare to restrict access

Page Statistics

32
Requests

97 %
HTTPS

44 %
IPv6

12
Domains

19
Subdomains

17
IPs

3
Countries

1126 kB
Transfer

1145 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

32 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
3 KB
2 KB
Document
General
Full URL
https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.59.209 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b3017a2bd180eccb357b5a4f1ad33e2bdce7c9846438dc0e6769f4610e00dab6
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

date
Thu, 02 Dec 2021 15:25:03 GMT
content-type
text/html; charset=UTF-8
x-frame-options
SAMEORIGIN
referrer-policy
same-origin
cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires
Thu, 01 Jan 1970 00:00:01 GMT
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
server
cloudflare
cf-ray
6b7590d2aeb13628-MAN
content-encoding
br
main.css
www.bleepingcomputer.com/cdn-cgi/styles/
6 KB
2 KB
Stylesheet
General
Full URL
https://www.bleepingcomputer.com/cdn-cgi/styles/main.css
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.20.59.209 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2729a14ce8234270b0833cd05eaae83a0d00a89f7e3d79b0bc3b4609c48d85fd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:03 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Wed, 01 Dec 2021 12:20:23 GMT
server
cloudflare
etag
W/"61a76887-19dc"
x-frame-options
DENY
content-type
text/css
cache-control
max-age=7200, public
cf-ray
6b7590d30f603628-MAN
vary
Accept-Encoding
expires
Thu, 02 Dec 2021 17:25:03 GMT
beacon.js
api.radar.cloudflare.com/
20 KB
6 KB
Script
General
Full URL
https://api.radar.cloudflare.com/beacon.js
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:1ef , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a381a28702aca640c6651c3a48c57e3644b185ec8b59a6f41c92e44afa9827e4

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:04 GMT
content-encoding
gzip
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
access-control-allow-methods
*
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
*
cache-control
no-store, max-age=0
cf-ray
6b7590d36f170e1a-MXP
access-control-allow-headers
*
v64f9daad31f64f81be21cbef6184a5e31634941392597
static.cloudflareinsights.com/beacon.min.js/
13 KB
5 KB
Script
General
Full URL
https://static.cloudflareinsights.com/beacon.min.js/v64f9daad31f64f81be21cbef6184a5e31634941392597
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:5f41 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5bf0a170ae91f1bb8d0c94381a74ab8b85f938bf31bf18a9c8e3b835250d3be6

