Scanned pages/files
Request | Server response | Status |
http://bank-transactions-inc-san-diego.com/ | 200 OK Content-Length: 8021 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked by Team_CC <head>
<meta http-equiv="Content-Type" content="text/HTML; charset=utf-8" /> <link rel="shortcut icon" href="http://i.imgur.com/WL5gxz5.gif" type="image/x-icon"> <title>Hacked by Team_CC</title> <link href='http://fonts.googleapis.com/css?family=Orbitron' rel='stylesheet' type='text/css'> <link href='http://fonts.googleapis.com/css?family=Wallpoet' rel='stylesheet' type='text/css'> <link href='http://fonts.googleapis.com/css?family=Cherry+Swash' rel='stylesheet' type='text/css'> <link href='http://fonts.googleapis.com/css?family=Audiowide' rel='stylesheet' type='text ...[8759 bytes skipped]... | ||
https://dendicious.googlecode.com/files/snow.js | 200 OK Content-Length: 3305 Content-Type: text/plain | clean |
http://dendicious.googlecode.com/test404page.js | 404 Not Found Content-Length: 1575 Content-Type: text/html | clean |
http://dendicious.googlecode.com//www.google.com/ | 404 Not Found Content-Length: 1561 Content-Type: text/html | clean |
http://otowebsite.googlecode.com/files/Getar.js.txt | 200 OK Content-Length: 739 Content-Type: text/plain | clean |
http://goo.gl/ijGD6 | HTTP/1.1 301 Moved Permanently Cache-Control: no-cache, no-store, max-age=0, must-revalidate Connection: close Date: Sat, 28 Nov 2015 02:54:31 GMT Pragma: no-cache Accept-Ranges: none Location: http://peterjepimarsblog.googlecode.com/files/mousegetar.js Server: GSE Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Expires: Fri, 01 Jan 1990 00:00:00 GMT X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block | clean |
http://peterjepimarsblog.googlecode.com/files/mousegetar.js | 200 OK Content-Length: 6974 Content-Type: text/plain | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: bank-transactions-inc-san-diego.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 28 Nov 2015 02:54:29 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 8021
Content-Type: text/html
...8021 bytes of data.
GET / HTTP/1.1
Host: bank-transactions-inc-san-diego.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 28 Nov 2015 02:54:29 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 8021
Content-Type: text/html
...8021 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: bank-transactions-inc-san-diego.com
Referer: http://www.google.com/search?q=bank-transactions-inc-san-diego.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: bank-transactions-inc-san-diego.com
Referer: http://www.google.com/search?q=bank-transactions-inc-san-diego.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=bank-transactions-inc-san-diego.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://bank-transactions-inc-san-diego.com/
Result: bank-transactions-inc-san-diego.com is not infected or malware details are not published yet.
Result: bank-transactions-inc-san-diego.com is not infected or malware details are not published yet.