Scanned pages/files
Request | Server response | Status |
http://fugleogferie.dk/ | 200 OK Content-Length: 2182 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked By Av3loXiS ...[502 bytes skipped]... # # ##### --> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <link rel="SHORTCUT ICON" href="http://i.hizliresim.com/w1WByj.png"> <title>Hacked By Av3loXiS</title> <style type="text/css"> body { background:url("http://pccholik.bedavahost.biz/154x5s1.gif"); text-shadow:1px 1px 10px #000;} .style1 { text-shadow:3px 3px 3px #000; color: #990000; font-size: 18px; font-weight: bold; } .style1:hover{ text-shadow:3px 3px 3px #000; color: #fff; font-size: 18px; font-weight: bold; } .style2 { text-s ...[1250 bytes skipped]... | ||
http://fugleogferie.dk/test404page.js | HTTP/1.1 301 Moved Permanently Connection: close Date: Thu, 03 Jul 2014 20:26:14 GMT Via: 1.1 varnish Accept-Ranges: bytes Age: 0 Location: http://fugleogferie.dk/test404page.js/ Server: - Meebox Web acceleration - Vary: User-Agent Content-Length: 0 Content-Type: text/html; charset=UTF-8 X-Cache: MISS X-Cacheable: YES X-Pingback: http://fugleogferie.dk/xmlrpc.php X-Powered-By: PHP/5.4.21 X-Varnish: 512214584 | clean |
http://fugleogferie.dk/test404page.js/ | 200 OK Content-Length: 2182 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: fugleogferie.dk
Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Jul 2014 20:26:14 GMT
Via: 1.1 varnish
Accept-Ranges: bytes
Age: 0
Server: - Meebox Web acceleration -
Vary: Accept-Encoding,User-Agent
Content-Length: 2182
Content-Type: text/html; charset=UTF-8
X-Cache: HIT
X-Cache-Hits: 1
X-Cacheable: YES
X-Pingback: http://fugleogferie.dk/xmlrpc.php
X-Powered-By: PHP/5.4.21
X-Varnish: 512214582 512214581
...2182 bytes of data.
GET / HTTP/1.1
Host: fugleogferie.dk
Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Jul 2014 20:26:14 GMT
Via: 1.1 varnish
Accept-Ranges: bytes
Age: 0
Server: - Meebox Web acceleration -
Vary: Accept-Encoding,User-Agent
Content-Length: 2182
Content-Type: text/html; charset=UTF-8
X-Cache: HIT
X-Cache-Hits: 1
X-Cacheable: YES
X-Pingback: http://fugleogferie.dk/xmlrpc.php
X-Powered-By: PHP/5.4.21
X-Varnish: 512214582 512214581
...2182 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: fugleogferie.dk
Referer: http://www.google.com/search?q=fugleogferie.dk
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: fugleogferie.dk
Referer: http://www.google.com/search?q=fugleogferie.dk
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=fugleogferie.dk
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://fugleogferie.dk/
Result: fugleogferie.dk is not infected or malware details are not published yet.
Result: fugleogferie.dk is not infected or malware details are not published yet.