Request headers

Referer
Origin
https://www.bleepingcomputer.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:03 GMT
content-encoding
gzip
last-modified
Fri, 22 Oct 2021 22:23:12 GMT
server
cloudflare
etag
W/2021.10.0
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/javascript;charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=86400
cross-origin-resource-policy
cross-origin
cf-ray
6b7590d3290d4a9e-FRA
/
serverless-benchmarks-rust.radar-cfdata-org.workers.dev/
112 B
807 B
Image
General
Full URL
https://serverless-benchmarks-rust.radar-cfdata-org.workers.dev/?test=bcc6a5c1b80a776e3e00f674e09136aa8b585ed950a086405e56bdf65d02a967&img=1&r=61109832
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::ac43:8bab , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:04 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6b7590d55d0759bf-MXP
access-control-allow-methods
*
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-test-value
43
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=X07XICKlNRsUh9Eix9Trx2CX71aZLkWcDWk%2FqDD5P5VOp%2FOj8HH9XwjytgjEmZMSG%2BteunPBCtbRwpoL6M7r5aCixEPzj8L%2BD%2FcYp63NSTk60dgZqpcH7kOo52oDvk2tRk5jACeok1lR%2FXMnQcqo8blgTWk%2F%2FlG0UGQX2tK8wNjIq92w0LX00S7FDTx9n3mQ2ZsFuxDF"}],"group":"cf-nel","max_age":604800}
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
/
strangely-perfect-amoeba.edgecompute.app/
112 B
290 B
Image
General
Full URL
https://strangely-perfect-amoeba.edgecompute.app/?test=aec93c435332795f65e5503d9203ff9065e6fca1761a70f44013dc325e0ea8b6&img=1&r=84240224
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:04 GMT
x-test-value
314159
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
/
strangely-perfect-amoeba.edgecompute.app/
112 B
150 B
Image
General
Full URL
https://strangely-perfect-amoeba.edgecompute.app/?test=14016c4aaf282fbb6ae2ea8fbcbf139c641c291709185b8fb8a38913177b9b33&img=1&r=39033634
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:04 GMT
x-test-value
43
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
/
previously-uncommon-egret.edgecompute.app/
112 B
169 B
Image
General
Full URL
https://previously-uncommon-egret.edgecompute.app/?test=14016c4aaf282fbb6ae2ea8fbcbf139c641c291709185b8fb8a38913177b9b33&img=1&r=30996466
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:05 GMT
x-test-value
43
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
/
serverless-benchmarks-js.radar-cfdata-org.workers.dev/
112 B
452 B
Image
General
Full URL
https://serverless-benchmarks-js.radar-cfdata-org.workers.dev/?test=14016c4aaf282fbb6ae2ea8fbcbf139c641c291709185b8fb8a38913177b9b33&img=1&r=24565468
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::ac43:8bab , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:05 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6b7590de1b2559bf-MXP
access-control-allow-methods
*
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-test-value
43
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=N%2BZDSCRJGwpZdy8wTOtFekGdXR%2Bz04foA5%2FP9kk5hSg1V7E%2B7FNL23tcDfGWZK77mhT0QycnkkuPepHf8%2FgkjJq0rgEztmuDwPZvHxAz6kRtaMwm359h%2F6x%2BUN0oLVTPwiEujCj7%2Fa7UEJRWI7I0w92qUOzeCCs36%2F51K5EpZj01LzL8hBPT%2Fu%2Bv5VrWNTzazo67lw%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
/
strangely-perfect-amoeba.edgecompute.app/
112 B
149 B
Image
General
Full URL
https://strangely-perfect-amoeba.edgecompute.app/?test=99c77b3966a6b6c91bd49fb6b0f712bc80fef174b1607e36109828d5ac0df4ce&img=1&r=8835628
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:05 GMT
x-test-value
1
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
r20-100KB.png
fastly.cedexis-test.com/img/20367/
100 KB
101 KB
Image
General
Full URL
https://fastly.cedexis-test.com/img/20367/r20-100KB.png?r=55781075
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.64.65 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
nginx /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Date
Thu, 02 Dec 2021 15:25:06 GMT
Via
1.1 varnish, 1.1 varnish
Age
2088412
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
102400
X-Served-By
cache-dfw18631-DFW, cache-cdg20734-CDG
Last-Modified
Tue, 21 Aug 2018 21:30:28 GMT
Server
nginx
X-Timer
S1638458706.311494,VS0,VE0
ETag
"5b7c8474-19000"
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=2629743, public
X-Cedexis-UNI
CDG|{"pop":"CDG","sip":"151.101.64.65","ip_ver":"v4","server_name":"cache-cdg20734"}
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Cache-Hits
20354, 33118
r20-100KB.png
essl-cdxs.edgekey.net/img/
100 KB
100 KB
Image
General
Full URL
https://essl-cdxs.edgekey.net/img/r20-100KB.png?r=75982981
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
