Website Check

Check Your Websites for Malicious or Suspicious code.


Website Check v0.8

Check Depth : 0 1 ( Image link)

Accept Language: KO US DE CN JP IT

User-Agent : MSIE Android iPhone Chrome Safari

Private : (Detection results of private)

Save Source :

Report

*Date : 2014.06.11 07:59
*Site : http://1000nara.co.kr/
*Info : 114.31.36.195, KR(Seoul, Korea, Republic of)
*Check url : 39 counts
*Loading time : 0sec
*Google SafeBrowsing : Suspicious url
*Result
 (1) user cookie check - 6건 발견
 (2) 악의적으로 사용된 사례 스크립트(http://) 발견 - 2건 발견
 (3) user tracking code (51yes.com) - 2건 발견
 (4) 악의적으로 사용된 사례 스크립트(Gongda Exploit kit) 발견 - 1건 발견
 (5) Suspicious script has been detected - 1건 발견
 (6) http://www.09file.com/files/vlc-2.0.1.exe - 1건 발견
 (7) http://gangpan.co.kr/data/index.html - 1건 발견
 (8) http://coway.com.ph/index.html - 1건 발견
 (9) user information check - 1건 발견
 (10) user cookie check - 1건 발견
 (11) EXE File Signatures - 1건 발견


http://zerocert.org/?code=2b72b845d51f9458af2fe07e1853e2263b0124e0258bd151427dc4809e9c3329

*Latest detected Domain
  • 이 사이트는 최근 90일 동안 악성URL 삽입된 적이 없습니다.
  • 이 사이트는 최근 90일 동안 악성코드 중개 역할한 적이 없습니다.
  • 이 사이트는 최근 90일 동안 악성코드를 유포한 적이 없습니다.
  • Relation domain not found
  • Relation ip not found
  • same Domain not found
  • same IP not found
  • same IP bands: 172.67.172.x 4cnts
  • same ASN : 35403cnts

http://1000nara.co.kr/
  [Location] http://1000nara.co.kr//new/home/home.asp
    -> user cookie check
    [swf] http://1000nara.co.kr/new/home/swf/top_menu.swf -> pass
    [swf] http://1000nara.co.kr/new/home/swf/top_banner.swf -> pass
    [swf] http://1000nara.co.kr/new/home/swf/main_menu.swf -> pass
    [swf] http://1000nara.co.kr/new/home/swf/sub_menu.swf -> pass
    [swf] http://1000nara.co.kr/new/home/swf/main_b.swf -> pass
    [swf] http://1000nara.co.kr/new/home/swf/event_banner.swf -> pass
    [swf] http://1000nara.co.kr/new/home/swf/1000sadl.swf -> pass
    [script] http://ajax.googleapis.com/ajax/libs/jquery/1.10.1/jquery.min.js -> pass
    [script] http://1000nara.co.kr/new/common/js/jquery.cycle.all.js
      -> 악의적으로 사용된 사례 스크립트(http://) 발견
      -> user cookie check
      [unescape] http://gangpan.co.kr/data/index.html -> Malware url
        -> user tracking code (51yes.com)
        -> Suspicious script has been detected
        -> user cookie check
        [frame] http://coway.com.ph/index.html -> Malware url
          -> (-) d11244d6b25350f14ad296b2d287c4d9
          -> user tracking code (51yes.com)
          -> 악의적으로 사용된 사례 스크립트(Gongda Exploit kit) 발견
          -> user information check
          -> user cookie check
          [swf] http://coway.com.ph/CKCqz1.swf -> pass
          [frame] http://coway.com.ph/CsjoTeV8.html
          [frame] http://coway.com.ph/GQqnCD1.html
          [script] http://coway.com.ph/swfobject.js
          [script] http://coway.com.ph/jpg.js
          [script] http://count18.51yes.com/click.aspx?id=180045926&logo=8
          [script] http://www.09file.com/files/vlc-2.0.1.exe -> Malware url
            -> (-) d500d84fae2cd0c435f44b699973e6d9
            -> EXE File Signatures
          [applet] http://coway.com.ph/noLkp6.jpg
          [applet] http://coway.com.ph/EPFd2.jpg
          [applet] http://coway.com.ph/BWobr0.jpg
          [applet] http://coway.com.ph/CKCqz1.jpg
        [script] http://count41.51yes.com/click.aspx?id=412214993&logo=1
    [script] http://1000nara.co.kr/new/home/swf/js/flash.js
    [script] http://wcs.naver.net/wcslog.js
      -> user cookie check
    [form] http://1000nara.co.kr/new/shopping/list.asp
    [script] http://www.1000nara.com
      [Location] http://www.1000nara.com//new/home/home.asp
        -> user cookie check
        [swf] http://www.1000nara.com/new/home/swf/top_menu.swf -> pass
        [swf] http://www.1000nara.com/new/home/swf/top_banner.swf -> pass
        [swf] http://www.1000nara.com/new/home/swf/main_menu.swf -> pass
        [swf] http://www.1000nara.com/new/home/swf/sub_menu.swf -> pass
        [swf] http://www.1000nara.com/new/home/swf/main_b.swf -> pass
        [swf] http://www.1000nara.com/new/home/swf/event_banner.swf -> pass
        [swf] http://www.1000nara.com/new/home/swf/1000sadl.swf -> pass
        [script] http://www.1000nara.com/new/common/js/jquery.cycle.all.js
          -> 악의적으로 사용된 사례 스크립트(http://) 발견
          -> user cookie check
        [script] http://www.1000nara.com/new/home/swf/js/flash.js
        [form] http://www.1000nara.com/new/shopping/list.asp
*Country
1000nara.co.kr - US, 172.67.172.219 (, United States)



