Scanned pages/files
Request | Server response | Status |
http://nooneleftbehindteam.org/ | 200 OK Content-Length: 15001 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked by C4patr0n – MilliKuvvetler.NET Hacked by C4patr0n – MilliKuvvetler.NET <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http://gmpg.org/xfn/11"> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title> EHR Magic, Inc.</title> <link rel="stylesheet" href="http://207.57.25.193/wp-content/themes/FlexiBusiness-1.0/F ...[17096 bytes skipped]... | ||
http://207.57.25.193/wp-includes/js/jquery/jquery.js?ver=1.4.2 | 200 OK Content-Length: 72194 Content-Type: application/x-javascript | clean |
http://207.57.25.193/wp-content/themes/FlexiBusiness-1.0/FlexiBusiness/js/hoverIntent.js?ver=3.0-beta2 | 200 OK Content-Length: 3174 Content-Type: application/x-javascript | clean |
http://207.57.25.193/wp-content/themes/FlexiBusiness-1.0/FlexiBusiness/js/superfish.js?ver=3.0-beta2 | 200 OK Content-Length: 3714 Content-Type: application/x-javascript | clean |
http://207.57.25.193/wp-content/themes/FlexiBusiness-1.0/FlexiBusiness/js/jquery.cycle.all.min.js?ver=3.0-beta2 | 200 OK Content-Length: 29570 Content-Type: application/x-javascript | clean |
http://207.57.25.193/wp-content/themes/FlexiBusiness-1.0/FlexiBusiness/js/scripts.js?ver=3.0-beta2 | 200 OK Content-Length: 541 Content-Type: application/x-javascript | clean |
http://207.57.25.193/wp-content/plugins/wp-spry-menu/SpryAssets/SpryMenuBar.js | 200 OK Content-Length: 10064 Content-Type: application/x-javascript | clean |
http://207.57.25.193/wp-includes/js/jquery/jquery.form.js?ver=2.02m | 200 OK Content-Length: 8429 Content-Type: application/x-javascript | clean |
http://207.57.25.193/wp-content/plugins/contact-form-7/scripts.js?ver=2.2 | 200 OK Content-Length: 4594 Content-Type: application/x-javascript | clean |
http://nooneleftbehindteam.org/ http://www.gpo.gov/fdsys/pkg/PLAW-111publ5/content-detail.html | 404 Not Found Content-Length: 348 Content-Type: text/html | clean |
http://nooneleftbehindteam.org/test404page.js | 404 Not Found Content-Length: 299 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: nooneleftbehindteam.org
Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 04 Apr 2014 13:49:10 GMT
Server: Apache/2.0.64 (Unix)
Content-Type: text/html; charset=UTF-8
X-Pingback: http://207.57.25.193/xmlrpc.php
GET / HTTP/1.1
Host: nooneleftbehindteam.org
Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 04 Apr 2014 13:49:10 GMT
Server: Apache/2.0.64 (Unix)
Content-Type: text/html; charset=UTF-8
X-Pingback: http://207.57.25.193/xmlrpc.php
Second query (visit from search engine):
GET / HTTP/1.1
Host: nooneleftbehindteam.org
Referer: http://www.google.com/search?q=nooneleftbehindteam.org
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: nooneleftbehindteam.org
Referer: http://www.google.com/search?q=nooneleftbehindteam.org
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=nooneleftbehindteam.org
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://nooneleftbehindteam.org/
Result: nooneleftbehindteam.org is not infected or malware details are not published yet.
Result: nooneleftbehindteam.org is not infected or malware details are not published yet.