Scanned pages/files
Request | Server response | Status |
http://werevip.com/ | 200 OK Content-Length: 8063 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked by Team_CC <head>
<meta http-equiv="Content-Type" content="text/HTML; charset=utf-8" /> <link rel="shortcut icon" href="http://i.imgur.com/WL5gxz5.gif" type="image/x-icon"> <title>Hacked by Team_CC</title> <link href='http://fonts.googleapis.com/css?family=Orbitron' rel='stylesheet' type='text/css'> <link href='http://fonts.googleapis.com/css?family=Wallpoet' rel='stylesheet' type='text/css'> <link href='http://fonts.googleapis.com/css?family=Cherry+Swash' rel='stylesheet' type='text/css'> <link href='http://fonts.googleapis.com/css?family=Audiowide' rel='stylesheet' type='text ...[8801 bytes skipped]... | ||
https://dendicious.googlecode.com/files/snow.js | 200 OK Content-Length: 3305 Content-Type: text/plain | clean |
http://dendicious.googlecode.com/test404page.js | 404 Not Found Content-Length: 1575 Content-Type: text/html | clean |
http://dendicious.googlecode.com//www.google.com/ | 404 Not Found Content-Length: 1561 Content-Type: text/html | clean |
http://otowebsite.googlecode.com/files/Getar.js.txt | 200 OK Content-Length: 739 Content-Type: text/plain | clean |
http://goo.gl/ijGD6 | HTTP/1.1 301 Moved Permanently Cache-Control: no-cache, no-store, max-age=0, must-revalidate Connection: close Date: Fri, 20 Nov 2015 21:57:45 GMT Pragma: no-cache Accept-Ranges: none Location: http://peterjepimarsblog.googlecode.com/files/mousegetar.js Server: GSE Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Expires: Fri, 01 Jan 1990 00:00:00 GMT X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block | clean |
http://peterjepimarsblog.googlecode.com/files/mousegetar.js | 200 OK Content-Length: 6974 Content-Type: text/plain | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: werevip.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 20 Nov 2015 21:57:44 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html
GET / HTTP/1.1
Host: werevip.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 20 Nov 2015 21:57:44 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html
Second query (visit from search engine):
GET / HTTP/1.1
Host: werevip.com
Referer: http://www.google.com/search?q=werevip.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: werevip.com
Referer: http://www.google.com/search?q=werevip.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=werevip.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://werevip.com/
Result: werevip.com is not infected or malware details are not published yet.
Result: werevip.com is not infected or malware details are not published yet.