Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=seksymoscow.ru
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://seksymoscow.ru/
Result: The website is marked by Yandex as SMS-fraud resource. - visiting this web site may harm your computer.
Details are available here.
Result: The website is marked by Yandex as SMS-fraud resource. - visiting this web site may harm your computer.
Details are available here.
Scanned pages/files
Request | Server response | Status |
http://seksymoscow.ru/ | 200 OK Content-Length: 60223 Content-Type: text/html | malicious |
Malicious code found. Script contains blacklisted domain: www.stdate.ru var HTTP_FULL_PATH = ''; var xOffsetPreview = -15; var yOffsetPreview = -200; var IMGDIZHOME = 'http://www.stdate.ru:80/sex-znkm'; | ||
http://seksymoscow.ru/images/smrb_moscowwhite/js/jquery-1.5.2.min.js | 200 OK Content-Length: 85925 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/jquery/jquery.js | 200 OK Content-Length: 57254 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/jquery/jquery.blockUI.js | 200 OK Content-Length: 15235 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/jquery/jquery.previewImg.js | 200 OK Content-Length: 1740 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/initAjax.js | 200 OK Content-Length: 3629 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/global.js | 200 OK Content-Length: 10140 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/index.js | 200 OK Content-Length: 2257 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/joindiv.js | 200 OK Content-Length: 6506 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/anketa.js | 200 OK Content-Length: 4669 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/videoset.js | 200 OK Content-Length: 2172 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/rotate.js | 200 OK Content-Length: 614 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/javascript/podpiska.js | 200 OK Content-Length: 5173 Content-Type: application/x-javascript | clean |
http://www.stdate.ru:80/sex-znkm/images/smrb_moscowwhite/js/checkform.js | 200 OK Content-Length: 2105 Content-Type: application/x-javascript | clean |
http://seksymoscow.ru/index.php | 200 OK Content-Length: 60223 Content-Type: text/html | malicious |
Malicious code found. Script contains blacklisted domain: www.stdate.ru var HTTP_FULL_PATH = ''; var xOffsetPreview = -15; var yOffsetPreview = -200; var IMGDIZHOME = 'http://www.stdate.ru:80/sex-znkm'; |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: seksymoscow.ru
Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Date: Thu, 26 Feb 2015 09:23:38 GMT
Pragma: no-cache
Server: nginx/1.2.1
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Set-Cookie: PHPSESSID=umpud4t59uav07gh3bca9921u2; path=/
X-Powered-By: PHP/5.4.36-0+deb7u3
GET / HTTP/1.1
Host: seksymoscow.ru
Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Date: Thu, 26 Feb 2015 09:23:38 GMT
Pragma: no-cache
Server: nginx/1.2.1
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Set-Cookie: PHPSESSID=umpud4t59uav07gh3bca9921u2; path=/
X-Powered-By: PHP/5.4.36-0+deb7u3
Second query (visit from search engine):
GET / HTTP/1.1
Host: seksymoscow.ru
Referer: http://www.google.com/search?q=seksymoscow.ru
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: seksymoscow.ru
Referer: http://www.google.com/search?q=seksymoscow.ru
Result:
The result is similar to the first query. There are no suspicious redirects found.