RAW HTTP Header
HTTP/2 301
date: Tue, 03 Feb 2026 12:18:12 GMT
content-type: text/html
location: https://hackread.com/
server: cloudflare
alt-svc: h3=":443"; ma=86400
x-turbo-charged-by: LiteSpeed
cf-cache-status: DYNAMIC
nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
report-to: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=N4JbOgf7KTkIJNasdg6XJznbWXrSoqaFq8vEccIr4kJcGne87NQQVDzKjVTfoYjPYi4O53oxoERboNDbElnarl1x1SJ3b8uadt%2FvUHBK"}]}
cf-ray: 9c81de96fddc92be-CPH
HTTP/2 200
date: Tue, 03 Feb 2026 12:18:12 GMT
content-type: text/html; charset=UTF-8
link: <https://hackread.com/wp-json/>; rel="https://api.w.org/"
link: <https://hackread.com/wp-json/wp/v2/pages/88717>; rel="alternate"; title="JSON"; type="application/json"
link: <https://hackread.com/>; rel=shortlink
nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
x-litespeed-cache: hit
report-to: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=I%2BYGqkd1%2BmRRJ3DMETincmYyouFCIl%2BwAGzsNNVWG1kl9AeZ%2F02WC2bLoEbQaXeUzVAcl23eum%2FRqE2XpOunEgcfQ5xmgbfuHc0%3D"}]}
vary: Accept-Encoding
server: cloudflare
alt-svc: h3=":443"; ma=86400
x-turbo-charged-by: LiteSpeed
cf-cache-status: DYNAMIC
cf-ray: 9c81de9a2a45be42-CPH
Hackread Hacking News |
|
Website Address
|
|
Website Status
Alive
|
|
Last Alive?
2026-02-03 13:18:12
|
|
Last Checked?
2026-02-03 13:18:12
|
|
Checked since
2023-08-07 02:01:14
|
|
Require TOR?
No
|
|
Require Account?
Unknown
|
|
Require Invite?
Unknown
|
|
Body Title
Hackread – Cybersecurity News, Data Breaches, AI, and More
|
|
Meta Author
|
|
Meta Description
Just another WordPress site
|
|
Last-Modified
Wed, 08 Oct 2025 20:15:38 GMT
|
|
Server
cloudflare
|
|
X-Powered-By
W3 Total Cache/2.4.1
|
|
X-AddBlock-Key
|
|
Content-Type
text/html; charset=UTF-8
|
|
Content-Language
|
|
Notes
This was added via the website by hieroo
|
Backend "Last log" known
[webcheck worker 4] id(189) Hackread: Site is responsive, got HTTPS/200
[webcheck worker 4] id(189) Hackread: Successfully took screenshot