104.126.36.200 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
a104-126-36-200.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Date
Thu, 02 Dec 2021 15:25:06 GMT
Last-Modified
Tue, 21 Aug 2018 21:30:28 GMT
Server
nginx
ETag
"5b7c8474-19000"
X-Cache
RequestInfo=2483899060,104.126.36.196,1a74be60,1638458706,40308,0
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=2629743
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
102400
Expires
Sun, 02 Jan 2022 01:54:09 GMT
/
serverless-benchmarks-js.radar-cfdata-org.workers.dev/
112 B
456 B
Image
General
Full URL
https://serverless-benchmarks-js.radar-cfdata-org.workers.dev/?test=2820656aa63ed5463d0abe7e0520dcbfeabdb8f499c7b5228388cc64e2036749&img=1&r=97208914
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3036::ac43:8bab , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:06 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6b7590e33bcb59bf-MXP
access-control-allow-methods
*
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-test-value
0
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=73KwQahgiA%2BxW8EirRPll%2B9aLoHBNM%2BmYvNojwvomcWeI8XlEOs%2BFafE9tkkm3sEcHYBhkBBPy9XGs5pYVGj9MuWim7g1U0gPzcDCx%2FzHdw%2BH4sc5oln%2Fd4rLlPW0d%2FkXksRcMV6eKySNTYvWWZpp4b5MMV%2BX4WxrMC0Ja%2B%2B40I3h0v%2BjVLkT8bihg7DISx89h8XYw%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
/
previously-uncommon-egret.edgecompute.app/
112 B
152 B
Image
General
Full URL
https://previously-uncommon-egret.edgecompute.app/?test=2820656aa63ed5463d0abe7e0520dcbfeabdb8f499c7b5228388cc64e2036749&img=1&r=15849580
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:05 GMT
x-test-value
5812225
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
r20-100KB.png
benchmark.1e100cdn.net/
100 KB
100 KB
Image
General
Full URL
https://benchmark.1e100cdn.net/r20-100KB.png?r=99950531
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
35.190.26.57 Kansas City, United States, ASN15169 (GOOGLE, US),
Reverse DNS
57.26.190.35.bc.googleusercontent.com
Software
/
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Wed, 17 Nov 2021 11:00:56 GMT
via
1.1 google
age
1311850
etag
"5939ad35-19000"
content-type
image/png
cache-control
public,max-age=31536000
timing-allow-origin
*
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
102400
r20-100KB.png
vdms-ssl.cedexis-test.com/img/16999/
100 KB
100 KB
Image
General
Full URL
https://vdms-ssl.cedexis-test.com/img/16999/r20-100KB.png?r=92454616
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.195.34.116 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (frd/E311) /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:06 GMT
last-modified
Tue, 21 Aug 2018 21:30:29 GMT
server
ECAcc (frd/E311)
age
1960826
etag
"5b7c8475-19000"
x-cache
HIT
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
Server
cache-control
max-age=2629743, public
accept-ranges
bytes
timing-allow-origin
*
content-length
102400
r20-100KB.png
cedexis-test.akamaized.net/img/
100 KB
100 KB
Image
General
Full URL
https://cedexis-test.akamaized.net/img/r20-100KB.png?r=1642229
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a02:26f0:6c00::210:ba23 Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
nginx /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
last-modified
Tue, 21 Aug 2018 21:30:28 GMT
server
nginx
etag
"5b7c8474-19000"
x-cache
RequestInfo=2571903593,2a02:26f0:6c00::210:ba23,159e026,1638458706,31712,7
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=2629743
accept-ranges
bytes
timing-allow-origin
*
content-length
102400
expires
Sun, 02 Jan 2022 01:54:10 GMT
/
serverless-benchmarks-rust.radar-cfdata-org.workers.dev/
112 B
742 B
Image
General
Full URL
https://serverless-benchmarks-rust.radar-cfdata-org.workers.dev/?test=2820656aa63ed5463d0abe7e0520dcbfeabdb8f499c7b5228388cc64e2036749&img=1&r=32683537
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3036::ac43:8bab , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6b7590e739a3f933-MXP
access-control-allow-methods
*
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-test-value
5812225
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=EQtJQ9FrQRDvuyeQNNPMlgetiYtK4myi6JVXGBdAuCQWUB0KxqlM2GCKysLcIyFGiBYi%2Bllj%2FBn%2FERFg1JUZfxQ3nUVWOpP5ptaUZsXaxl6C9Iw42vYAdacCXNT2NKlZuxFQeCJRC5F01%2F1aGhhWvYou0A1vn8vlGGUwzCh2JD6Vwf05QPoSTQmKX9jX8j37IA8JOwyy"}],"group":"cf-nel","max_age":604800}
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
r20-100KB.png
ptcfc.com/img/284/
100 KB
100 KB
Image
General
Full URL
https://ptcfc.com/img/284/r20-100KB.png?r=63703620
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.16.53.99 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

