New scan:

Malware Scanner report for bridgewaternepal.com

Malicious/Suspicious/Total urls checked
0/0/5
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/1/1
1 suspicious iframe found. See details below
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

.::Hacked By::.  (7 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.bridgewaternepal.com/
200 OK
Content-Length: 11751
Content-Type: text/html
suspicious
Hidden iFrame found.
size: 0x0     
src: http://www.youtube.com/embed/k2ad_n9stz8?rel=0&autoplay=1&loop=1&playlist=evcwx9xx1tw

<iframe width="0" height="0" src="http://www.youtube.com/embed/k2ad_n9stz8?rel=0&autoplay=1&loop=1&playlist=evcwx9xx1tw" frameborder="0" allowfullscreen>

Deface/Content modification. The following signature was found: .::Hacked By::.

...[5731 bytes skipped]...
d">"</span></span></b></h1>
<a href="https://www.facebook.com/teenage.worms?ref=hl" target="_blank">
<img src="http://bit.ly/1HvrlRs" alt="" id='logoimg' title='Click it' width="270" height="270"></a>
<p><div style='position:relative; top:-25px;'>
<span style="color:black;font-size:45px;text-shadow: 0 0 3px red, 0px 0px 20px red"><b>.::Hacked By::.</b></span><br>

<span style="color:black;font-size:40px;text-shadow: 0 0 3px red, 0px 0px 20px red"><SCRIPT>
farbbibliothek = new Array();
farbbibliothek[0] = new Array("#FF0000","#FF1100","#FF2200","#FF3300","#FF4400","#FF5500","#FF6600","#FF7700","#FF8800","#FF9900","#FFaa00","#FFbb00","#FFcc00","#FFdd00","#FFee00","#FFff00","#FFee00","#FFdd00","#FFcc00","#FFbb00","#FFaa00","#FF9900","#FF8800","#FF7700","#FF6600","#FF5500
...[7220 bytes skipped]...


http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
200 OK
Content-Length: 92629
Content-Type: text/javascript
clean
http://goo.gl/jeD8fN
HTTP/1.1 301 Moved Permanently
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Connection: close
Date: Thu, 15 Oct 2015 01:35:36 GMT
Pragma: no-cache
Accept-Ranges: none
Location: http://kurkino.net.ru/block/BSH.js
Server: GSE
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Strict-Transport-Security: max-age=10886400;
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
clean
http://kurkino.net.ru/block/bsh.js
404 Not Found
Content-Length: 570
Content-Type: text/html
clean
http://kurkino.net.ru/test404page.js
404 Not Found
Content-Length: 570
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: bridgewaternepal.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: bridgewaternepal.com
Referer: http://www.google.com/search?q=bridgewaternepal.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=bridgewaternepal.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://bridgewaternepal.com/

Result: bridgewaternepal.com is not infected or malware details are not published yet.