Scanned pages/files
Request | Server response | Status |
http://clueby4.net/ | 200 OK Content-Length: 16097 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: ! Mitigate the risk of being hacked by moving to the BlueBurst secure cloud and minimize any damage ...[13184 bytes skipped]... cebook-hit-by-sophisticated-attack-java-zero-day-exploit-to-blame-7000011390/" target="_blank">Facebook</a>, <a href="http://www.zdnet.com/twitter-hacked-250000-users-affected-7000010712/" target="_blank">Twitter </a>and <a href="http://arstechnica.com/security/2012/06/8-million-leaked-passwords-connected-to-linkedin/" target="_blank">LinkedIn</a>! Mitigate the risk of being hacked by moving to the BlueBurst secure cloud and minimize any damage with our regular backups, mod_security rulesets and hardware firewalls.<br /> </div><div class="clear"></div></p> <p><div class="zilla-one-fourth"> <img class="aligncenter" src="http://www.blueburst.net.au/wp-content/uploads/2014/07/bicon-responsible.png" alt="Green Hosting" /> </div><div class="zilla-three-fourth zilla-column-last"></p> <h2>Environmen ...[4988 bytes skipped]... | ||
http://blueburst.net.au/wp-includes/js/jquery/jquery.js?ver=1.11.1 | 200 OK Content-Length: 95720 Content-Type: application/javascript | clean |
http://blueburst.net.au/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1 | 200 OK Content-Length: 7200 Content-Type: application/javascript | clean |
http://blueburst.net.au/wp-includes/js/jquery/ui/jquery.ui.core.min.js?ver=1.10.4 | 200 OK Content-Length: 4289 Content-Type: application/javascript | clean |
http://blueburst.net.au/wp-includes/js/jquery/ui/jquery.ui.widget.min.js?ver=1.10.4 | 200 OK Content-Length: 6521 Content-Type: application/javascript | clean |
http://blueburst.net.au/wp-includes/js/jquery/ui/jquery.ui.accordion.min.js?ver=1.10.4 | 200 OK Content-Length: 8366 Content-Type: application/javascript | clean |
http://blueburst.net.au/wp-includes/js/jquery/ui/jquery.ui.tabs.min.js?ver=1.10.4 | 200 OK Content-Length: 11623 Content-Type: application/javascript | clean |
http://blueburst.net.au/wp-content/plugins/zilla-shortcodes-2.0/assets/js/zilla-shortcodes-lib.js?ver=4.0 | 200 OK Content-Length: 4207 Content-Type: text/html | clean |
http://blueburst.net.au/test404page.js | 404 Not Found Content-Length: 4207 Content-Type: text/html | clean |
https://ec01c392919812c4f818-79afe539d963810002081e6e2a51e67e.ssl.cf2.rackcdn.com/Embed.js | 200 OK Content-Length: 2122 Content-Type: application/javascript | clean |
http://blueburst.net.au/wp-content/themes/sparks/js/jquery.zillamobilemenu.min.js?ver=0.1 | 200 OK Content-Length: 4641 Content-Type: text/html | clean |
http://blueburst.net.au/wp-content/themes/sparks/js/superfish.js?ver=1.7.4 | 200 OK Content-Length: 4207 Content-Type: text/html | clean |
http://blueburst.net.au/wp-content/themes/sparks/js/jquery.fitvids.min.js?ver=1.0 | 200 OK Content-Length: 4641 Content-Type: text/html | clean |
http://blueburst.net.au/wp-content/themes/sparks/js/jquery.isotope.min.js?ver=1.5.25 | 200 OK Content-Length: 4641 Content-Type: text/html | clean |
http://blueburst.net.au/wp-content/themes/sparks/js/jquery.jplayer.min.js?ver=2.3 | 200 OK Content-Length: 4641 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: clueby4.net
Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Tue, 12 May 2015 21:53:14 GMT
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Link: <https://www.blueburst.net.au/>; rel=shortlink
Rt-Fastcgi-Cache: HIT
Set-Cookie: PHPSESSID=ej1bk4qi93lj03c1poujk0cvb0; path=/
Set-Cookie: wfvt_3599493641=55526eeb5c469; expires=Tue, 12-May-2015 21:51:47 GMT; Max-Age=1800; path=/; httponly
X-Pingback: http://blueburst.net.au/xmlrpc.php
X-Powered-By: BlueBurst
GET / HTTP/1.1
Host: clueby4.net
Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Tue, 12 May 2015 21:53:14 GMT
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Link: <https://www.blueburst.net.au/>; rel=shortlink
Rt-Fastcgi-Cache: HIT
Set-Cookie: PHPSESSID=ej1bk4qi93lj03c1poujk0cvb0; path=/
Set-Cookie: wfvt_3599493641=55526eeb5c469; expires=Tue, 12-May-2015 21:51:47 GMT; Max-Age=1800; path=/; httponly
X-Pingback: http://blueburst.net.au/xmlrpc.php
X-Powered-By: BlueBurst
Second query (visit from search engine):
GET / HTTP/1.1
Host: clueby4.net
Referer: http://www.google.com/search?q=clueby4.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: clueby4.net
Referer: http://www.google.com/search?q=clueby4.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=clueby4.net
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://clueby4.net/
Result: clueby4.net is not infected or malware details are not published yet.
Result: clueby4.net is not infected or malware details are not published yet.