Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=seksvideos.xxx
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://seksvideos.xxx/
Result: The website is marked by Yandex as suspicious. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Yandex as suspicious. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://seksvideos.xxx/ | HTTP/1.1 301 Moved Permanently Connection: close Date: Mon, 15 Sep 2014 19:35:35 GMT Location: http://www.seksvideos.xxx/ Server: Apache/2 Vary: User-Agent Content-Length: 0 Content-Type: text/html; charset=UTF-8 X-Pingback: http://www.seksvideos.xxx/xmlrpc.php X-Powered-By: PHP/5.4.15 | clean |
http://www.seksvideos.xxx/ | 200 OK Content-Length: 8272 Content-Type: text/html | suspicious |
Suspicious code found <div class="headertop"><!--headertop--> <ul class="topmenu"> <li class="firstitem"><a href="http://www.seksvideos.xxx" title="Home">Home</a></li> </ul> </div><!--headertop--> <div class="headercont"><!--headercont--> <h1 class="logo">< <form action="http://www.seksvideos.xxx/" method="get"> <p class="inputp"><input type="text" name="s" id="s" /></p> <p><input class="sbtn" type="submit" value="" /></p> </form> </div> </div><!--menu--> </div> | ||
http://adspaces.ero-advertising.com/adspace/131897.js | 200 OK Content-Length: 1448 Content-Type: application/javascript | clean |
http://seksvideos.xxx/test404page.js | HTTP/1.1 301 Moved Permanently Cache-Control: no-cache, must-revalidate, max-age=0 Connection: close Date: Mon, 15 Sep 2014 19:35:41 GMT Pragma: no-cache Location: http://www.seksvideos.xxx/test404page.js Server: Apache/2 Vary: User-Agent Content-Length: 0 Content-Type: text/html; charset=UTF-8 Expires: Wed, 11 Jan 1984 05:00:00 GMT X-Pingback: http://www.seksvideos.xxx/xmlrpc.php X-Powered-By: PHP/5.4.15 | clean |
http://www.seksvideos.xxx/test404page.js | 404 Not Found Content-Length: 10543 Content-Type: text/html | suspicious |
Suspicious code found <div class="headertop"><!--headertop--> <ul class="topmenu"> <li class="firstitem"><a href="http://www.seksvideos.xxx" title="Home">Home</a></li> </ul> </div><!--headertop--> <div class="headercont"><!--headercont--> <h1 class="logo">< <form action="http://www.seksvideos.xxx/" method="get"> <p class="inputp"><input type="text" name="s" id="s" /></p> <p><input class="sbtn" type="submit" value="" /></p> </form> </div> </div><!--menu--> </div> | ||
http://adspaces.ero-advertising.com/adspace/131948.js | 200 OK Content-Length: 1812 Content-Type: application/javascript | clean |
http://www.seksvideos.xxx/wp-content/plugins/wp-postratings/postratings-js.js?ver=1.63 | 200 OK Content-Length: 3263 Content-Type: application/javascript | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: seksvideos.xxx
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 15 Sep 2014 19:35:35 GMT
Location: http://www.seksvideos.xxx/
Server: Apache/2
Vary: User-Agent
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.seksvideos.xxx/xmlrpc.php
X-Powered-By: PHP/5.4.15
...0 bytes of data.
GET / HTTP/1.1
Host: seksvideos.xxx
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 15 Sep 2014 19:35:35 GMT
Location: http://www.seksvideos.xxx/
Server: Apache/2
Vary: User-Agent
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.seksvideos.xxx/xmlrpc.php
X-Powered-By: PHP/5.4.15
...0 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: seksvideos.xxx
Referer: http://www.google.com/search?q=seksvideos.xxx
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: seksvideos.xxx
Referer: http://www.google.com/search?q=seksvideos.xxx
Result:
The result is similar to the first query. There are no suspicious redirects found.