Scanned pages/files
Request | Server response | Status |
http://sunspotresorts.com/ | 200 OK Content-Length: 27458 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked By Tunisian Fallaga Team - Bl4ck Ghost-H & LaymenoS & capoo lionel & PeaCeMakeR.XTN <!doctype html> <html> <head lang="en"> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1, user-scalable=no"> <title>Hacked By Tunisian Fallaga Team - Bl4ck Ghost-H & LaymenoS & capoo lionel & PeaCeMakeR.XTN</title> <meta name="description" content="Fallaga Team" /> <meta name="keywords" c ...[36152 bytes skipped]... | ||
http://fallagassrini.xx.tn/index/js/html5shiv.js | 200 OK Content-Length: 9512 Content-Type: application/javascript | clean |
http://fallagassrini.xx.tn/index/js/jquery-1.10.2.min.js | 200 OK Content-Length: 93105 Content-Type: application/javascript | clean |
http://fallagassrini.xx.tn/index/js/jquery-migrate-1.2.1.min.js | 200 OK Content-Length: 7199 Content-Type: application/javascript | clean |
http://fallagassrini.xx.tn/index/js/bootstrap.min.js | 200 OK Content-Length: 27395 Content-Type: application/javascript | clean |
http://fallagassrini.xx.tn/index/js/jquery.easing.1.3.js | 200 OK Content-Length: 8097 Content-Type: application/javascript | clean |
http://fallagassrini.xx.tn/index/fancybox/jquery.fancybox.pack-v=2.1.5.js | 200 OK Content-Length: 23116 Content-Type: application/javascript | clean |
http://fallagassrini.xx.tn/index/js/script.js | 200 OK Content-Length: 8046 Content-Type: application/javascript | clean |
http://sunspotresorts.com//go.pub2srv.com/apu.php?zoneid=16780/ | 200 OK Content-Length: 27458 Content-Type: text/html | clean |
http://sunspotresorts.com//1phads.com/notice.php?p=16781&interactive=1&pushup=1/ | 200 OK Content-Length: 27458 Content-Type: text/html | clean |
http://sunspotresorts.com/test404page.js | 200 OK Content-Length: 27458 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: sunspotresorts.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 19 Dec 2015 22:47:01 GMT
Server: Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/1.0.1e-fips mod_bwlimited/1.4
Content-Type: text/html
X-Powered-By: PHP/5.5.30
GET / HTTP/1.1
Host: sunspotresorts.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 19 Dec 2015 22:47:01 GMT
Server: Apache/2.2.31 (Unix) mod_ssl/2.2.31 OpenSSL/1.0.1e-fips mod_bwlimited/1.4
Content-Type: text/html
X-Powered-By: PHP/5.5.30
Second query (visit from search engine):
GET / HTTP/1.1
Host: sunspotresorts.com
Referer: http://www.google.com/search?q=sunspotresorts.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: sunspotresorts.com
Referer: http://www.google.com/search?q=sunspotresorts.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=sunspotresorts.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://sunspotresorts.com/
Result: sunspotresorts.com is not infected or malware details are not published yet.
Result: sunspotresorts.com is not infected or malware details are not published yet.