timing-allow-origin
*
date
Thu, 02 Dec 2021 15:25:07 GMT
server
cloudflare
etag
"5668b8ac-19000"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
cf-ray
6b7590e9a89154ac-MAN
content-length
102400
/
serverless-benchmarks-js.radar-cfdata-org.workers.dev/
112 B
706 B
Image
General
Full URL
https://serverless-benchmarks-js.radar-cfdata-org.workers.dev/?test=99c77b3966a6b6c91bd49fb6b0f712bc80fef174b1607e36109828d5ac0df4ce&img=1&r=32902058
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3036::ac43:8bab , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6b7590ea1f87f933-MXP
access-control-allow-methods
*
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-test-value
1
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=aI2MIglMLMeK%2BMVt%2BAytPC5oMb2rO1XpxE9caF5798ILN9SeM9sYxy8stb83QjvkQgkzxRFcPP2KueWRGK2b%2Fk2tVSXsZ4XrW%2FO8ZreLzRgxdnzXBV6TD%2BnEWm6UAt%2BlzpJjByuI1bFIvPETrRYO5p2X1XOU2oqQ2yUZRtyHMzvX81dV3DcUKt4E19HuqfDrelbyBQ%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
/
serverless-benchmarks-js.radar-cfdata-org.workers.dev/
112 B
710 B
Image
General
Full URL
https://serverless-benchmarks-js.radar-cfdata-org.workers.dev/?test=bcc6a5c1b80a776e3e00f674e09136aa8b585ed950a086405e56bdf65d02a967&img=1&r=33338138
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3036::ac43:8bab , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6b7590ea6856f933-MXP
access-control-allow-methods
*
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-test-value
43
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ediQYfZKCxvR2tbyRQ4qzBCUBRICUYT%2B%2F78uKxVxR%2FryYpZxZb2Ny3wdllsh7uvd1gpFtf37zX868j4SrVedT9iKml8Ym5otmzKMpFOSbjQaot6FlCxj7J2l6wJK3%2Bn9%2FsnKocZhSeLOm0YOLeOk%2F1iall%2FanQrnaqK9kN%2BXnt877IukEotTAtyIXKINPCSYcwUXMg%3D%3D"}],"group":"cf-nel","max_age":604800}
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
r20-100KB.png
cdnetworks.cedexis-test.com/img/17653/
100 KB
100 KB
Image
General
Full URL
https://cdnetworks.cedexis-test.com/img/17653/r20-100KB.png?r=22165945
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
163.171.128.148 , Germany, ASN54994 (QUANTILNETWORKS, US),
Reverse DNS
Software
PWS/8.3.1.0.8 /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Date
Thu, 02 Dec 2021 15:25:07 GMT
Via
1.1 kf230:14 (W), 1.1 PSdgflkfFRA1vg90:12 (W)
Last-Modified
Tue, 21 Aug 2018 21:30:28 GMT
Server
PWS/8.3.1.0.8
Age
37697
ETag
"5b7c8474-19000"
X-Ws-Request-Id
61a8e553_PSdgflkfFRA1je97_42163-26511
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=2629743, public
X-Px
ht PSdgflkfFRA1vg90FRA
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
102400
/
previously-uncommon-egret.edgecompute.app/
112 B
169 B
Image
General
Full URL
https://previously-uncommon-egret.edgecompute.app/?test=aec93c435332795f65e5503d9203ff9065e6fca1761a70f44013dc325e0ea8b6&img=1&r=31639269
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
x-test-value
314159
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
/
previously-uncommon-egret.edgecompute.app/
112 B
153 B
Image
General
Full URL
https://previously-uncommon-egret.edgecompute.app/?test=99c77b3966a6b6c91bd49fb6b0f712bc80fef174b1607e36109828d5ac0df4ce&img=1&r=66672823
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
x-test-value
1000000
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
r20-100KB.png
p29.cedexis-test.com/img/
100 KB
101 KB
Image
General
Full URL
https://p29.cedexis-test.com/img/r20-100KB.png?r=5266488
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
2600:9000:21f3:5800:1b:9b5:7e00:93a1 -, , ASN (),
Reverse DNS
Software
nginx /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Date
Sun, 14 Nov 2021 06:51:18 GMT
Via
1.1 e5b93012e2bfb81dc9846f43efd610a6.cloudfront.net (CloudFront)
Age
1586029
X-Cache
Hit from cloudfront
Connection
keep-alive
Content-Length
102400
Last-Modified
Tue, 21 Aug 2018 21:30:28 GMT
Server
nginx
ETag
"5b7c8474-19000"
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=2629743, public
X-Amz-Cf-Pop
FRA2-C2
Accept-Ranges
bytes
Timing-Allow-Origin
*
X-Amz-Cf-Id
6R433M8P2NSRCGyIAPbyyoPPZfZ_2UNdwrfzsfSAIWpXbQ4Gt0Ofkw==
r20-100KB.png
