Scanned pages/files
Request | Server response | Status |
http://www.elephantbarcoupons.org/ | 200 OK Content-Length: 8415 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked by Cyb3r Sw0rd <html> <head> <title> Hacked by Cyb3r Sw0rd </title> <script language="JavaScript1.2"> var speed=1 var currentpos=0,alt=1,curpos1=0,curpos2=-1 function initialize(){ startit() } function scrollwindow(){ if (document.all) temp=document.body.scrollTop else ...[9976 bytes skipped]... | ||
http://www.elephantbarcoupons.org/test404page.js | HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 05 Apr 2015 16:02:03 GMT Location: http://elephantbarcoupons.org/test404page.js/ Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 Content-Length: 0 Content-Type: text/html; charset=UTF-8 X-Pingback: http://elephantbarcoupons.org/xmlrpc.php X-Powered-By: PHP/5.4.33 | clean |
http://elephantbarcoupons.org/test404page.js/ | 200 OK Content-Length: 6385 Content-Type: text/html | clean |
http://elephantbarcoupons.org/ | 200 OK Content-Length: 8415 Content-Type: text/html | clean |
http://elephantbarcoupons.org/test404page.js | HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 05 Apr 2015 16:02:05 GMT Location: http://elephantbarcoupons.org/test404page.js/ Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 Content-Length: 0 Content-Type: text/html; charset=UTF-8 X-Pingback: http://elephantbarcoupons.org/xmlrpc.php X-Powered-By: PHP/5.4.33 | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: elephantbarcoupons.org
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 05 Apr 2015 16:02:05 GMT
Accept-Ranges: bytes
ETag: "19340e-20df-503fd339ba1c0"
Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
Content-Length: 8415
Content-Type: text/html
Last-Modified: Fri, 26 Sep 2014 19:48:31 GMT
...8415 bytes of data.
GET / HTTP/1.1
Host: elephantbarcoupons.org
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 05 Apr 2015 16:02:05 GMT
Accept-Ranges: bytes
ETag: "19340e-20df-503fd339ba1c0"
Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4
Content-Length: 8415
Content-Type: text/html
Last-Modified: Fri, 26 Sep 2014 19:48:31 GMT
...8415 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: elephantbarcoupons.org
Referer: http://www.google.com/search?q=elephantbarcoupons.org
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: elephantbarcoupons.org
Referer: http://www.google.com/search?q=elephantbarcoupons.org
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=elephantbarcoupons.org
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://elephantbarcoupons.org/
Result: elephantbarcoupons.org is not infected or malware details are not published yet.
Result: elephantbarcoupons.org is not infected or malware details are not published yet.