Hi,
We have a client reporting a URL:Mal infection threat detection from code on their website hosted on one of our domains:
lmknjb1[.]com
This is hosted via a global webfarms with endpoint IP’s: 23.96.83.107, 138.91.156.9, 104.40.215.103
None of the domain or IP’s have been blacklisted on any available blacklist I can find.
Please can this detection be reviewed, and any false positive(s) removed.
Requested URL: hxtp://www.lmknjb1.com/< | Response URL: hxtp://www.lmknjb1.com/< | Page title: Runtime Error | HTTP status code: 400 (Bad request) | Response size: 3,420 bytes | Duration: 19 ms
Overview
Custom errors are used to ensure that internal error messages are not exposed to end users. Instead, a custom error message should be returned which provides a friendlier user experience and keeps potentially sensitive internal implementation information away from public view.
Result
It looks like custom errors are not correctly configured as the requested URL contains the heading “Server Error in”.
Custom errors are easy to enable, just configure the web.config to ensure the mode is either “On” or “RemoteOnly” and ensure there is a valid “defaultRedirect” defined for a custom error page as follows:
Certificate error: Wrong certificate installed. 8)
The domain name does not match the certificate common name or SAN.
RC4
Your server’s encryption settings are vulnerable. This server uses the RC4 cipher algorithm which is not secure.
Go Daddy Secure Certificate Authority - G2
This server is vulnerable to a Poodle (SSLv3) attack
polonus (volunteer website security analyst and website error-hunter)
I have unblocked lmknjb1[.]com. It might have been because the domains seems randomly-generated (as are 90 % of the domains on the 3 IPs you mentioned). This is usually a sign of maliciousness, and I strongly advise against it.