*Whois
query : 1000nara.co.kr


# KOREAN(UTF8)

도메인이름 : 1000nara.co.kr
등록인 : (주)젠텍스
등록인 주소 : 대구광역시 중구 남산로13길 17  
등록인 우편번호 : 41978
책임자 : (주)젠텍스
책임자 전자우편 : zentex@hanmail.net
책임자 전화번호 : +82.1093736226
등록일 : 2002. 08. 30.
최근 정보 변경일 : 2023. 01. 12.
사용 종료일 : 2025. 08. 30.
정보공개여부 : Y
등록대행자 : (주)가비아(http://www.gabia.co.kr)
DNSSEC : 미서명

1차 네임서버 정보
호스트이름 : everton.ns.cloudflare.com

2차 네임서버 정보
호스트이름 : nucum.ns.cloudflare.com

네임서버 이름이 .kr이 아닌 경우는 IP주소가 보이지 않습니다.


# ENGLISH

Domain Name : 1000nara.co.kr
Registrant : zentex
Registrant Address : 17, Namsan-ro 13-gil, Jung-gu, Daegu,  
Registrant Zip Code : 41978
Administrative Contact(AC) : zentex
AC E-Mail : zentex@hanmail.net
AC Phone Number : +82.1093736226
Registered Date : 2002. 08. 30.
Last Updated Date : 2023. 01. 12.
Expiration Date : 2025. 08. 30.
Publishes : Y
Authorized Agency : Gabia, Inc.(http://www.gabia.co.kr)
DNSSEC : unsigned

Primary Name Server
Host Name : everton.ns.cloudflare.com

Secondary Name Server
Host Name : nucum.ns.cloudflare.com


- KISA/KRNIC WHOIS Service -


*Reference
 VIRUSTOTAL : domain | ip | hash url | hash file
 Google SafeBrowsing(GSB) :
 URLVoid : domain
 Malware Domain List : domain
 SCUMWARE : domain | ip
 Project Honey Pot : ip
 Ransomware Tracker : domain
 Threat Crowd : domain | ip | hash file
 ZeroCERT Safeguard : domain | ip

*etc
  Stopbadware | Norton Safe | McAfee siteadvisor | Phish tank | Tcpiputils

[Info] Changing api service domain address (center.zerocert.org -> cert.zero.camp), API Reference