CBL Lookup Utility
Automated/scripted bulk lookups are forbidden. Upon detection, automated scripts will be denied access, and the source IP may be listed in the CBL.
Enter an IP address:
IP Address 69.25.136.17 is listed in the CBL. It appears to be infected with a spam sending trojan, proxy or some other form of botnet.
It was last detected at 2014-07-07 07:00 GMT (+/- 30 minutes), approximately 2 days, 59 minutes ago.
IMPORTANT
This IP address corresponds to a web site that is infected with a spam or malware forwarding link.
We can now tell that the problem outlined below has been fixed. We recommend that you review instructions below (especially if you weren't the one who fixed it) so as to prevent this happening in future. Once done, you can use the self-removal link below.
In other words the site has been hacked.
Usually, this web site has a redirect that takes the user's browser to a spam or malware site. It's usually fake russian pills or pornography.
The web server's host name is "bimalceramics.com", and this link has an example of the redirect: "http://bimalceramics.com/movies.htm"
Infected servers are usually shared web hosting environments running Cpanel, Plesk, Joomla or Wordpress CMS software that have become compromised either through a vulnerability (meaning the CMS software is out of date and needs patching), or users account information (userids/passwords) have been compromised, and malicious software/files are being uploaded by ftp or ssl.
We believe that these specific infections are frequently done by altering web server access control mechanisms (example, ".htaccess" files on Apache web servers), and causing the redirect to occur on all "404 url not found" errors. We would appreciate it if you can give us copies of the modifications that this infection has made to your system.
It probable that the change was made via SSL or ftp login using userid/password stolen from the "owner" of the hostname/domain. They should run anti-virus tools on their computers, and the password they use to access the web site should be changed immediately.
If you do not recognize the hostname bimalceramics.com as belonging to you, it means that some other account on this shared hosting site has been compromised, and there is NOTHING you (or we) can do to fix the infection. Only the administrator of this machine or the owner of bimalceramics.com can fix it.
WARNING: If you continually delist 69.25.136.17 without fixing the problem, the CBL will eventually stop allowing the delisting of 69.25.136.17.
If you have resolved the problem shown above and delisted the IP yourself, there is no need to contact us.
CBL Lookup Utility
Automated/scripted bulk lookups are forbidden. Upon detection, automated scripts will be denied access, and the source IP may be listed in the CBL.
Enter an IP address:
IP Address 69.25.136.17 is listed in the CBL. It appears to be infected with a spam sending trojan, proxy or some other form of botnet.
It was last detected at 2014-07-07 07:00 GMT (+/- 30 minutes), approximately 2 days, 59 minutes ago.
IMPORTANT
This IP address corresponds to a web site that is infected with a spam or malware forwarding link.
We can now tell that the problem outlined below has been fixed. We recommend that you review instructions below (especially if you weren't the one who fixed it) so as to prevent this happening in future. Once done, you can use the self-removal link below.
In other words the site has been hacked.
Usually, this web site has a redirect that takes the user's browser to a spam or malware site. It's usually fake russian pills or pornography.
The web server's host name is "bimalceramics.com", and this link has an example of the redirect: "http://bimalceramics.com/movies.htm"
Infected servers are usually shared web hosting environments running Cpanel, Plesk, Joomla or Wordpress CMS software that have become compromised either through a vulnerability (meaning the CMS software is out of date and needs patching), or users account information (userids/passwords) have been compromised, and malicious software/files are being uploaded by ftp or ssl.
We believe that these specific infections are frequently done by altering web server access control mechanisms (example, ".htaccess" files on Apache web servers), and causing the redirect to occur on all "404 url not found" errors. We would appreciate it if you can give us copies of the modifications that this infection has made to your system.
It probable that the change was made via SSL or ftp login using userid/password stolen from the "owner" of the hostname/domain. They should run anti-virus tools on their computers, and the password they use to access the web site should be changed immediately.
If you do not recognize the hostname bimalceramics.com as belonging to you, it means that some other account on this shared hosting site has been compromised, and there is NOTHING you (or we) can do to fix the infection. Only the administrator of this machine or the owner of bimalceramics.com can fix it.
WARNING: If you continually delist 69.25.136.17 without fixing the problem, the CBL will eventually stop allowing the delisting of 69.25.136.17.
If you have resolved the problem shown above and delisted the IP yourself, there is no need to contact us.
การแปล กรุณารอสักครู่..