Scanned pages/files
Request | Server response | Status |
http://jagland.net/ | HTTP/1.1 301 Moved Permanently Connection: close Date: Tue, 14 Jul 2015 08:00:06 GMT Location: http://www.jagland.net/ Server: Apache Vary: Accept-Encoding Content-Length: 231 Content-Type: text/html; charset=iso-8859-1 | clean |
http://www.jagland.net/ | 200 OK Content-Length: 4575 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: HackeD By ashkan_eblis <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://ogp.me/ns#" xmlns:fb="http://www.facebook.com/mahdi.rezae.9"> <head> <meta content="text/html; charset=UTF-8" http-equiv="Content-Type"> <title>HackeD By ashkan_eblis</title> <meta name="description" content="Predators-مفترسون" /> <meta name="keywords" content="HackeD By ashkan_eblis" /> <meta name="copyright" content="HackeD By ashkan_eblis" /> <meta name="author" content="HackeD By ashkan_eblis" /> <link rel="icon" type="image/x-icon" href="http://download.mrkzy.c ...[4581 bytes skipped]... | ||
http://www.jagland.net/test404page.js | 200 OK Content-Length: 4575 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: jagland.net
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Tue, 14 Jul 2015 08:00:06 GMT
Location: http://www.jagland.net/
Server: Apache
Vary: Accept-Encoding
Content-Length: 231
Content-Type: text/html; charset=iso-8859-1
...231 bytes of data.
GET / HTTP/1.1
Host: jagland.net
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Tue, 14 Jul 2015 08:00:06 GMT
Location: http://www.jagland.net/
Server: Apache
Vary: Accept-Encoding
Content-Length: 231
Content-Type: text/html; charset=iso-8859-1
...231 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: jagland.net
Referer: http://www.google.com/search?q=jagland.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: jagland.net
Referer: http://www.google.com/search?q=jagland.net
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=jagland.net
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://jagland.net/
Result: jagland.net is not infected or malware details are not published yet.
Result: jagland.net is not infected or malware details are not published yet.