Website Check

Check Your Websites for Malicious or Suspicious code.


Website Check v0.8

Check Depth : 0 1 ( Image link)

Accept Language: KO US DE CN JP IT

User-Agent : MSIE Android iPhone Chrome Safari

Private : (Detection results of private)

Save Source :

Report

*Date : 2015.12.16 17:28
*Site : http://guminews.co.kr/css/script.js
*Title :
*Info : 121.254.231.119, KR(, Korea, Republic of)
*Check url : 75 counts
*Loading time : 7.12389sec
*Google SafeBrowsing(GSB) : guminews.co.kr is suspicious url.
*Result
 (1) Suspicious url(NULL) - 10count
 (2) user cookie check - 8count
 (3) user information check - 7count
 (4) user tracking code (acecounter.com) - 6count
 (5) http://www.kiznmom.co.kr/h/index.html - 1count
 (6) Suspicious script has been detected (http://) - 1count


http://zerocert.org/?code=778febc1bac00687681576b53467acaf36024360733c9f9923547150823205db

*Latest detected Domain
  • 이 사이트는 최근 90일 동안 악성URL 삽입된 적이 없습니다.
  • 이 사이트는 최근 90일 동안 악성코드 중개 역할한 적이 없습니다.
  • 이 사이트는 최근 90일 동안 악성코드를 유포한 적이 없습니다.
  • Relation domain not found
  • Relation ip not found
  • same Domain not found
  • same IP not found
  • same IP bands not found
  • same ASN not found

http://guminews.co.kr/css/script.js
    -> Suspicious script has been detected (http://)
  [swf] http://guminews.co.kr/css/images/top_menu.swf  -> Offline?
  [script] http://www.macromedia.com/go/getflashplayer
    -> Suspicious url(NULL)
    [Location] http://get.adobe.com/flashplayer
  [unescape] http://www.kiznmom.co.kr/h/index.html -> Malware url
    [Location] http://www.kiz-mom.com
      -> user information check
      -> user cookie check
      -> user tracking code (acecounter.com)
      [swf] http://www.kiz-mom.com/img/menu.swf  -> Offline?
      [swf] http://www.kiz-mom.com/img/main_roll.swf  -> Offline?
      [swf] http://www.kiz-mom.com/img/main_video.swf  -> Offline?
      [swf] http://www.kiz-mom.com/img/main_ban.swf  -> Offline?
      [script] http://weblog2.kiz-mom.co.kr/stat_js.jsp?sitenum=1  -> Offline?
      [script] http://gtp13.acecounter.com:8080/?uid=AB4A36641447672&je=n&
      [script] http://ssl.logger.co.kr/tracker.tsp?u=33829&js=N
        -> Suspicious url(NULL)
      [script] http://wcs.naver.net/wcslog.js
        -> user cookie check
      [script] http://goto.kakao.com/@키즈평촌
        -> Suspicious url(NULL)
        [Location] http://plus.kakao.com/home/%40%C5%B0%EF%BF%BD%EF%BF%BD%EF%BF%BD%EF%BF%BD  -> Offline
      [script] http://goto.kakao.com/@키즈수원
        -> Suspicious url(NULL)
        [Location] http://plus.kakao.com/home/%40%C5%B0%EF%BF%BD%EF%BF%BD%EF%BF%BD  -> Offline
      [script] http://goto.kakao.com/@키즈강남
        -> Suspicious url(NULL)
        [Location] http://plus.kakao.com/home/%40%C5%B0%EF%BF%BD%EE%B0%AD%EF%BF%BD%EF%BF%BD  -> Offline
      [script] http://fs.bizspring.net  -> Offline
      [script] http://blog.naver.com/kiznmom3636
        [script] http://t.static.blog.naver.net/mylog/versioning/Frameset-940371.js
          -> user information check
          -> user cookie check
          [script] http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,0,0
        [script] http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd  -> Offline?
        [script] http://blog.rss.naver.com/kiznmom3636.xml
        [script] http://blog.naver.com/NBlogWlwLayout.nhn?blogId=kiznmom3636
        [script] http://blog.naver.com
      [script] http://josuk.co.kr/
        -> user information check
        -> user cookie check
        -> user tracking code (acecounter.com)
        [swf] http://josuk.co.kr/img/main_video_flash.swf  -> Offline?
        [swf] http://josuk.co.kr/img/main_center_flash.swf
        [swf] http://josuk.co.kr/img/menu.swf  -> Offline?
        [swf] http://josuk.co.kr/img/main_visual.swf  -> Offline?
        [swf] http://josuk.co.kr/img/self_test.swf  -> Offline?
        [swf] http://josuk.co.kr/img/quick.swf  -> Offline?
        [script] http://weblog2.josuk.co.kr/stat_js.jsp?sitenum=1  -> Offline?
        [script] http://gtp12.acecounter.com:8080/?uid=AB3A36641447671&je=n&
        [script] http://ssl.logger.co.kr/tracker.tsp?u=33828&js=N
          -> Suspicious url(NULL)
        [script] http://www.w3.org/1999/xhtml
          [Location] http://www.w3.org/1999/xhtml/
        [script] http://kiznmom.vizensoft.com/cure/after/read.jsp?reqPageNo=3&no=23&searchHospitalFK=0&searchClinicFK=0&stype=&sval=  -> Offline?
        [script] http://www.kiz-mom.co.kr/
          -> user information check
          -> user cookie check
          -> user tracking code (acecounter.com)
          [swf] http://www.kiz-mom.co.kr/img/menu.swf
          [swf] http://www.kiz-mom.co.kr/img/main_roll.swf
          [swf] http://www.kiz-mom.co.kr/img/main_video.swf
          [swf] http://www.kiz-mom.co.kr/img/main_ban.swf
          [script(*)] http://fs.bizspring.net/fs4/bstrk.js
          [script] http://www.kiz-mom.co.kr/include/Function.js
          [script] http://www.googleadservices.com/pagead/conversion.js
          [script] http://astg.widerplanet.com/js/wp_astg_4.0.js
          [script] http://www.kiz-mom.co.kr/include/menu.js
          [script] http://www.kiz-mom.co.kr/include/jquery-1.8.3.min.js
          [script] http://www.kiz-mom.co.kr/include/skdslider.js
      [script] http://eyekiz.co.kr/
        -> user cookie check
        -> user tracking code (acecounter.com)
        [swf] http://eyekiz.co.kr/img/m_care.swf  -> Offline?
        [script] http://gtp5.acecounter.com:8080/?uid=AB1A39043559424&je=n&
        [script] https://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js
          -> user information check
        [script] http://weblog2.eyekiz.co.kr/stat_js.jsp?sitenum=1  -> Offline?
        [script] http://goto.kakao.com/@키즈강남
          -> Suspicious url(NULL)
          [Location] http://plus.kakao.com/home/%40%ED%82%A4%EC%A6%88%EA%B0%95%EB%82%A8
        [script] http://goto.kakao.com/@키즈수원
          -> Suspicious url(NULL)
          [Location] http://plus.kakao.com/home/%40%ED%82%A4%EC%A6%88%EC%88%98%EC%9B%90
        [script] http://goto.kakao.com/@키즈안양
          -> Suspicious url(NULL)
          [Location] http://plus.kakao.com/home/%40%ED%82%A4%EC%A6%88%EC%95%88%EC%96%91
        [script] http://goto.kakao.com/@키즈평촌
          -> Suspicious url(NULL)
          [Location] http://plus.kakao.com/home/%40%ED%82%A4%EC%A6%88%ED%8F%89%EC%B4%8C
        [script] http://josuk.co.kr
          -> user information check
          -> user cookie check
          -> user tracking code (acecounter.com)
          [script] http://josuk.co.kr/include/Function.js
          [script] http://josuk.co.kr/include/menu.js
          [script] http://josuk.co.kr/include/jquery-1.8.3.min.js
          [script] http://josuk.co.kr/include/skdslider.js
        [script] http://www.kiz-mom.co.kr
          -> user information check
          -> user cookie check
          -> user tracking code (acecounter.com)
      [script] http://goto.kakao.com/@?°??Æ???  -> Offline
      [script] http://goto.kakao.com/@?°??¼?¿ø  -> Offline
      [script] http://goto.kakao.com/@?°??°­³²  -> Offline
*Country
guminews.co.kr - KR, 121.78.244.52 (, Republic of Korea)



