Scanned pages/files
Request | Server response | Status |
http://www.myoffershop.com/ | HTTP/1.1 301 Moved Permanently Connection: close Date: Tue, 01 Dec 2015 10:45:29 GMT Location: http://myoffershop.com/ Server: Apache Content-Length: 0 Content-Type: text/html; charset=UTF-8 X-Pingback: http://myoffershop.com/xmlrpc.php X-Powered-By: PHP/5.3.29 | clean |
http://myoffershop.com/ | 200 OK Content-Length: 1861 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked by ShooteR ...[455 bytes skipped]... > background-attachment: fixed; background-repeat: no-repeat; background-size: cover; } </style><center> <img src="http://zonehmirrors.org/defaced/2015/04/23/www.itc.sa/cyberpolice.persiangig.com/images.jpeg"> </center> <center style="yellow-top:50px;"> <font size="35" face=" One" style="text-shadow: 0 0 32px #ffffff ">Hacked by ShooteR</font><br> <center style="margin-top:59;"> <font size="5" face=" One" style="text-shadow: 0 0 18px #ff0000"></font><br> <font size="6" face=" One" style="text-shadow: 0 0 6px #ffffff">Y!D : Shooter.hack@yahoo.com</font><br> <font size="5" face=" One" style="text-shadow: 0 0 18px #ff0000"></font><br> <font size="5" face=" One" style="text-shadow: 0 0 18px ...[941 bytes skipped]... | ||
http://myoffershop.com/test404page.js | 404 Not Found Content-Length: 3686 Content-Type: text/html | clean |
http://myoffershop.com//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js/ | HTTP/1.1 301 Moved Permanently Cache-Control: no-cache, must-revalidate, max-age=0 Connection: close Date: Tue, 01 Dec 2015 10:45:34 GMT Pragma: no-cache Location: http://myoffershop.com/pagead2.googlesyndication.com/pagead/js/adsbygoogle.js/ Server: Apache Content-Length: 0 Content-Type: text/html; charset=UTF-8 Expires: Wed, 11 Jan 1984 05:00:00 GMT X-Pingback: http://myoffershop.com/xmlrpc.php X-Powered-By: PHP/5.3.29 | clean |
http://myoffershop.com/pagead2.googlesyndication.com/pagead/js/adsbygoogle.js/ | 404 Not Found Content-Length: 3726 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: myoffershop.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 01 Dec 2015 10:45:31 GMT
Server: Apache
Content-Length: 1861
Content-Type: text/html; charset=UTF-8
X-Pingback: http://myoffershop.com/xmlrpc.php
X-Powered-By: PHP/5.3.29
...1861 bytes of data.
GET / HTTP/1.1
Host: myoffershop.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 01 Dec 2015 10:45:31 GMT
Server: Apache
Content-Length: 1861
Content-Type: text/html; charset=UTF-8
X-Pingback: http://myoffershop.com/xmlrpc.php
X-Powered-By: PHP/5.3.29
...1861 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: myoffershop.com
Referer: http://www.google.com/search?q=myoffershop.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: myoffershop.com
Referer: http://www.google.com/search?q=myoffershop.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=myoffershop.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://myoffershop.com/
Result: myoffershop.com is not infected or malware details are not published yet.
Result: myoffershop.com is not infected or malware details are not published yet.