New scan:

Malware Scanner report for batt-girl.com

Malicious/Suspicious/Total urls checked
0/0/11
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked By .:::MaeSTro-GhoL:::.  (6 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.batt-girl.com/
200 OK
Content-Length: 6270
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked By .:::MaeSTro-GhoL:::.

...[3215 bytes skipped]...

<script language="JavaScript">

msg = new Array(); //strings written in screen

msg[0] = "<h2 style=' color: white; font-family: monospace; margin-top: 12;'>We Don't Want Your Website ... We Want To Share This Message 'PalesTine is Free' </h2>";

msg[1] = "<h1 color='red'> <font face='Webdings' size='6'>!</font>Hacked By .:::MaeSTro-GhoL:::.<font face='Webdings' size='6'>!</font></h1>";


msg[2] = "<h3 color='green'> Free PaleStine </h3>";

msg[3] = "<h4 style='color: aqua;'> #&#8206;GazaUnderAttack&#8236; <span>&#8234;#&#8206;PrayForGaza&#8236;</span> &#8234;<span>#&#8206;AJAGAZA&#8236;</span><span> &#8234;#&#8206;ICC4Israel&#8236;</span&
...[3969 bytes skipped]...


http://www.batt-girl.com/test404page.js
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 19 Mar 2015 09:40:18 GMT
Location: http://batt-girl.com/test404page.js/
Server: nginx/1.6.2
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://batt-girl.com/xmlrpc.php
clean
http://batt-girl.com/test404page.js/
200 OK
Content-Length: 7978
Content-Type: text/html
clean
http://batt-girl.com/wp-includes/js/comment-reply.min.js?ver=3.5
200 OK
Content-Length: 786
Content-Type: application/javascript
clean
http://batt-girl.com/wp-includes/js/jquery/jquery.js?ver=1.8.3
200 OK
Content-Length: 93658
Content-Type: application/javascript
clean
http://batt-girl.com/wp-content/plugins/nextgen-gallery/shutter/shutter-reloaded.js?ver=1.3.0
200 OK
Content-Length: 8785
Content-Type: application/javascript
clean
http://batt-girl.com/wp-content/plugins/nextgen-smooth-gallery/SmoothGallery/scripts/mootools.v1.11.js
200 OK
Content-Length: 34840
Content-Type: application/javascript
clean
http://batt-girl.com/wp-content/plugins/nextgen-smooth-gallery/SmoothGallery/scripts/jd.gallery.js
200 OK
Content-Length: 24788
Content-Type: application/javascript
clean
http://batt-girl.com/wp-content/plugins/nextgen-smooth-gallery/SmoothGallery/scripts/jd.gallery.transitions.js
200 OK
Content-Length: 2182
Content-Type: application/javascript
clean
http://lite.piclens.com/current/piclens_optimized.js
500 Can't connect to lite.piclens.com:80
Content-Length: 191
Content-Type: text/plain
clean
http://lite.piclens.com/test404page.js
500 Can't connect to lite.piclens.com:80
Content-Length: 191
Content-Type: text/plain
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: batt-girl.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: batt-girl.com
Referer: http://www.google.com/search?q=batt-girl.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=batt-girl.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://batt-girl.com/

Result: batt-girl.com is not infected or malware details are not published yet.