testingcf.jsdelivr.net/gh/jimaek/testobjects@0.0.1/
100 KB
101 KB
Image
General
Full URL
https://testingcf.jsdelivr.net/gh/jimaek/testobjects@0.0.1/r20-100KB.png?r=43044351
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:5914 -, , ASN (),
Reverse DNS
Software
cloudflare /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
3263870
x-jsd-version
0.0.1
x-cache
HIT, MISS
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
content-length
102400
x-served-by
cache-fra19151-FRA, cache-mxp6922-MXP
timing-allow-origin
*
x-jsd-version-type
version
server
cloudflare
etag
W/"19000-qSJ5YZCh9buzxBDG7FkVAgUN8E4"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
accept-ranges
bytes
cf-ray
6b7590ec6b915a25-MXP
/
previously-uncommon-egret.edgecompute.app/
112 B
146 B
Image
General
Full URL
https://previously-uncommon-egret.edgecompute.app/?test=bcc6a5c1b80a776e3e00f674e09136aa8b585ed950a086405e56bdf65d02a967&img=1&r=82918856
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
x-test-value
43
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
r20-100KB.png
jsdelivr.b-cdn.net/gh/jimaek/testobjects@0.0.1/
100 KB
101 KB
Image
General
Full URL
https://jsdelivr.b-cdn.net/gh/jimaek/testobjects@0.0.1/r20-100KB.png?r=45743642
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
89.187.169.47 -, , ASN (),
Reverse DNS
Software
BunnyCDN-DE1-756 /
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:08 GMT
x-content-type-options
nosniff
cdn-edgestorageid
756
age
1242633
x-jsd-version
0.0.1
x-cache
HIT, HIT
cdn-cachedat
12/02/2021 10:44:02
cdn-pullzone
251155
cross-origin-resource-policy
cross-origin
access-control-expose-headers
*
content-length
102400
server
BunnyCDN-DE1-756
x-served-by
cache-fra19166-FRA, cache-cdg20727-CDG
access-control-allow-origin
*
x-jsd-version-type
version
cdn-proxyver
1.0
cdn-requestpullcode
200
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
image/png
cdn-cache
HIT
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
cdn-requestid
3a6faee78185a6e70749348e74a51c3e
accept-ranges
bytes
timing-allow-origin
*
cdn-requestcountrycode
DE
cdn-status
200
cdn-requestpullsuccess
True
r20-100KB.png
stackpath-map3.cedexis-test.com/img/
100 KB
100 KB
Image
General
Full URL
https://stackpath-map3.cedexis-test.com/img/r20-100KB.png?r=49754332
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 -, , ASN (),
Reverse DNS
Software
/
Resource Hash
27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Date
Thu, 02 Dec 2021 15:25:08 GMT
Last-Modified
Tue, 21 Aug 2018 21:30:29 GMT
ETag
"1534887029"
X-HW
1638458708.cds066.lo4.hn,1638458708.cds227.lo4.c
Content-Type
image/png
Cache-Control
public, max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
timing-allow-origin
*
Content-Length
102400
/
serverless-benchmarks-rust.radar-cfdata-org.workers.dev/
112 B
704 B
Image
General
Full URL
https://serverless-benchmarks-rust.radar-cfdata-org.workers.dev/?test=14016c4aaf282fbb6ae2ea8fbcbf139c641c291709185b8fb8a38913177b9b33&img=1&r=31753294
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3036::ac43:8bab , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:08 GMT
content-encoding
br
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cf-ray
6b7590ee58b6f933-MXP
access-control-allow-methods
*
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
x-test-value
43
referrer-policy
no-referrer
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SWyabKZH0a76V9Ive49IxSv68dK2ZRiK2vqjd7FouU3sQGqFdepJQoq53E7wrrX7%2B46vFmPBNyOqTdzf0gcMkC11kKiY%2B%2FoXVVJOz7NfeyoiUdPb1DNGOXzjY4i3OG6Yhq3C%2FOYplP7oENbaOULoTl5i1LQkSqx8z65WaTUxhLy4Q3gHW%2BaM2SHSDeQSIJaajZZzgwyL"}],"group":"cf-nel","max_age":604800}
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
/
strangely-perfect-amoeba.edgecompute.app/
112 B
148 B
Image
General
Full URL
https://strangely-perfect-amoeba.edgecompute.app/?test=2820656aa63ed5463d0abe7e0520dcbfeabdb8f499c7b5228388cc64e2036749&img=1&r=86993325
Requested by
Host: www.bleepingcomputer.com
URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:3::307 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
454c8cdf69f295d7914a530ddfcead74f342c9b690f8148c1fc4a3f1b3c0e871

