New scan:

Malware Scanner report for buyuhazinesi.com

Malicious/Suspicious/Total urls checked
0/0/5
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

!--hacked by ynR !--  (127 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://buyuhazinesi.com/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sun, 01 Jun 2014 06:11:08 GMT
Location: http://www.buyuhazinesi.com/
Server: LiteSpeed
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.buyuhazinesi.com/xmlrpc.php
X-Powered-By: PHP/5.3.28
clean
http://www.buyuhazinesi.com/
200 OK
Content-Length: 12887
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: !--hacked by ynR !--

<div style="display: none;"><a href="http://www.b3yaz.org">White Hat</a></div>
<div style="display: none;"><a href="http://www.b3yaz.com">White Hat</a></div>
<!--hacked by ynR !-->
<html lang="tr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta charset="utf-8">
<title>Büyü Hazinesi</title>
<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js"></script>
<link rel="stylesheet" type="text/css" href="fiddle.jshell.net/jonnyc/Ujz4P/3/sh
...[14744 bytes skipped]...


https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js
200 OK
Content-Length: 94840
Content-Type: text/javascript
clean
http://buyuhazinesi.com/test404page.js
HTTP/1.1 301 Moved Permanently
Cache-Control: no-cache, must-revalidate, max-age=0
Connection: close
Date: Sun, 01 Jun 2014 06:11:10 GMT
Pragma: no-cache
Location: http://www.buyuhazinesi.com/test404page.js
Server: LiteSpeed
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Expires: Wed, 11 Jan 1984 05:00:00 GMT
X-Pingback: http://www.buyuhazinesi.com/xmlrpc.php
X-Powered-By: PHP/5.3.28
clean
http://www.buyuhazinesi.com/test404page.js
404 Not Found
Content-Length: 12905
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: buyuhazinesi.com

Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sun, 01 Jun 2014 06:11:08 GMT
Location: http://www.buyuhazinesi.com/
Server: LiteSpeed
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.buyuhazinesi.com/xmlrpc.php
X-Powered-By: PHP/5.3.28

...0 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: buyuhazinesi.com
Referer: http://www.google.com/search?q=buyuhazinesi.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=buyuhazinesi.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://buyuhazinesi.com/

Result: buyuhazinesi.com is not infected or malware details are not published yet.