New scan:

Malware Scanner report for bontmutsen.com

Malicious/Suspicious/Total urls checked
0/2/6
2 pages have suspicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked by Team_CC  (137 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.bontmutsen.com/
200 OK
Content-Length: 15337
Content-Type: text/html
suspicious
Suspicious code. Script contains iFrame.


document.write(unescape('%3C%62%6F%64%79%3E%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%22%3E%41%4E%43%48%4F%52%46%52%45%45%5F%56%45%52%53%49%4F%4E%3D%22%36%32%33%31%36%31%35%32%36%22%3C%2F%73%63%72%69%70%74%3E%3C%73%63%72%69%70%74%20%74%79%70%65%3D%27%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%27%3E%28%66%75%6E%63%74%69%6F%6E%28%29%7B%69%66%28%74%79%70%65%6F%66%28%5F%41%46%32%24%72%75%6E%6E%65%64%
...[3552 bytes skipped]...

Decoded script:

...[4240 bytes skipped]...
ck">..::: We are Muslim Hacker :::.. <br> ..::: Feel The Power Of Muslim :::.. <br> [+] Our Official Members [+] <br> <font color="Green">..::: Sec_d@rk [!] Dark Root [!] 3XPL0173R~X3D [!] rEd mini [!] Dark HeArt Afghan [!] 0wl_Ey3 :::.. <br> ..::: xc0d30ffx [!] Bl@ck L!on [!] Kazi Shaheb [!] H1d3n Root :::.. </div>&copy 2015
</div>
</div>
</div>
</div>
<iframe width="0" height="0" scrolling="no" frameborder="no" src="https://www.youtube.com/embed/2m913fFLBos?autoplay=1&loop=1"></iframe>
</body>
</html>

Deface/Content modification. The following signature was found: Hacked by Team_CC

<!DOCTYPE html>
<!--[if lt IE 7 ]><html class="ie ie6" lang="en"> <![endif]-->
<!--[if IE 7 ]><html class="ie ie7" lang="en"> <![endif]-->
<!--[if IE 8 ]><html class="ie ie8" lang="en"> <![endif]-->
<!--[if (gte IE 9)|!(IE)]><!-->
<html lang="en">
<!--<![endif]-->
<head>
<meta charset="utf-8">
<title>
Hacked by Team_CC
</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf8" />
<meta name="Author" content="Dr.D3M0N"/>
<meta name="copyright" content="Dr.D3M0N"/>
<meta name="description" content="Hacked by Dr.D3M0N/>
<meta name="keywords" content="Hacked by Team_CC, Hacked by Dr.D3M0N, Dr.D3M0N"/>
<meta name="robots" content="ARCHIVE"/>
<meta na
...[15040 bytes skipped]...


http://goo.gl/ijGD6
HTTP/1.1 301 Moved Permanently
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Connection: close
Date: Sat, 28 Nov 2015 15:36:29 GMT
Pragma: no-cache
Accept-Ranges: none
Location: http://peterjepimarsblog.googlecode.com/files/mousegetar.js
Server: GSE
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
clean
http://peterjepimarsblog.googlecode.com/files/mousegetar.js
200 OK
Content-Length: 6974
Content-Type: text/plain
clean
http://peterjepimarsblog.googlecode.com/test404page.js
404 Not Found
Content-Length: 1575
Content-Type: text/html
clean
http://peterjepimarsblog.googlecode.com//www.google.com/
404 Not Found
Content-Length: 1561
Content-Type: text/html
clean
http://www.bontmutsen.com//www.google.com/
200 OK
Content-Length: 15337
Content-Type: text/html
suspicious
Suspicious code. Script contains iFrame.


document.write(unescape('%3C%62%6F%64%79%3E%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%22%3E%41%4E%43%48%4F%52%46%52%45%45%5F%56%45%52%53%49%4F%4E%3D%22%36%32%33%31%36%31%35%32%36%22%3C%2F%73%63%72%69%70%74%3E%3C%73%63%72%69%70%74%20%74%79%70%65%3D%27%74%65%78%74%2F%6A%61%76%61%73%63%72%69%70%74%27%3E%28%66%75%6E%63%74%69%6F%6E%28%29%7B%69%66%28%74%79%70%65%6F%66%28%5F%41%46%32%24%72%75%6E%6E%65%64%
...[3552 bytes skipped]...

Decoded script:

...[4240 bytes skipped]...
ck">..::: We are Muslim Hacker :::.. <br> ..::: Feel The Power Of Muslim :::.. <br> [+] Our Official Members [+] <br> <font color="Green">..::: Sec_d@rk [!] Dark Root [!] 3XPL0173R~X3D [!] rEd mini [!] Dark HeArt Afghan [!] 0wl_Ey3 :::.. <br> ..::: xc0d30ffx [!] Bl@ck L!on [!] Kazi Shaheb [!] H1d3n Root :::.. </div>&copy 2015
</div>
</div>
</div>
</div>
<iframe width="0" height="0" scrolling="no" frameborder="no" src="https://www.youtube.com/embed/2m913fFLBos?autoplay=1&loop=1"></iframe>
</body>
</html>


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: bontmutsen.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: bontmutsen.com
Referer: http://www.google.com/search?q=bontmutsen.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=bontmutsen.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://bontmutsen.com/

Result: bontmutsen.com is not infected or malware details are not published yet.