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

date
Thu, 02 Dec 2021 15:25:07 GMT
x-test-value
0
referrer-policy
no-referrer
access-control-allow-methods
*
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
no-store
timing-allow-origin
*
access-control-allow-headers
*
content-length
112
r20-100KB.png
limelight-ssl.cedexis-test.com/img/17003/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
limelight-ssl.cedexis-test.com
URL
https://limelight-ssl.cedexis-test.com/img/17003/r20-100KB.png?r=28171680

Verdicts & Comments Add Verdict or Comment

39 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler object| _cf_translation object| e boolean| t boolean| r boolean| s boolean| o boolean| n object| c function| f function| d function| b function| p function| h function| u function| y function| g function| w object| v function| x function| B function| T object| k function| E function| A object| j function| log function| measure function| rand function| get function| getts function| getProtocol function| valid function| perf string| a object| __cfBeacon

1 Cookies

Domain/Path Name / Value
.radar.cloudflare.com/ Name: __cf_bm
Value: S7NjSMTsxyFDrfLoqaSoFIwAQhEgk5YXfkg5rqYoHoI-1638458704-0-Aejfs3Bx1nvnjaglLIDa26m46bl7ne+s91T5d3jH4ntHWIhHK+dUMn2ztOfIuwDaDOHGfLe6wkR+GBq3d2zf11Y=

1 Console Messages

Source Level URL
Text
network error URL: https://www.bleepingcomputer.com/news/security/discord-client-turned-into-a-password-stealer-by-updated-malware/
Message:
Failed to load resource: the server responded with a status of 403 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Frame-Options SAMEORIGIN