Website Check

Check Your Websites for Malicious or Suspicious code.


Website Check v0.8

Check Depth : 0 1 ( Image link)

Accept Language: KO US DE CN JP IT

User-Agent : MSIE Android iPhone Chrome Safari

Private : (Detection results of private)

Save Source :

Report

*Date : 2016.08.22 10:49
*Site : http://npc.versus.jp/blog/page/2/
*Title : WEBポイント | フリーWEBデザイナーに向けて&普段何気ないことへの疑問や豆知識、wordpressの小技など掲載 - Part 2
*Info : , ()
*Check url : 15 counts
*Loading time : 6.947322sec
*Google SafeBrowsing(GSB) : npc.versus.jp is Not found
*Result
 (1) user information check - 3count
 (2) Suspicious script has been detected (Fake jQuery script) - 2count
 (3) Application: WordPress 4.2.9 -> 4.5.3 update to the latest version - 1count
 (4) http://dimchap.com/js/jquery.min.php?c_utt=K85164&c_utm= - 1count
 (5) http://dimchap.com/js/jquery.min.php - 1count


Public Link : http://zerocert.org/?code=3d4da0309e8d46f32fb5ef04a6e00d653abd52764e149acfee2e3a00ad3a9321

*Latest detected Domain
  • 이 사이트는 최근 90일 동안 악성URL 삽입된 적이 없습니다.
  • 이 사이트는 최근 90일 동안 악성코드 중개 역할한 적이 없습니다.
  • 이 사이트는 최근 90일 동안 악성코드를 유포한 적이 없습니다.
  • Relation domain not found
  • Relation ip not found
  • same Domain not found
  • same IP not found
  • same IP bands not found
  • same ASN not found

http://npc.versus.jp/blog/page/2/
    -> Suspicious script has been detected (Fake jQuery script)
  [script] http://npc.versus.jp/blog/wp-content/themes/twentyfifteen/js/html5.js
  [script] http://npc.versus.jp/blog/wp-includes/js/jquery/jquery.js?ver=1.11.2
  [script] http://npc.versus.jp/blog/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
    -> user information check
  [script] http://dimchap.com/js/jquery.min.php?c_utt=K85164&c_utm= -> Malware url
    [Location] http://www.dimchap.com/js/jquery.min.php?c_utt=K85164&c_utm=  -> Offline
  [script] http://npc.versus.jp/blog/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20
    -> user information check
  [script] http://npc.versus.jp/blog/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.1.2
  [script] http://npc.versus.jp/blog/wp-content/themes/twentyfifteen/js/skip-link-focus-fix.js?ver=20141010
    -> user information check
  [script] http://npc.versus.jp/blog/wp-content/themes/twentyfifteen/js/functions.js?ver=20141212
  [form] http://npc.versus.jp/blog/
    -> Suspicious script has been detected (Fake jQuery script)
  [script] http://dimchap.com/js/jquery.min.php -> Malware url
    [Location] http://www.dimchap.com/js/jquery.min.php  -> Offline
  [write] http://s.w.org/images/core/emoji/72x72/  -> Offline
  [write] http://npc.versus.jp/blog/wp-includes/js/wp-emoji-release.min.js?ver=4.2.9
*Country
npc.versus.jp - JP, 157.7.107.133 (Tokyo, Japan)



*Whois


---------------------------------------------------------------------------
JPNIC WHOIS$B$G$O%I%a%$%s4XO"$N>pJs8!:w%5!<%S%9$NDs6!$O9T$C$F$*$j$^$;$s!#(B
.JP$B%I%a%$%sL>4XO"$N>pJs$r8!:w$5$l$k>l9g$O!"0J2<$r$4MxMQ$/$@$5$$!#(B

JPRS WHOIS https://whois.jprs.jp/ $B!J8!:w@h%[%9%H!'(Bwhois.jprs.jp$B!K(B
---------------------------------------------------------------------------

1. $B8x3+$7$F$$$k>pJs$N
$B!&%M%C%H%o!<%/>pJs(B
JPNIC$B$G4IM}$7$F$$$k(BIP$B%"%I%l%9%V%m%C%/$N3d$jEv$F>pJs(B

$B!&C4EvpJs(B
$B%M%C%H%o!<%/>pJs!"$^$?$O(BAS$B>pJs$NO"Mm@hC4EvpJs(B


$B!&C4Ev%0%k!<%W>pJs(B(JPNIC $BC4Ev%0%k!<%W>pJs(B)
$B8D?M$G$O$J$/!"%0%k!<%WC10L$G$N%M%C%H%o!<%/>pJs!"$^$?$O(BAS$B>pJs$NO"Mm@h>pJs(B


