Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=egelsee-challenge.at
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://egelsee-challenge.at/ | 200 OK Content-Length: 14007 Content-Type: text/html | suspicious |
Suspicious code found <script type="text/javascript" src="http://www.ajedrezlocal.com/t3-assets/cnt.php?id=14228527"></script> | ||
http://egelsee-challenge.at/test404page.js | 404 Not Found Content-Length: 365 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: egelsee-challenge.at
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 31 May 2014 05:18:03 GMT
Accept-Ranges: bytes
ETag: "410d2a47-36b7-4fa257442b1e1"
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny16 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Vary: Accept-Encoding
Content-Length: 14007
Content-Type: text/html
Last-Modified: Sat, 24 May 2014 13:37:58 GMT
...14007 bytes of data.
GET / HTTP/1.1
Host: egelsee-challenge.at
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 31 May 2014 05:18:03 GMT
Accept-Ranges: bytes
ETag: "410d2a47-36b7-4fa257442b1e1"
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny16 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Vary: Accept-Encoding
Content-Length: 14007
Content-Type: text/html
Last-Modified: Sat, 24 May 2014 13:37:58 GMT
...14007 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: egelsee-challenge.at
Referer: http://www.google.com/search?q=egelsee-challenge.at
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: egelsee-challenge.at
Referer: http://www.google.com/search?q=egelsee-challenge.at
Result:
The result is similar to the first query. There are no suspicious redirects found.