New scan:

Malware Scanner report for deutschsex.com

Malicious/Suspicious/Total urls checked
0/3/4
3 pages have suspicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://deutschsex.com/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 21 Aug 2014 18:45:13 GMT
Location: http://www.deutschsex.com/
Server: nginx/1.4.3
Content-Length: 314
Content-Type: text/html; charset=iso-8859-1
clean
http://www.deutschsex.com/
200 OK
Content-Length: 81484
Content-Type: text/html
suspicious
Suspicious code found

<div class="headertop"><!--headertop-->
<ul class="topmenu">
<li class="firstitem"><a href="http://www.deutschsex.com" title="Home">Home</a></li>
</ul>
</div><!--headertop-->

<div class="headercont"><!--headercont-->
<h1 class="logo"><a href="http://www.deutschsex.com" title="logo">
<img src="http://www.deutschsex.com/wp-content/upload
... 538 bytes are skipped ...
t;
</ul>
</div>

<div class="searcharea">
<form id="search_form" action="http://www.deutschsex.com/search" method="get">
<p class="inputp"><input type="text" name="search" id="search_field" value="" /></p>
<p><input class="sbtn" type="submit" value="" /></p>
</form>
</div>
</div><!--menu-->
</div>

http://www.deutschsex.com/kontakt
200 OK
Content-Length: 14068
Content-Type: text/html
suspicious
Suspicious code found

<div class="headertop"><!--headertop-->
<ul class="topmenu">
<li class="firstitem"><a href="http://www.deutschsex.com" title="Home">Home</a></li>
</ul>
</div><!--headertop-->

<div class="headercont"><!--headercont-->
<h1 class="logo"><a href="http://www.deutschsex.com" title="logo">
<img src="http://www.deutschsex.com/wp-content/upload
... 538 bytes are skipped ...
t;
</ul>
</div>

<div class="searcharea">
<form id="search_form" action="http://www.deutschsex.com/search" method="get">
<p class="inputp"><input type="text" name="search" id="search_field" value="" /></p>
<p><input class="sbtn" type="submit" value="" /></p>
</form>
</div>
</div><!--menu-->
</div>

http://www.deutschsex.com/test404page.js
404 Not Found
Content-Length: 57730
Content-Type: text/html
suspicious
Suspicious code found

<div class="headertop"><!--headertop-->
<ul class="topmenu">
<li class="firstitem"><a href="http://www.deutschsex.com" title="Home">Home</a></li>
</ul>
</div><!--headertop-->

<div class="headercont"><!--headercont-->
<h1 class="logo"><a href="http://www.deutschsex.com" title="logo">
<img src="http://www.deutschsex.com/wp-content/upload
... 440 bytes are skipped ...
t;
</ul>
</div>

<div class="searcharea">
<form id="search_form" action="http://www.deutschsex.com/search" method="get">
<p class="inputp"><input type="text" name="search" id="search_field" value="" /></p>
<p><input class="sbtn" type="submit" value="" /></p>
</form>
</div>
</div><!--menu-->
</div>


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: deutschsex.com

Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 21 Aug 2014 18:45:13 GMT
Location: http://www.deutschsex.com/
Server: nginx/1.4.3
Content-Length: 314
Content-Type: text/html; charset=iso-8859-1

...314 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: deutschsex.com
Referer: http://www.google.com/search?q=deutschsex.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=deutschsex.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://deutschsex.com/

Result: deutschsex.com is not infected or malware details are not published yet.