Malicious/Suspicious Redirects
Request | Server response | Status |
URL: http://keunegulf.com/ (imitation of visitor from search engine) GET / HTTP/1.1 Host: keunegulf.com Referer: http://www.google.com/search?q=redirect+check1 | HTTP/1.1 301 Moved Permanently Connection: close Date: Tue, 23 Sep 2014 05:23:23 GMT Location: http://medpha34.ru/ Server: Apache/2.2.22 (Unix) mod_ssl/2.2.22 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Content-Length: 227 Content-Type: text/html; charset=iso-8859-1 | malicious |
URL: http://medpha34.ru/ (imitation of visitor from search engine) GET / HTTP/1.1 Host: medpha34.ru Referer: http://www.google.com/search?q=redirect+check2 | HTTP/1.1 302 Found Connection: close Date: Tue, 23 Sep 2014 05:23:24 GMT Location: http://doctorsfjxww.com Server: nginx/1.6.2 Vary: Accept-Encoding,User-Agent Content-Length: 0 Content-Type: text/html; charset=UTF-8 X-Powered-By: PHP/5.3.3 | suspicious |
Scanned pages/files
Request | Server response | Status |
http://keunegulf.com/ | 200 OK Content-Length: 365 Content-Type: text/html | clean |
http://keunegulf.com/.ftpquota | 403 Forbidden Content-Length: 330 Content-Type: text/html | clean |
http://keunegulf.com/test404page.js | HTTP/1.1 302 Found Connection: close Date: Tue, 23 Sep 2014 05:23:24 GMT Location: http://medpha34.ru/ Server: Apache/2.2.22 (Unix) mod_ssl/2.2.22 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Content-Length: 203 Content-Type: text/html; charset=iso-8859-1 | clean |
http://medpha34.ru/ | HTTP/1.1 302 Found Connection: close Date: Tue, 23 Sep 2014 05:23:26 GMT Location: http://doctorsfjxww.com Server: nginx/1.6.2 Vary: Accept-Encoding,User-Agent Content-Length: 0 Content-Type: text/html; charset=UTF-8 X-Powered-By: PHP/5.3.3 | clean |
http://doctorsfjxww.com/ | 500 Server closed connection without sending any data back Content-Length: 105 Content-Type: text/plain | clean |
http://doctorsfjxww.com/test404page.js | 500 Server closed connection without sending any data back Content-Length: 105 Content-Type: text/plain | clean |
http://keunegulf.com/cgi-bin/ | 403 Forbidden Content-Length: 329 Content-Type: text/html | clean |
http://keunegulf.com/google501f2bf3338da86f.html | 200 OK Content-Length: 53 Content-Type: text/html | clean |
http://keunegulf.com/in.php | 200 OK Content-Length: 3735 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: |~ Hacked By PaWL ~| <html dir="rtl"> <head> <meta name="keywords" content="|~ Hacked By PaWL ~|"> <meta name="description" content="|~ Hacked By PaWL ~|"> <script language="JavaScript1.2"> // ******************************************************************* // script by drevil_nz, Michael Dillon, Christchurch New Zealand. // Permission granted to use this script provided this credit // remains intact. Visit my homepage www.chc.quik.co.nz/juggler/mikey.html // Scri ...[3831 bytes skipped]... |
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=keunegulf.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://keunegulf.com/
Result: keunegulf.com is not infected or malware details are not published yet.
Result: keunegulf.com is not infected or malware details are not published yet.