*Whois
query : guminews.co.kr


# KOREAN(UTF8)

도메인이름 : guminews.co.kr
등록인 : 강진우
책임자 : 강진우
책임자 전자우편 : ak_2010@naver.com
등록일 : 2006. 04. 21.
최근 정보 변경일 : 2020. 07. 15.
사용 종료일 : 2026. 04. 21.
정보공개여부 : N
등록대행자 : 메가존(주)(http://HOSTING.KR)
DNSSEC : 미서명
등록정보 보호 : clientTransferProhibited

1차 네임서버 정보
호스트이름 : ns1.netproserver.com

2차 네임서버 정보
호스트이름 : ns2.netproserver.com

네임서버 이름이 .kr이 아닌 경우는 IP주소가 보이지 않습니다.


# ENGLISH

Domain Name : guminews.co.kr
Registrant : Kang jinu
Administrative Contact(AC) : Kang jinu
AC E-Mail : ak_2010@naver.com
Registered Date : 2006. 04. 21.
Last Updated Date : 2020. 07. 15.
Expiration Date : 2026. 04. 21.
Publishes : N
Authorized Agency : Megazone(http://HOSTING.KR)
DNSSEC : unsigned
Domain Status : clientTransferProhibited

Primary Name Server
Host Name : ns1.netproserver.com

Secondary Name Server
Host Name : ns2.netproserver.com


- KISA/KRNIC WHOIS Service -


*Reference
 VIRUSTOTAL : domain | ip | hash url | hash file
 Google SafeBrowsing(GSB) :
 URLVoid : domain
 Malware Domain List : domain
 SCUMWARE : domain | ip
 Project Honey Pot : ip
 Ransomware Tracker : domain
 Threat Crowd : domain | ip | hash file
 ZeroCERT Safeguard : domain | ip

*etc
  Stopbadware | Norton Safe | McAfee siteadvisor | Phish tank | Tcpiputils

[Info] Changing api service domain address (center.zerocert.org -> cert.zero.camp), API Reference

- Today malware detected : 80 counts