Scanned pages/files
Request | Server response | Status |
http://yesingilizce.com/ | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/?ND | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/?NA | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/?MA | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/?MD | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/?SA | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/?SD | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/?DA | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/?DD | 200 OK Content-Length: 979 Content-Type: text/html | clean |
http://yesingilizce.com/shop/ | 200 OK Content-Length: 2508 Content-Type: text/html | suspicious |
Deface/Content modification. The following signature was found: ---==[ Hacked By Pi.Hack ]==--- <html>
<head> <title>---==[ Hacked By Pi.Hack ]==---</title> <link rel="shortcut icon" href="http://up.irsecteam.org/do.php?img=1430"/> <body onload="type_text()" onclick='alert("By By Admin (: (:")' <body bgcolor="black"> <center><img src="http://nciv.netai.net/up/53fadbd8a1a3.jpg" width="255" height="255"> </br > <center><font face="Snap ITC" color="#006600" size="7">Hacked ...[2562 bytes skipped]... | ||
http://vvs.ir/js/ad.js | 200 OK Content-Length: 0 Content-Type: application/javascript | clean |
http://yesingilizce.com/shop/ymsgr:addfriend?saghack | 404 Not Found Content-Length: 1148 Content-Type: text/html | clean |
http://yesingilizce.com/test404page.js | 404 Not Found Content-Length: 1148 Content-Type: text/html | clean |
http://yesingilizce.com/info/ | 200 OK Content-Length: 2508 Content-Type: text/html | clean |
http://yesingilizce.com/info/ymsgr:addfriend?saghack | 404 Not Found Content-Length: 1148 Content-Type: text/html | clean |
Malicious Redirects
First query (normal visit):
GET / HTTP/1.1
Host: yesingilizce.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 21 Dec 2014 19:56:28 GMT
Server: LiteSpeed
Content-Length: 979
Content-Type: text/html
X-Powered-By: PHP/5.3.28
...979 bytes of data.
GET / HTTP/1.1
Host: yesingilizce.com
Result:
HTTP/1.1 200 OK
Connection: close
Date: Sun, 21 Dec 2014 19:56:28 GMT
Server: LiteSpeed
Content-Length: 979
Content-Type: text/html
X-Powered-By: PHP/5.3.28
...979 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: yesingilizce.com
Referer: http://www.google.com/search?q=yesingilizce.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
GET / HTTP/1.1
Host: yesingilizce.com
Referer: http://www.google.com/search?q=yesingilizce.com
Result:
The result is similar to the first query. There are no suspicious redirects found.
Safe Browsing / Blacklists
Query: http://www.google.com/safebrowsing/diagnostic?site=yesingilizce.com
Result: This site is not currently listed as suspicious.
Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://yesingilizce.com/
Result: yesingilizce.com is not infected or malware details are not published yet.
Result: yesingilizce.com is not infected or malware details are not published yet.