Help
RSS
API
Feed
Maltego
Contact
Domain > heavy-ads.glitch.me
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2021-04-29
54.88.185.49
(
ClassC
)
2024-05-13
54.82.73.145
(
ClassC
)
2024-11-01
3.215.88.51
(
ClassC
)
2024-11-13
54.88.25.112
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Mon, 13 May 2024 23:17:05 GMTContent-Type: text/html; charsetutf-8Content-Length: 2320Connection: keep-alivex-amz-id-2: xfnmhcrcApm2eQAtaqtNNOZOocHkskU9Zp3oeCI4p3e4+gxBmMqEM2ZgNMy !DOCTYPE html>html langen>meta charsetutf-8 />title>Heavy Ad Intervention ⚖️ demo/title>meta http-equivX-UA-Compatible contentIEedge />meta nameviewport contentwidthdevice-width, initial-scale1 />link idfavicon relicon hrefdata: typeimage/x-icon />meta nameDescription contentDemonstrate the Heavy Ad Intervention ⚖️ in Chrome />link relcanonical hrefhttps://heavy-ads.glitch.me />style> * { box-sizing: border-box; } body { font-family: sans-serif; margin: 1rem; } h1 { font-size: 1.2rem; } button, fieldset, h1, iframe, p, pre { margin: 0.25rem; max-width: 600px; } pre { padding: 1rem; overflow: scroll; } iframe { overflow: hidden; } iframe, pre { width: 100%; height: 30vh; max-height: 40rem; border: 2px inset #ddd; }/style>header> h1>Heavy Ad Intervention ⚖️ demo/h1> p>Trigger a a hrefhttps://developers.google.com/web/updates/2020/05/heavy-ad-interventions>Heavy Ad Intervention/a> in Chrome./p> p>🚩 ❌ Ensure samp>chrome://flags/heavy-ad-privacy-mitigations/samp> is strong>Disabled/strong>./p> form methodget action/> fieldset> legend>Load heavy ad example content/legend> button namead value/adserver-adunits/adunit.html typesubmit>⏮️ Reset/button> button namead value/adserver-cpu/adunit.html typesubmit>▶️ CPU/button> button namead value/adserver-network/adunit.html typesubmit>▶️ Network/button> input namen value typehidden classnocache /> /fieldset> /form> form methodget action/> fieldset> legend>Load custom ad content/legend> label forsite>URL: /label> input namesite typetext idsite /> button typesubmit>🔀 Load/button> input namen value typehidden classnocache /> /fieldset> /form>/header>main classad-area>/main>footer> p>📝 b>Note:/b> For repeated testing against the same ad you may need to close the tab and clear your browsing data./p> p>a hrefhttps://glitch.com/edit/#!/heavy-ads>💻 b>Code/b> for this demo/a>/p>/footer>script src/adsrules/ad-m.js>/script>
Port 443
HTTP/1.1 200 OKDate: Mon, 13 May 2024 23:17:05 GMTContent-Type: text/html; charsetutf-8Content-Length: 2320Connection: keep-alivex-amz-id-2: 11ie0IWwHzCkaQJQdgKX4gYn5tEHYjRV5dtiQwrBqcXUwXv6VK4Z7iYrFDd !DOCTYPE html>html langen>meta charsetutf-8 />title>Heavy Ad Intervention ⚖️ demo/title>meta http-equivX-UA-Compatible contentIEedge />meta nameviewport contentwidthdevice-width, initial-scale1 />link idfavicon relicon hrefdata: typeimage/x-icon />meta nameDescription contentDemonstrate the Heavy Ad Intervention ⚖️ in Chrome />link relcanonical hrefhttps://heavy-ads.glitch.me />style> * { box-sizing: border-box; } body { font-family: sans-serif; margin: 1rem; } h1 { font-size: 1.2rem; } button, fieldset, h1, iframe, p, pre { margin: 0.25rem; max-width: 600px; } pre { padding: 1rem; overflow: scroll; } iframe { overflow: hidden; } iframe, pre { width: 100%; height: 30vh; max-height: 40rem; border: 2px inset #ddd; }/style>header> h1>Heavy Ad Intervention ⚖️ demo/h1> p>Trigger a a hrefhttps://developers.google.com/web/updates/2020/05/heavy-ad-interventions>Heavy Ad Intervention/a> in Chrome./p> p>🚩 ❌ Ensure samp>chrome://flags/heavy-ad-privacy-mitigations/samp> is strong>Disabled/strong>./p> form methodget action/> fieldset> legend>Load heavy ad example content/legend> button namead value/adserver-adunits/adunit.html typesubmit>⏮️ Reset/button> button namead value/adserver-cpu/adunit.html typesubmit>▶️ CPU/button> button namead value/adserver-network/adunit.html typesubmit>▶️ Network/button> input namen value typehidden classnocache /> /fieldset> /form> form methodget action/> fieldset> legend>Load custom ad content/legend> label forsite>URL: /label> input namesite typetext idsite /> button typesubmit>🔀 Load/button> input namen value typehidden classnocache /> /fieldset> /form>/header>main classad-area>/main>footer> p>📝 b>Note:/b> For repeated testing against the same ad you may need to close the tab and clear your browsing data./p> p>a hrefhttps://glitch.com/edit/#!/heavy-ads>💻 b>Code/b> for this demo/a>/p>/footer>script src/adsrules/ad-m.js>/script>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]