$B!&(BAS $B>pJs(B
JPNIC$B$G3d$jEv$F$?(BAS$BHV9f$K4X$9$k>pJs(B

$B"(%I%a%$%s>pJs$*$h$S%[%9%H>pJs$N8!:w$K$D$$$F$O(BJPRS WHOIS(whois.jprs.jp)
$B$r$4MxMQ$/$@$5$$!#(B

2. $B8!:wJ}K!(B

2.1 $B>pJs$N IP$B%"%I%l%9!"(BAS$BHV9f!"(BJPNIC$B%O%s%I%k!"%0%k!<%W%O%s%I%k$r(BSTRING$B$H$7!"(B
STRING$B$NFbMF$+$i8!:wBP>]$H$J$k>pJs$N

$B!&(BSTRING $B$,(B IP$B%"%I%l%9$N>l9g(B
$B%M%C%H%o!<%/>pJs$N(B a. [IP$B%M%C%H%o!<%/%"%I%l%9(B]$B$G8!:w(B

$BNc(B1)
whois -h whois.nic.ad.jp 192.168.0.0
whois -h whois.nic.ad.jp 2001:db8::



$B!&(BSTRING $B$,(B JPNIC$B%O%s%I%k$N>l9g(B
$BC4EvpJs$N(B a. [JPNIC$B%O%s%I%k(B]$B$G8!:w(B

$BNc(B2)
whois -h whois.nic.ad.jp XX9999JP


$B!&(BSTRING $B$,(B $B%0%k!<%W%O%s%I%k$N>l9g(B
$BC4Ev%0%k!<%W>pJs$N(B[$B%0%k!<%W%O%s%I%k(B]$B$G8!:w(B

$BNc(B3)
whois -h whois.nic.ad.jp JP99999999


$B!&(BSTRING $B$K(B AS$BHV9f4^$^$l$k>l9g(B
AS$B>pJs$N(Ba.[AS$BHV9f$G8!:w(B]

$BNc(B4)
whois -h whois.nic.ad.jp "AS 2515"


2.2 $B>pJs$N
STRING$B$NA0$KEPO?>pJs$NpJs(B
$B$r$"$i$+$8$a9J$j9~$`$3$H$,$G$-$k!#(BTYPE $B$O(B AS $B$d(B NET $B$J$I(B($B2<5-;2>H(B)

$B!&(BTYPE$B0lMwI=(B
NET : $B%M%C%H%o!<%/>pJs$r(BIP$B%M%C%H%o!<%/%"%I%l%9$G8!:w(B
CONTACT : $BC4EvpJs$r(BJPNIC$B%O%s%I%k$G8!:w(B
GROUP : $BC4Ev%0%k!<%W>pJs$r%0%k!<%W%O%s%I%k$G8!:w(B
AS : AS$B>pJs$r(BAS$BHV9f$G8!:w(B

$BNc(B5) $B%M%C%H%o!<%/>pJs$r(BIP$B%"%I%l%9$G8!:w(B
whois -h whois.nic.ad.jp "NET 192.168.0.1"


2.3 $B;2>H4X78$N8!:w(B

STRING$B$NA0$K!V(B^$B!W$rDI2C$9$k$3$H$K$h$j!"F~NO$7$?(BSTRING$B$+$i;2>H$7$F$$$k(B
$B>pJs$rI=<((B
whois -h whois.nic.ad.jp ^STRING

$BNc(B6)
whois -h whois.nic.ad.jp ^XX9999JP

$B"(>e5-(BNIC$B%O%s%I%k$r;}$DC4EvpJs$r>\:YI=<($7!"Ev3:C4EvpJs$+$i;2>H(B
$B$5$l$F$$$k%M%C%H%o!<%/>pJs$*$h$S(BAS$B>pJs$r%j%9%HI=<((B

3. $BF@$?>pJs$O%M%C%H%o!<%/1?MQ$N$?$a$KMxMQ$7$F$/$@$5$$!#(B


4. $B$5$i$K>\:Y$rCN$j$?$$>l9g$O0J2<$r;2>H$7$F$/$@$5$$!#(B

http://www.nic.ad.jp/ja/whois/index.html


*Reference
 VIRUSTOTAL : domain | ip | hash url | hash file
 Google SafeBrowsing(GSB) :
 URLVoid : domain
 Malware Domain List : domain
 SCUMWARE : domain | ip
 Project Honey Pot : ip
 Ransomware Tracker : domain
 Threat Crowd : domain | ip | hash file
 ZeroCERT Safeguard : domain | ip

*etc
  Stopbadware | Norton Safe | McAfee siteadvisor | Phish tank | Tcpiputils

[Info] Changing api service domain address (center.zerocert.org -> cert.zero.camp), API Reference

- Today malware detected : 380 counts