Blog for hpHosts, and whatever else I feel like writing about ....

Thursday, 1 September 2011 update: Sorry chaps, you're not doing enough have had quite the history, with a plethora of abuse of their service. They've previously been responsive as far as takedowns, but lately there's been no response, and those reported over the past week, have remained active.

A lot of the domains are pointing to an IP that resolves to, but this isn't actually a parking server - it is a redirector;


HTTP/1.1 302 Found
Date: Fri, 02 Sep 2011 01:58:56 GMT
Server: Apache
X-Powered-By: PHP/5.3.2
Set-Cookie: PHPSESSID=5c2mjglhtfudm0sh7fccd4nc74; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8

HTTP headers:

HTTP/1.1 200 OK
Server: nginx/1.0.4
Date: Fri, 02 Sep 2011 02:57:46 GMT
Content-Type: text/html; charset=ISO-8859-1
Connection: close
X-Powered-By: PHP/5.1.6
Set-Cookie: PHPSESSID=pfs66j960cmdrbu92riib1nnf1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding,User-Agent
Content-Encoding: gzip
Content-Length: 8742

Which results in;

This being one of the less "fully malicious" sites. They may have claimed to stop allowing free registrations, but it appears all of those previously created, are still active, and whilst only a suspicion, I've got a feeling they're still allowing the bulk creation of new free hostnames.

Bearing in mind, fake meds are the least of your problems when visiting a created site. A lot of them are also leading to malware and exploits and such.

A small smattering of hostnames on for example (known for exploits), includes;

And a little history from the past 9 months (and I'm confident there's a lot I'm not aware of) of the "everything and anything" collection, from fake meds to trojans and exploits (obviously a lot of these are now dead (hence the "history")), sorry about the file, Blogger didn't seem to like me embedding the list directly (400 Bad Request error);

I realise of course, that there's others that are far far worse (,, etc etc), but as I've said before, either they get a grip and get this cleaned up, or those of us that are sick of having to deal with the rubbish from their service, are going to have their site taken off them (I've done that with others, and wouldn't have a problem having theirs taken off of them).

/update 13:38

Well, it looks like have seen the blog, as I've received 8 e-mails from them in quick succession this morning, to tell me the hostnames have now been suspended/taken out - time will tell (and I'll be re-testing them all to make sure).

As for you, re-active is good and all - but not good enough. If you can't be pro-active, you need to shut the service down *completely* until you can be. The same goes for those running,,,, et al.

As an aside for those wondering, a friend over at Malware Domains posted a list of these secondary sites for those that would like to pro-actively block the entire lot of them in one go.


Finally: cancels free "domain" registration service!

No comments: