About all

Infected iv sites. IV Line Infections: Causes, Symptoms, Prevention, and Treatment

What are the main causes of IV line infections. How can you recognize the symptoms of an IV line infection. What are the best practices for preventing IV line infections. How are IV line infections typically treated.

Содержание

Understanding IV Lines and Their Importance in Medical Care

Intravenous (IV) lines are essential medical devices used to administer fluids, medications, and blood products directly into a patient’s bloodstream. Also known as cannulas or drips, these small plastic tubes are inserted into a vein, typically in the hand or arm, using a needle. While IV lines are crucial for many medical treatments, they also come with potential risks, including infection.

IV lines serve several important purposes in healthcare:

  • Delivering fluids to prevent or treat dehydration
  • Administering medications quickly and effectively
  • Providing blood transfusions
  • Supplying nutrients to patients who cannot eat
  • Allowing for frequent blood sampling without repeated needle sticks

Despite their benefits, IV lines create a direct pathway into the body, which can potentially allow harmful bacteria to enter the bloodstream if proper precautions are not taken.

Common Causes of IV Line Infections

IV line infections occur when bacteria enter the body through the small opening created by the cannula. There are several factors that can increase the risk of developing an IV line infection:

Bacterial Contamination

The most common cause of IV line infections is bacterial contamination. This can happen in several ways:

  • Poor hand hygiene by healthcare workers
  • Inadequate skin preparation before insertion
  • Contamination of the IV line or equipment during insertion or maintenance
  • Bacteria from the patient’s skin entering the insertion site

Duration of IV Line Placement

The longer an IV line remains in place, the higher the risk of infection. This is because bacteria have more time to colonize the catheter and enter the bloodstream.

Patient Factors

Certain patient characteristics can increase the likelihood of developing an IV line infection:

  • Weakened immune system
  • Severe underlying illness
  • Advanced age
  • Poor nutritional status

Environmental Factors

Hospital environments can harbor various pathogens, including antibiotic-resistant bacteria. Crowded conditions and high patient turnover can increase the risk of cross-contamination.

Recognizing the Symptoms of IV Line Infections

Early detection of IV line infections is crucial for prompt treatment and prevention of more serious complications. Patients and healthcare providers should be vigilant for the following signs and symptoms:

Local Symptoms

These symptoms occur at or near the IV insertion site:

  • Pain or tenderness
  • Redness or swelling
  • Warmth around the insertion site
  • Discharge or pus
  • Hardening or thickening of the vein (phlebitis)

Systemic Symptoms

If the infection spreads to the bloodstream, more severe symptoms may develop:

  • Fever or chills
  • Rapid heart rate
  • Low blood pressure
  • Confusion or disorientation
  • Nausea and vomiting

Is it possible for an IV line infection to progress to sepsis? Yes, if left untreated, an IV line infection can lead to sepsis, a life-threatening condition where the body’s response to infection causes widespread inflammation and organ dysfunction. This is why prompt recognition and treatment of IV line infections are essential.

Prevention Strategies for IV Line Infections

Preventing IV line infections is a critical aspect of patient care. Healthcare facilities and providers should implement comprehensive strategies to minimize the risk of these infections:

Hand Hygiene

Proper hand hygiene is the cornerstone of infection prevention. Healthcare workers should:

  • Wash hands thoroughly with soap and water or use an alcohol-based hand sanitizer before and after any contact with IV lines
  • Wear sterile gloves when inserting or manipulating IV lines

Aseptic Technique

Using sterile techniques during IV line insertion and maintenance is crucial:

  • Thoroughly clean the insertion site with an antiseptic solution
  • Use sterile equipment and dressings
  • Maintain a sterile field during insertion

Regular Assessment and Maintenance

Ongoing care of IV lines includes:

  • Daily assessment of the insertion site for signs of infection
  • Prompt removal of unnecessary IV lines
  • Regular changing of dressings and IV tubing according to hospital protocols

Patient Education

Empowering patients to participate in their care can help prevent infections:

  • Educate patients about the signs of infection to report
  • Encourage patients to speak up if they notice healthcare workers not following proper hygiene practices
  • Instruct patients on how to care for their IV line and what activities to avoid

How often should IV lines be replaced to prevent infection? The Centers for Disease Control and Prevention (CDC) recommends replacing peripheral IV catheters every 72-96 hours in adults. However, some facilities may have policies for more frequent changes, especially in high-risk patients.

Diagnosis and Assessment of IV Line Infections

When an IV line infection is suspected, prompt diagnosis is essential to guide appropriate treatment. The diagnostic process typically involves several steps:

Clinical Evaluation

Healthcare providers will perform a thorough physical examination, looking for local and systemic signs of infection. They will also review the patient’s medical history and current symptoms.

Laboratory Tests

Several laboratory tests may be ordered to confirm the presence of infection and identify the causative organism:

  • Blood cultures: Samples are taken from the IV line and from a separate vein to compare bacterial growth
  • Complete blood count (CBC): To check for elevated white blood cell count, indicating infection
  • C-reactive protein (CRP) and erythrocyte sedimentation rate (ESR): These inflammatory markers may be elevated in the presence of infection

Imaging Studies

In some cases, imaging studies may be necessary to assess the extent of the infection or rule out complications:

  • Ultrasound: To check for thrombophlebitis or abscess formation
  • Chest X-ray: If there’s suspicion of a lung infection secondary to the IV line infection

Catheter Tip Culture

If the IV line is removed, the tip may be sent for culture to identify the specific bacteria causing the infection.

What is the gold standard for diagnosing catheter-related bloodstream infections? The gold standard involves comparing quantitative blood cultures drawn from the catheter and a peripheral vein. A colony count from the catheter sample that is 3-5 times higher than the peripheral sample is indicative of a catheter-related infection.

Treatment Approaches for IV Line Infections

The treatment of IV line infections depends on the severity of the infection and the patient’s overall health status. The primary goals are to eliminate the infection and prevent complications.

Catheter Removal

In many cases, the first step in treating an IV line infection is to remove the infected catheter. This eliminates the source of infection and allows the insertion site to heal.

Antibiotic Therapy

Antibiotics are the mainstay of treatment for IV line infections:

  • Empiric therapy: Broad-spectrum antibiotics are often started before culture results are available
  • Targeted therapy: Once the causative organism is identified, antibiotics may be adjusted for more specific treatment
  • Duration: Antibiotic treatment typically lasts 7-14 days, depending on the severity of the infection and the patient’s response

Supportive Care

Additional supportive measures may include:

  • Intravenous fluids to maintain hydration
  • Pain management
  • Fever reduction
  • Close monitoring of vital signs and laboratory values

Management of Complications

In cases where complications such as sepsis or endocarditis have developed, more intensive treatment may be necessary, including:

  • Admission to an intensive care unit
  • Longer courses of intravenous antibiotics
  • Surgical intervention in severe cases

Can IV line infections be treated without removing the catheter? While catheter removal is often recommended, in some cases, especially with long-term central venous catheters, attempts may be made to salvage the line using antibiotic lock therapy in addition to systemic antibiotics. However, this approach is only suitable for certain types of infections and requires close monitoring.

Long-Term Management and Follow-Up Care

After the acute treatment of an IV line infection, ongoing management and follow-up care are essential to ensure complete resolution of the infection and prevent recurrence.

Monitoring for Resolution

Patients should be closely monitored for signs that the infection is resolving:

  • Regular assessment of symptoms
  • Follow-up blood tests to check for normalization of inflammatory markers
  • Repeat blood cultures to ensure clearance of bacteremia

Rehabilitation and Recovery

Some patients may require additional support during recovery:

  • Physical therapy to regain strength, especially after prolonged hospitalization
  • Nutritional support to aid healing
  • Psychological support to address any anxiety or trauma related to the infection

Prevention of Recurrence

Strategies to prevent future IV line infections should be implemented:

  • Education on proper hygiene and wound care
  • Careful consideration of the need for future IV lines
  • Implementation of stricter protocols for IV line care in high-risk patients

Long-Term Complications

In some cases, IV line infections can lead to long-term complications that require ongoing management:

  • Chronic venous insufficiency
  • Recurrent infections
  • Post-thrombotic syndrome in cases complicated by deep vein thrombosis

How long should patients be monitored after treatment for an IV line infection? Patients should be monitored for at least 2-4 weeks after completing antibiotic therapy to ensure there is no recurrence of infection. In cases of more severe infections or in immunocompromised patients, longer follow-up periods may be necessary.

Emerging Technologies and Future Directions in IV Line Infection Prevention

As healthcare continues to evolve, new technologies and approaches are being developed to further reduce the incidence of IV line infections. These innovations hold promise for improving patient safety and outcomes.

Antimicrobial Catheters

Catheters coated with antimicrobial agents are being developed and tested:

  • Silver-impregnated catheters
  • Antibiotic-coated catheters
  • Catheters with novel antimicrobial materials

Advanced Dressing Technologies

New dressing materials and designs aim to reduce the risk of bacterial colonization:

  • Chlorhexidine-impregnated dressings
  • Transparent antimicrobial film dressings
  • Smart dressings that change color to indicate infection

Improved Monitoring Systems

Technology is being developed to provide real-time monitoring of IV lines:

  • Sensors that detect early signs of infection
  • Automated systems for tracking catheter dwell time and scheduling replacements
  • Artificial intelligence algorithms for predicting infection risk

Novel Sterilization Techniques

Advanced sterilization methods are being explored to enhance the safety of IV line insertion and maintenance:

  • UV light sterilization of insertion sites
  • Plasma-based sterilization of catheters and equipment
  • Nanotechnology-based antimicrobial surfaces

What role might artificial intelligence play in preventing IV line infections? AI could potentially analyze patient data, environmental factors, and catheter characteristics to predict the risk of infection, allowing for preemptive interventions. Additionally, AI-powered imaging technologies could assist in more accurate placement of IV lines, reducing the risk of complications that can lead to infection.

IV line infection – HSE.ie

Warning notification:Warning

Unfortunately, you are using an outdated browser. Please, upgrade your browser to improve your experience with HSE. The list of supported browsers:

  1. Chrome
  2. Edge
  3. FireFox
  4. Opera
  5. Safari

An intravenous (IV) line is a small plastic tube that goes into your vein. It is used to give you blood, fluids or medicine.

An IV line is also known as a cannula or drip. A needle is used to put the line through your skin into your vein.

How you get an IV line infection

An IV line creates a small hole in your skin. There is a risk that bacteria will travel along the tube and into your body.

Information:

IV lines are useful but can cause problems. They can become blocked, leak fluid into the skin and cause infection.

Preventing an IV line infection

It is OK to ask a doctor or nurse:

  • if you really need an IV line – if you do not have an IV line, you’re less at risk of getting an infection
  • to clean their hands before they put in or touch your IV line
  • to clean your skin before putting the IV line in
  • if you still need an IV line in – the longer it’s in, the greater the risk of infection

It is OK to ask someone caring for you to clean their hands.

Symptoms of an IV line infection

Symptoms of IV line infection include:

  • pain where your IV line is
  • redness or swelling near the IV line
  • crusting or scabbing appears on skin near your IV line
  • oozing fluid, blood or pus from where the IV line goes through your skin

Important

Talk to your doctor or nurse straight away if you notice any of these symptoms.

Bloodstream infection

Sepsis (bloodstream infection) is a serious infection. It happens when bacteria spread to your blood.

Bloodstream infection can cause:

  • a high temperature
  • chills
  • nausea (feeling sick)
  • weakness

Tell your doctor or nurse straight away if you notice any of the above.

Causes of an IV line infection

An IV line is more likely to cause an infection in people who are already very sick.

There are lots of people in hospital with infections or superbugs. It’s easy for these to spread in hospital.

Treatment of an IV line infection

Your doctor or nurse will talk to you about taking out the IV line and any treatment you might need. This may include antibiotics.

Page last reviewed: 23 September 2022

Next review due: 23 September 2025

What are the stages of catheter-related phlebitis?

Phlebitis stages indicates the severity of inflammation in a vein due to an intravenous (IV) catheter. The score ranges from 0–4, according to how severe the symptoms are.

Symptoms in the early stage involve redness and pain at the IV site. If the condition progresses to the advanced stage, additional symptoms include swelling and a palpable venous cord, which is firmness in the vein.

In the early stage, doctors recommend removing the IV device and inserting a new one in another site. If phlebitis reaches the medium stage, they advise considering treatment.

One treatment may entail topical anti-inflammatory medications for people to apply to the skin over the vein. Another treatment option is an oral medication to reduce the formation of blood clots.

Keep reading to learn more about phlebitis stages due to IV therapy, causes, diagnosis, treatment, and outlook.

Phlebitis is the inflammation of a vein, which results in redness, swelling, and pain. It can happen in an arm when a person receives IV therapy in a hospital.

The condition may also occur from a blood clot. When this happens, it is called thrombophlebitis. This may affect veins near the surface of the skin or deeper veins, but it usually occurs in the leg.

The staging system only applies to phlebitis due to IV therapy, a method of putting fluids into the bloodstream. It involves inserting a tube called a cannula into a vein. Approximately 25–35% of people who receive IV therapy in a hospital acquire phlebitis, notes an older 2002 study.

The chart below shows the phlebitis staging scale for IV therapy.

StageDescription
Score of 0.The IV site looks healthy.
Score of 1.The IV site looks slightly red, and a person experiences slight pain near the site.
Score of 2, or early-stage phlebitis.Redness and pain at the IV site are present.
Score of 3, or medium stage phlebitis.Redness, swelling, and pain along the path of the IV cannula are present.
Score of 4, or advanced stage phlebitis.Signs include redness, swelling, a palpable venous cord, and pain along the path of the IV cannula.

Causes of phlebitis include:

  • infection
  • injury
  • irritation

The use and removal of an IV can lead to these causes. A 2016 study explains that IV-related phlebitis may stem from:

  • Mechanical damage: This may happen when movement of the IV cannula inside a vein produces friction. It can also be due to irritation when a cannula is too wide for a vein.
  • Chemical damage: This may occur when a drug or other component of fluid flowing through an IV has a characteristic that produces vein irritation.
  • Infection: In response to IV insertion, bacteria may infiltrate a vein. This can create serious complications if the infection develops into sepsis. In sepsis, the infection leaves the IV site and becomes systemic, or circulates throughout the body.

Aside from IV therapy, thrombophlebitis can cause injury or trauma to a vein. If it affects a vein close to the skin surface, doctors call this superficial thrombophlebitis.

Risk factors for surface thrombophlebitis include:

  • smoking
  • taking oral contraceptives or hormone replacement therapy
  • pregnancy
  • underlying cancer

If phlebitis involves an IV site, a diagnosis may be evident by observing the symptoms.

In contrast, if symptoms suggest superficial thrombophlebitis, the following procedures are necessary for diagnosis:

  • Physical examination: This entails noting any symptoms of redness, warmth, and tenderness over the track of a surface vein, along with a palpable cord.
  • Medical history: This includes discovering whether a person has risk factors or conditions that may cause injury to a vein.
  • Ultrasound: This imaging test can show the extent of superficial thrombophlebitis. It may also determine whether it has developed into the complication of deep vein thrombosis, a blood clot in a deep vein.
  • D-dimer blood test: This test measures a protein fragment that results when a blood clot dissolves. As the level of D-dimer is not always higher than normal in superficial thrombophlebitis, its use is limited.

Treatment of IV-related phlebitis differs from the treatment of superficial thrombophlebitis.

Treatment for IV-related phlebitis

In the early stage, experts recommend removing the IV and inserting a new one in a different site. Once phlebitis reaches the medium stage, they also advise considering treatment.

A 2015 review evaluated the effectiveness of treatments for IV-related phlebitis. Due to limited, poor-quality data, the authors concluded that research is too preliminary to determine how well current treatments work. However, options include:

  • Topical treatments. Examples include a nonsteroidal anti-inflammatory drug such as diclofenac gel (Voltaren) or a medication to reduce swelling of inflamed veins such as heparinoid (Hirudoid).
  • Nonsteroidal anti-inflammatory drugs: These decrease inflammation and include medications, such as ibuprofen.

Treatment for superficial thrombophlebitis

Research from 2018 reports that most cases of superficial thrombophlebitis resolve on their own. Treatment may involve:

  • elevating the leg above the heart to reduce swelling
  • wearing elastic stockings
  • applying warm compresses to the area
  • using topical or oral anti-inflammatory medications

If superficial thrombophlebitis is more severe, treatment may include an anticoagulant, such as fondaparinux (Arixtra).

When the cause of the condition is an infection, in rare cases, treatment may necessitate surgical removal of the infected part of the vein.

Cases of phlebitis from an IV infusion can range from those involving mild discomfort to those with severe complications, such as sepsis. The outlook depends on the severity.

Phlebitis stages are a grading system that doctors use to diagnose and monitor the severity of inflammation of a vein associated with IV therapy.

Doctors do not use phlebitis stages to diagnose the severity of thrombophlebitis. Instead, the diagnostic process involves a physical exam, history, and ultrasound.

There are some differences in treatment between IV-related phlebitis and thrombophlebitis. Yet both conditions may entail treatment with nonsteroidal anti-inflammatory drugs or anticoagulants.

Website infection

Website infection is carried out through security flaws in web application code and component configuration flaws that allow cybercriminals to hack and inject malicious code.

Modern business is inextricably linked with the use of web technologies. For large companies, entire portals are being developed, which are essentially sets of applications and are used in business or production processes. But as soon as access to them becomes possible via the Internet, they turn out to be a tasty target for cybercriminals. Most often, attacks on websites are carried out through the vulnerabilities of their components.

One can never be sure whether a site opened in a browser is infected. Knownly dangerous sites (warez, torrents), as well as popular and completely legal resources can be infected.

Classification of website infection methods

  1. Infection via FTP. Many webmasters use file managers to work with the site via FTP, which save passwords and logins for automatic authorization. Often, such data is stored in unencrypted form, and if a computer is infected with malware, it can get to intruders.
  2. Some content management systems (CMS) are not protected against brute force attacks. They do not provide for CAPTCHA checks, limiting the number of attempts to enter passwords. If you use a standard login (Admin or Administrator) and a password consisting of only digits, then hacking and infecting a website is greatly simplified.
  3. Open vulnerabilities in the CMS can also provide an attacker with unauthorized access. This is possible if an outdated version of the content management system is used.
  4. Webmasters, creating and developing a site, are faced with the need to purchase paid modules, components and plug-ins. Their cost can be high, and it is quite natural to seek hacked free options. Knowing that webmasters want to save money, cybercriminals publish such versions with embedded malicious code that will either infect the site or open it for remote administration.

Threat source

Malicious programs are used by attackers to achieve certain goals:

  • Implementation of exploits for the subsequent covert installation of potentially dangerous programs to site visitors and customers.
  • Redirect traffic to adware, spyware, phishing and other unwanted content.
  • Intercepting and assigning visits when entering specific search terms.
  • Promotion of web addresses with questionable content (this phenomenon is called black hat optimization).
  • Use of server capabilities for illegal activity, such as conducting DDoS attacks.

Any actions of dishonest developers are aimed at making a profit. Methods can be very different: from intercepting traffic flows to increase the number of visits to stealing keys from electronic wallets and other confidential information.

A particular danger of site infection is that it is often invisible to the administrator. Site owners may not be aware of the problem, since the malicious code will be given according to the configured targeting (for a certain region, at a certain time, on a certain platform).

How does a website become infected?

The easiest way is to crack a password by brute force or dictionary attack. This tactic takes a lot of time and is ineffective, so it is rarely used in mass infections. Much more often, vulnerabilities in the content management system or special software for stealing passwords are used.

Most modern CMS platforms are far from perfect, they contain many vulnerabilities, due to which third parties can download any information. Developers regularly test their own products for bugs, but updates with bugs found and fixed usually do not come out immediately, and many people use even older versions, which can have a lot of bugs. Not surprisingly, vulnerabilities are often found in the common platforms WordPress, Joomla and the like.

Skilled cybercriminals allow webmasters to infect their site themselves. Such an event is possible when attackers share useful CMS modules with malicious content, which the webmaster downloads and adds to the site, thereby infecting it.

In some cases, attackers used a different method. At first, software was distributed that was designed to search for and unauthorized copy of FTP account data by making changes to client services or by scanning network traffic. The applications then connected to the C&C and downloaded pre-made scripts or modified versions of the original content. This led to a re-infection of a once infected computer even after changing registration information, rolling back to a previous state, or restoring from a previously created backup.

Summarizing the above, we can conclude that infection can be carried out in one of the following ways:

  • The malicious code was deliberately placed by the owner for illegal profit or other purposes.
  • The site was hacked and a piece of potentially dangerous content was placed on it by third party hackers; today it is one of the most common options.
  • The unwanted object is not contained on the site itself, but in the external content code placed on the page. In this case, the attack does not go directly, but through the banner network, widgets, or other similar components; the infection spreads through all sites whose pages contain a link to the infected object.

Risk analysis

Studies show that the risk of visiting an infected site is very high. In this case, the infection can occur imperceptibly. It is especially likely to acquire unwanted “passengers” in the following cases:

  • using a computer with vulnerable software for surfing and other activities on the Internet;
  • persistent and daily use of the administrator account;
  • selection of primitive passwords that are easy to crack;
  • Untimely update of security solutions.

