Scanned pages/files
Request | Server response | Status |
http://beeaif.com/ | 200 OK Content-Length: 48367 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: !-- Hacked By Phenomene Dz -- <Script Language='Javascript'>
<!-- Hacked By Phenomene Dz --> <!-- Facebook.com/J1jeI <!-- Twitter.com/phenodz document.write(unescape('%3C%73%63%72%69%70%74%20%6C%61%6E%67%75%61%67%65%3D%4A%61%76%61%53%63%72%69%70%74%3E%6D%3D%27%25%33%43%68%65%61%64%25%33%45%25%30%41%25%33%43%74%69%74%6C%65%25%33%45%48%61%63%6B%65%64%25%32%30%42%79%25%32%30%50%68%65%6E%6F%6D%65%6E%65%25%32%30%44%7A%25%33%43%2F%74%69%74%6C%65%25%33%45%25%30%41%25%33%43%6C%69%6E%6B%25%32%30%52% ...[47915 bytes skipped]... | ||
http://beeaif.com/test404page.js | 200 OK Content-Length: 48367 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: beeaif.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Wed, 01 Jul 2015 14:01:01 GMT
Server: nginx
Content-Type: text/html; charset=UTF-8
GET / HTTP/1.1
Host: beeaif.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Wed, 01 Jul 2015 14:01:01 GMT
Server: nginx
Content-Type: text/html; charset=UTF-8
Second query (visit from search engine):
GET / HTTP/1.1
Host: beeaif.com
Referer: http://www.google.com/search?q=beeaif.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: beeaif.com
Referer: http://www.google.com/search?q=beeaif.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=beeaif.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://beeaif.com/
Result: beeaif.com is not infected or malware details are not published yet.
Result: beeaif.com is not infected or malware details are not published yet.