#arpnetworks 2014-08-26,Tue

↑back Search ←Prev date Next date→ (Showing only urls - See all)(Click on time to show url line in full context)

WhoWhatWhen
mnathani122.226.223.69 - - [17/Aug/2014:10:24:42 -0400] "GET http://www.k2proxy.com//hello.html HTTP/1.1" 404 2055 [01:00]
RandalSchwartzand this "curl -o /dev/null https://arpnetworks.com/100mb.bin" runs at 500kbps [14:50]
brycecNothing out of the ordinary in my smokepings https://smokeping.cobryce.com/?target=ARP.ARPWebsite [14:51]
RandalSchwartz: did you curl https:// ? [15:05]
RandalSchwartz... * Rebuilt URL to: https://www.google.com/ [15:06]
brycecYou could try http://74.125.25.99 in the browser to test, perhaps (if it doesn't provide the hsts header) [15:11]
RandalSchwartzhmm. https://www.superfish.com/ [15:14]
brycechttp://malwaretips.com/blogs/superfish-window-shopper-adware/ [15:14]
RandalSchwartz: curl http://sprunge.us/TXIK [15:17]
Relevant https://support.mozilla.org/en-US/questions/878411 :) [15:18]
https://support.mozilla.org/en-US/questions/830223 "How did Superfish get on my PC?" [15:19]

↑back Search ←Prev date Next date→ (Showing only urls - See all)(Click on time to show url line in full context)