Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=bustnow.com
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://bustnow.com/ | HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 21 Sep 2014 12:12:37 GMT Location: http://www.bustnow.com/ Server: Apache Content-Type: text/html; charset=iso-8859-1 | clean |
http://www.bustnow.com/ | 200 OK Content-Length: 130251 Content-Type: text/html | suspicious |
Page code contains blacklisted domain: reviews.bustnow.com <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>BustNow - Free Porn Tube Videos and Adult Sex Clips</title> <meta name="Description" content="BustNow is highly trusted and enjoyed by millions of porn tube lovers and free sex movie watching sur ...[3911 bytes skipped]... | ||
http://www.bustnow.com/ram/public/jquery.js | 200 OK Content-Length: 91580 Content-Type: application/x-javascript | clean |
http://www.bustnow.com/ram/public/ram.thumbs.js | 200 OK Content-Length: 1900 Content-Type: application/x-javascript | clean |
http://media.bustnow.com/www/delivery/spcjs.php?id=1&target=_blank | 200 OK Content-Length: 2315 Content-Type: application/x-javascript | clean |
http://s7.addthirs.com/js/250/addthirs_widget.js | 200 OK Content-Length: 7103 Content-Type: text/javascript | clean |
http://www.bustnow.com/javascripts/jkmegamenu.js | 200 OK Content-Length: 6427 Content-Type: application/x-javascript | clean |
http://adspaces.ero-advertising.com/adspace/206998.js | 200 OK Content-Length: 1861 Content-Type: application/javascript | clean |
http://www.allxxxbabes.com/widget2.php?domain=bustnow.com&cols=1&rows=1&pad=0&width=180 | 200 OK Content-Length: 514 Content-Type: text/html | clean |
http://www.allxxxbabes.com/\"http://www.allxxxbabes.com/gallery/6493/Hot-Pink-Party-Dress.html\" | 200 OK Content-Length: 32838 Content-Type: text/html | malicious |
Page code contains blacklisted domain: allxxxbabes-com.baberush.com <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http://gmpg.org/xfn/11"> <base href="http://www.allxxxbabes.com" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><script type="text/javascript">window.NREUM||(NREUM={}),__nr_require=f ...[3985 bytes skipped]... Malicious iFrame found. size: 720x710 src: http://allxxxbabes-com.baberush.com/widget1.php?id=18&col=3&row=2&width=230&height=345&border=1&color=7c7c7c&mv=5&mh=4&pv=0&ph=0 This URL is marked by Yandex as suspicious <iframe allowtransparency="1" frameborder="0" height="710" scrolling="no" src="http://allxxxbabes-com.baberush.com/widget1.php?id=18&col=3&row=2&width=230&height=345&border=1&color=7c7c7c&mv=5&mh=4&pv=0&ph=0" width="720"> | ||
https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js | 200 OK Content-Length: 94840 Content-Type: text/javascript | clean |
http://media.allxxxbabes.com/js/javascripts.js | 200 OK Content-Length: 115100 Content-Type: application/x-javascript | clean |
http://mobile.juicyads.com/js/jam_min.js | 200 OK Content-Length: 21397 Content-Type: application/x-javascript | clean |
http://adspaces.ero-advertising.com/adspace/202252.js | 200 OK Content-Length: 1556 Content-Type: application/javascript | clean |
http://adspaces.ero-advertising.com/adspace/221815.js | 200 OK Content-Length: 0 Content-Type: application/javascript | clean |
http://www.allxxxbabes.com/ | 200 OK Content-Length: 32745 Content-Type: text/html | malicious |
Page code contains blacklisted domain: allxxxbabes-com.baberush.com <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http://gmpg.org/xfn/11"> <base href="http://www.allxxxbabes.com" /> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><script type="text/javascript">window.NREUM||(NREUM={}),__nr_require=f ...[3985 bytes skipped]... Malicious iFrame found. size: 720x710 src: http://allxxxbabes-com.baberush.com/widget1.php?id=18&col=3&row=2&width=230&height=345&border=1&color=7c7c7c&mv=5&mh=4&pv=0&ph=0 This URL is marked by Yandex as suspicious <iframe allowtransparency="1" frameborder="0" height="710" scrolling="no" src="http://allxxxbabes-com.baberush.com/widget1.php?id=18&col=3&row=2&width=230&height=345&border=1&color=7c7c7c&mv=5&mh=4&pv=0&ph=0" width="720"> |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: bustnow.com
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sun, 21 Sep 2014 12:12:37 GMT
Location: http://www.bustnow.com/
Server: Apache
Content-Type: text/html; charset=iso-8859-1
GET / HTTP/1.1
Host: bustnow.com
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sun, 21 Sep 2014 12:12:37 GMT
Location: http://www.bustnow.com/
Server: Apache
Content-Type: text/html; charset=iso-8859-1
Second query (visit from search engine):
GET / HTTP/1.1
Host: bustnow.com
Referer: http://www.google.com/search?q=bustnow.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: bustnow.com
Referer: http://www.google.com/search?q=bustnow.com
Result:
The result is similar to the first query. There are no suspicious redirects found.