Hi Pondus,
Yes, Martinss should make the live link there non-clickable by using htXp or wXw, and the link is given as clear but the history of Malicious software includes 714 trojans, just does not sound promishing.
This site was hosted on 1 network(s) including AS27823 (Dattatec.com).
See what we can find further:
The clean results is because of Blank page / could not connect
No ad codes identified File size: 725 bytes
File MD5: 9063eaf69e368e1d9c7bcd278c1792b9
This is the script Superhacker means: htxp://www.interbasquet-cba.com.ar//Script.0
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<HTML><HEAD>
<TITLE>404 Not Found</TITLE>
</HEAD><BODY>
<H1>Not Found</H1>
The requested URL //Script.0 was not found on this server.<P>
<P>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.
<HR>
<ADDRESS>Apache/1.3.41 Server at www dot interbasquet-cba.com dot ar Port 80</ADDRESS>
</BODY></HTML>
Server: Apache/1.3.41 (Unix) mod_auth_passthrough/1.8 mod_bwlimited/1.4 mod_log_bytes/1.2 ^^ mod_ssl/2.8.31 OpenSSL/0.9.8e-fips-rhel5 FrontPage/5.0.2.2635 ^^
check for older web software, because of exploits as this could be compromised via PHP: </style>^script>^^
document.location='htxp://www.interbasquet-cba.com.ar/2008/index.php'
<^/script> ^^ broken by me, polonus
</head>
activeX BOF exploit
That's all,
polonus