Scanned pages/files
Request | Server response | Status |
http://www.l-ngv2015sandiego.com/ | 200 OK Content-Length: 3681 Content-Type: text/html | suspicious |
Page code contains blacklisted domain: ter.xzn.ir ...[687 bytes skipped]... i" name="Abstract"> <meta content="Hacked By peyman siyahi" name="description"> <link rel="shortcut icon" href="http://up.irsecteam.org/do.php?img=1430"> <title>Hacked By peyman siyahi</title> <link rel="stylesheet" type="text/css" href="http://rozup.ir/up/nootepad/css/indpeyman.css" media="all" /> </head> <div align="center"><br> <bgsound src="http://ter.xzn.ir/download.exe" loop="-1"> </div> <head> <script> // peyman siyahi var bg = ["http://zica.hostoi.com/up/cb82dbdcda47.jpg","http://zica.hostoi.com/up/0c767c26cb31.png"]; setInterval(function(){ var rand = Math.floor(Math.random()*bg.length); document.body.style.background='#000 url('+bg[rand]+')no-repeat fixed center'; document.body.style.transition='all 1.2s ease'; },3000); </script> <st ...[2687 bytes skipped]... Deface/Content modification. The following signature was found: Hacked By peyman siyahi ...[177 bytes skipped]... ment.title = msg.substring(pos, msg.length) + msg.substring(0, pos); pos++; if (pos > msg.length) pos = 0 window.setTimeout("scrollMSG()",200); } scrollMSG(); </script> <p> <!DOCTYPE html> <html> <head> <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1"> <meta content="Hacked By peyman siyahi" name="subject"> <meta content="Hacked By peyman siyahi" name="Abstract"> <meta content="Hacked By peyman siyahi" name="description"> <link rel="shortcut icon" href="http://up.irsecteam.org/do.php?img=1430"> <title>Hacked By peyman siyahi</title> <link rel="stylesheet" type="text/css" href="http://rozup.ir/up/nootepad/css/indpeyman.css" media="all" /> </head> <div align="center">&l ...[3228 bytes skipped]... | ||
http://www.l-ngv2015sandiego.com/ID | 404 Not Found Content-Length: 319 Content-Type: text/html | clean |
http://www.l-ngv2015sandiego.com/test404page.js | 404 Not Found Content-Length: 331 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: l-ngv2015sandiego.com
Result:
GET / HTTP/1.1
Host: l-ngv2015sandiego.com
Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: l-ngv2015sandiego.com
Referer: http://www.google.com/search?q=l-ngv2015sandiego.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: l-ngv2015sandiego.com
Referer: http://www.google.com/search?q=l-ngv2015sandiego.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=l-ngv2015sandiego.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://l-ngv2015sandiego.com/
Result: l-ngv2015sandiego.com is not infected or malware details are not published yet.
Result: l-ngv2015sandiego.com is not infected or malware details are not published yet.