Scanned pages/files
Request | Server response | Status |
http://classicbeaute.com/ | 200 OK Content-Length: 11629 Content-Type: text/html | clean |
http://classicbeaute.com/Scripts/jquery.1.6.1.js | 200 OK Content-Length: 91341 Content-Type: application/javascript | clean |
http://classicbeaute.com/Scripts/scrollingcarousel.2.0.min.js | 200 OK Content-Length: 7351 Content-Type: application/javascript | clean |
http://classicbeaute.com/Scripts/jqfloat.js | 200 OK Content-Length: 3377 Content-Type: application/javascript | clean |
http://classicbeaute.com/index.php | 200 OK Content-Length: 11629 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked By Malw4r3 ...[69 bytes skipped]... " "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="viewport" content="width=990, initial-scale=1, maximum-scale=1"> <meta name="description" content="Hacked By Malw4r3" /> <meta name="keywords" content="Hacked By Malw4r3" /> <title>Hacked By Malw4r3</title> <link href="Scripts/type_style.css" rel="stylesheet" type="text/css" /> <link href="css/default.css" rel="stylesheet" type="text/css" /> <script src="Scripts/jquery.1.6.1.js" type="text/javascript"></script> <script src="Scripts/scrollingcarousel.2.0.min.js" type="text/javascript"></script> <styl ...[12821 bytes skipped]... | ||
http://classicbeaute.com/contactus.php | 200 OK Content-Length: 10488 Content-Type: text/html | clean |
http://classicbeaute.com/Scripts/contactus.js | 200 OK Content-Length: 3248 Content-Type: application/javascript | clean |
http://classicbeaute.com/aboutus.php | 200 OK Content-Length: 12971 Content-Type: text/html | clean |
http://classicbeaute.com/Scripts/lightbox/js/jquery.lightbox-0.5.js | 200 OK Content-Length: 19679 Content-Type: application/javascript | clean |
http://classicbeaute.com/service.php | 200 OK Content-Length: 8330 Content-Type: text/html | clean |
http://classicbeaute.com/brand.php | 200 OK Content-Length: 13504 Content-Type: text/html | clean |
http://classicbeaute.com/Scripts/jquery.cycle.all.js | 200 OK Content-Length: 51308 Content-Type: application/javascript | clean |
http://classicbeaute.com/Scripts/jquery.easing.1.3.js | 200 OK Content-Length: 8097 Content-Type: application/javascript | clean |
http://classicbeaute.com/Scripts/jquery.mousewheel.js | 200 OK Content-Length: 2235 Content-Type: application/javascript | clean |
http://classicbeaute.com/Scripts/jquery.jscrollpane.min.js | 200 OK Content-Length: 14616 Content-Type: application/javascript | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: classicbeaute.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Wed, 23 Sep 2015 12:30:29 GMT
Server: Apache
Content-Type: text/html
GET / HTTP/1.1
Host: classicbeaute.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Wed, 23 Sep 2015 12:30:29 GMT
Server: Apache
Content-Type: text/html
Second query (visit from search engine):
GET / HTTP/1.1
Host: classicbeaute.com
Referer: http://www.google.com/search?q=classicbeaute.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: classicbeaute.com
Referer: http://www.google.com/search?q=classicbeaute.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=classicbeaute.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://classicbeaute.com/
Result: classicbeaute.com is not infected or malware details are not published yet.
Result: classicbeaute.com is not infected or malware details are not published yet.