The consequences can range from receiving constant spam and similar messages to losing control of your social media accounts or losing a significant portion of your money.

If symptoms are detected, the site should be deactivated to prevent further spread of the malicious load. You should then check the server logs for signs of unauthorized activity. This can help identify infected components and their possible pathways.

To completely restore the contents of the server, a backup copy created before the infection and the latest versions of all programs designed to work with the equipment are installed.

If a clean copy is not available, automated tools should be used to identify potentially harmful entries. Many antivirus products contain a similar option, and specialized online scanners have also been developed for this purpose. For a more thorough check, you can alternately use several of these solutions, some of which will determine the level of threat and point to fragments containing suspicious entries. After that, anti-virus scanning of all files placed on the server is carried out.

Server owners can perform a comprehensive check of their servers. The content is downloaded to the local machine and scanned by an antivirus with a built-in heuristic module. The second method shows better results in the fight against such threats.

If the automatic scan fails, you can try to find and remove malicious content manually. This is a very time-consuming process, during which you have to check each file for the presence of extraneous scripts. Particular attention should be paid to obscure or unreadable passages. Code obfuscation is not typical for software used in website building. If you find its slightest signs, you must carefully check everything. Similarly, links to external resources are identified.

To prevent infection, you must adhere to certain rules:

  • Use a complex login and password for the site. Install modules that display CAPTCHA when entering the administration panel, limit the number of attempts to enter a password. The password must be at least 8 characters long; Be sure to use both letters and numbers.
  • Periodically back up and scan all files.
  • Ensure that the computer that is managing the site is as secure as possible.
  • When using file managers to work with the site, do not save your login and password. Even if the FTP server is only accessible from your IP address, there is still a risk of infection.
  • Use the latest version of CMS, update it and all modules in a timely manner.
  • Do not use hacked versions of plug-ins, components, modules. Try to purchase them on well-established developer sites.

Official information about coronavirus in Russia on the portal – stopcoronavirus.rf

window.yaContextCb.push(()=>{
ya.adfoxCode.createAdaptive({
ownerId: 699232
containerId: ‘adfox_16594540782315496’,
params: {
pp: ‘g’,
ps: ‘fxsi’,
p2: ‘htzo’
}
}, [‘desktop’, ‘tablet’], {
tabletWidth: 1023
phoneWidth: 767
isAutoReloads: false
})
})

window.yaContextCb.push(()=>{
ya.adfoxCode.createAdaptive({
ownerId: 699232,
containerId: ‘adfox_165945411636098147’,
params: {
pp: ‘g’,
ps: ‘fxsi’,
p2: ‘htzq’
}
}, [‘phone’], {
tabletWidth: 1023
phoneWidth: 767
isAutoReloads: false
})
})

News

  • July 20, 10:02 • TASS

    Vladimir Putin believes that all healthcare programs in Russia are “aimed at the individual”
  • July 19, 09:40 • RT

    Infectionist Tkachenko stated that it is too early to talk about the departure of COVID-19
  • July 18, 11:00 • STOPCORONAVIRUS. RF

    In Russia, 4,643 people recovered in a week
  • July 17, 09:01 • RUSSIAN GAZETA

    Mikhail Murashko: widespread introduction of artificial intelligence programs into practice has begun
  • July 16, 09:08 • TASS

    Murashko said that the regions are actively involved in the organization of geriatric care

View all news

window.yaContextCb.push(()=>{
ya.adfoxCode.createAdaptive({
ownerId: 699232
containerId: ‘adfox_165945424881161083’,
params: {
pp: ‘h’,
ps: ‘fxsi’,
p2: ‘htzo’
}
}, [‘desktop’, ‘tablet’], {
tabletWidth: 1023
phoneWidth: 767
isAutoReloads: false
})
})

window.yaContextCb.push(()=>{
ya.adfoxCode.createAdaptive({
ownerId: 699232,
containerId: ‘adfox_165945416122152949’,
params: {
pp: ‘h’,
ps: ‘fxsi’,
p2: ‘htzq’
}
}, [‘phone’], {
tabletWidth: 1023
phoneWidth: 767
isAutoReloads: false
})
})

Learn more about coronavirus

COVID-19

Psychologist Natalya Kurdyukova.