On same IP there is malware here:
http://urlquery.net/report.php?id=1497984002929Custom errors: Fail
Requested URL: hxtp://www.lmknjb1.com/< | Response URL: hxtp://www.lmknjb1.com/< | Page title: Runtime Error | HTTP status code: 400 (Bad request) | Response size: 3,420 bytes | Duration: 19 ms
Overview
Custom errors are used to ensure that internal error messages are not exposed to end users. Instead, a custom error message should be returned which provides a friendlier user experience and keeps potentially sensitive internal implementation information away from public view.
Result
It looks like custom errors are not correctly configured as the requested URL contains the heading "Server Error in".
Custom errors are easy to enable, just configure the web.config to ensure the mode is either "On" or "RemoteOnly" and ensure there is a valid "defaultRedirect" defined for a custom error page as follows:
<customErrors mode="RemoteOnly" defaultRedirect="~/Error" /> ->
https://urlscan.io/result/8601ee12-be43-44e1-8a10-1fe6b64ebbf9/dom/ http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) - Potentially risky methods: TRACE
nameserver salt.master salt.minion using master DNS: zone.easydns.com. . No excessive server info proliferation found.
Consider PulseSecure for Barracuda....
Certificate error: Wrong certificate installed.
The domain name does not match the certificate common name or SAN.
RC4
Your server's encryption settings are vulnerable. This server uses the RC4 cipher algorithm which is not secure.
Go Daddy Secure Certificate Authority - G2
This server is vulnerable to a Poodle (SSLv3) attack
polonus (volunteer website security analyst and website error-hunter)