Suspicious on Javascript Check is: Suspicious
><br /> <a href="htxp://dfiles.ru/files/z3rtxufwl" target="_blank"><span style="font-weight: bold; font-size: 180%;"><span style="font-family: arial black;">download now!!! [deposi... link to RBN IDS flagged site, see:
http://urlquery.net/report.php?id=1397506225585ET CURRENT_EVENTS Probably Evil Long Unicode string only string and unescape 2
404 error check: Suspicious
Suspicious 404 Page:
document.write(unescape("%3cscript src=%27htxp://s10.histats.com/js15.js%27 type=%27text/javascript%27%3e%3c/script%3e")
Check external links for unknown:
htxp://www.addthis.com/bookmark.php?v=250&pubid=ra-4ec7d4ea4 --> ''
htxp://on.fb.me/160j16c --> ' '
htxp://www.albumfiend.com/ --> 'album fiend'
htxp://www.solemp3.com --> 'youtube mp3 converter'
htxp://www.dstreetz.net --> 'free mp3s, videos & mixtapes'
htxp://www.hypemixtapes.com --> 'free mixtapes'
htxp://www.dopehood.com/ --> 'hip hop music'
htxp://www.beats1.com --> 'buy beats'
htxp://www.dopetv.com/ --> 'hip hop videos'
htxp://worldmusiczone.com/ --> 'worldmusiczone'
htxp://www.download-hot-music.com/ --> 'free music'
htxp://skinnyblunts.com/ --> 'skinnyblunts'
htxp://www.mixtapedia.com/ --> 'free uk mixtape'
htxp://get-music.net/ --> 'download free mp3 music'
CMS outdated: Application: WordPress -
http://www.wordpress.orgWeb application version:
WordPress version: WordPress
Wordpress version from source: 3.5.1
Wordpress Version 3.5 based on: htxp://hiphopisdream.com//wp-admin/js/common.js
WordPress directory: htxp://hiphopisdream.com/wp-content
WordPress theme: htxp://hiphopisdream.com/wp-content/themes/Magtel/
WordPress version outdated: Upgrade required.
various unknown html malware found on IP:
http://lists.clean-mx.com/pipermail/viruswatch/20140106/128861.html(virus IP migration)
This might be a scam from the link there:
http://www.sitejabber.com/reviews/www.beastkicks.comThis link might be suspicious: htxp://widgets.amung.us/small.js ->
http://fetch.scritch.org/%2Bfetch/?url=http%3A%2F%2Fwidgets.amung.us%2Fsmall.js&useragent=Fetch+useragent&accept_encoding=see under script there! - peak at it here:
http://jsfiddle.net/HWxXF/ (flagged at Zulu Zscaler scan)
given as benign here:
http://wepawet.iseclab.org/view.php?hash=589c6aef43288fbd378f6d1847823851&t=1393385180&type=jspol