Here: http://www.quttera.com/detailed_report/gameclub.byethost8.com
and here: http://zulu.zscaler.com/submission/show/c64e0b6780a550a7798961aa2b248402-1358000192
IDS alerts given here: http://urlquery.net/report.php?id=691070
Content after the < /html> tag should be considered suspicious. Exploitable to EAFlashUpload Remote File Upload.
Vulnerable to bug with Apache Traffic Server: http://www.redmine.audacious-media-player.org/issues/175
and this should well be taken into consideration by the hosters, because the same
IP had “mdl_VBScript Downloader” malcode activity on another domain for 9435 hrs (long overdue) before being closed…
( htxp://postcardss.phpnet.us/cry217/xd.php)
polonus