RAW HTTP Header
HTTP/2 301 date: Thu, 16 Apr 2026 19:03:56 GMT content-type: text/html location: https://hackread.com/ server: cloudflare alt-svc: h3=":443"; ma=86400 x-turbo-charged-by: LiteSpeed cf-cache-status: DYNAMIC nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} report-to: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=ux%2FEgkcDZEKmbRN%2BdfXVDupIag6G1dWdk8jEkgIWY95GU5HJ10RItUJYBdNiO9%2F%2Bgojsli%2FQ5cRB28C1nwYTUEoGZ8OCH%2FUrDgnyE54hFalAVByVawGEayWyEgwdleuWLQVZ"}]} cf-ray: 9ed573f0aaf875f0-CPH HTTP/2 200 date: Thu, 16 Apr 2026 19:03:57 GMT content-type: text/html; charset=UTF-8 link: <https://hackread.com/wp-json/>; rel="https://api.w.org/" link: <https://hackread.com/wp-json/wp/v2/pages/88717>; rel="alternate"; title="JSON"; type="application/json" link: <https://hackread.com/>; rel=shortlink nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} x-litespeed-cache: hit report-to: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=qOohyHkYUmLk0Jz9b%2BEjCGp7GCjB4nGFP6eUWQZ%2FF9JQjiqSSM9Mo50HE9vms8%2BpfZYiMw%2FsUhWq%2BWDVTvEDD%2BH%2BkMmIvIw%2F%2BHHQ1LB8dNoGBwSiwksTcSlYIk4bk%2BM%3D"}]} vary: Accept-Encoding server: cloudflare alt-svc: h3=":443"; ma=86400 x-turbo-charged-by: LiteSpeed cf-cache-status: DYNAMIC cf-ray: 9ed573f32b78a15f-CPH


Hackread

Hacking News

Website Address
Website Status
Alive
Last Alive?
2026-04-16 21:03:57
Last Checked?
2026-04-16 21:03:57
Checked since
2023-08-07 02:01:14
Require TOR?
No
Require Account?
Unknown
Require Invite?
Unknown
Body Title
Hackread - Latest Cybersecurity News, Press Releases &amp; Technology Today
Meta Author
Meta Description
Just another WordPress site
Last-Modified
Wed, 08 Oct 2025 20:15:38 GMT
Server
cloudflare
X-Powered-By
W3 Total Cache/2.4.1
X-AddBlock-Key
Content-Type
text/html; charset=UTF-8
Content-Language
Notes
This was added via the website by hieroo
Backend "Last log" known
[webcheck worker 3] id(189) Hackread: Site is responsive, got HTTPS/200 [webcheck worker 3] id(189) Hackread: Successfully took screenshot