Scanned pages/files
Request | Server response | Status |
http://mysql-jp.info/ | 200 OK Content-Length: 8173 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked by Murkho Manob ...[1590 bytes skipped]... ysql-jp.info/wp-includes/theme.php</b> on line <b>508</b><br /> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head profile="http://gmpg.org/xfn/11"> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>Hacked by Murkho Manob</title> <meta name="generator" content="WordPress ME2.2.3" /> <!-- leave this for stats please --> <style type="text/css" media="screen"> @import url( http://mysql-jp.info/wp-content/themes/EasyAll/style.css ); </style> <link rel="alternate" type="application/rss+xml" title="RSS 2.0" href="http://mysql-jp.info/?feed=rss2" /> <link rel="alternate" type="text/xml" title="RSS .92" href="http://mysql-jp.info/?fee ...[8543 bytes skipped]... | ||
http://mysql-jp.info//cache1.value-domain.com/xrea_header.js/ | 404 Not Found Content-Length: 356 Content-Type: text/html | clean |
http://mysql-jp.info/test404page.js | 404 Not Found Content-Length: 331 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: mysql-jp.info
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 06 Sep 2015 16:00:24 GMT
Server: Apache
Vary: User-Agent,Accept-Encoding
Content-Type: text/html
GET / HTTP/1.1
Host: mysql-jp.info
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 06 Sep 2015 16:00:24 GMT
Server: Apache
Vary: User-Agent,Accept-Encoding
Content-Type: text/html
Second query (visit from search engine):
GET / HTTP/1.1
Host: mysql-jp.info
Referer: http://www.google.com/search?q=mysql-jp.info
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: mysql-jp.info
Referer: http://www.google.com/search?q=mysql-jp.info
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=mysql-jp.info
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://mysql-jp.info/
Result: mysql-jp.info is not infected or malware details are not published yet.
Result: mysql-jp.info is not infected or malware details are not published yet.