New scan:

Malware Scanner report for disco-mu.ru

Malicious/Suspicious/Total urls checked
0/2/15
2 pages have suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "disco-mu.ru" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=disco-mu.ru

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://disco-mu.ru/
200 OK
Content-Length: 70728
Content-Type: text/html
suspicious
Suspicious code found

<a href="http://bkwar.ru/r.php?ref=24975" rel="nofollow" title="quattro.servegame.com"><img src="http://bkwar.ru/i/banerbkwar.gif" alt="Áîéöîâñêèé êëóá â íîâîì ñòèëå" /></a>

http://ddlloads.com/analytics.js
200 OK
Content-Length: 7933
Content-Type: application/x-javascript
clean
http://disco-mu.ru/engine/classes/js/jquery.js
200 OK
Content-Length: 91556
Content-Type: application/x-javascript
clean
http://disco-mu.ru/engine/classes/js/jqueryui.js
200 OK
Content-Length: 65247
Content-Type: application/x-javascript
clean
http://disco-mu.ru/engine/classes/js/dle_js.js
200 OK
Content-Length: 19627
Content-Type: application/x-javascript
clean
http://disco-mu.ru/engine/classes/highslide/highslide.js
200 OK
Content-Length: 32986
Content-Type: application/x-javascript
clean
http://disco-mu.ru/templates/Default/js/tabcontent.js
200 OK
Content-Length: 8866
Content-Type: application/x-javascript
clean
http://disco-mu.ru/templates/Default/js/topmenu.js
200 OK
Content-Length: 7442
Content-Type: application/x-javascript
clean
http://disco-mu.ru/templates/Default/js/ddaccordion.js
200 OK
Content-Length: 12534
Content-Type: application/x-javascript
clean
http://xaxa.in/analytics.js
200 OK
Content-Length: 7933
Content-Type: application/x-javascript
clean
http://disco-mu.ru/engine/modules/online/hint.js
200 OK
Content-Length: 1913
Content-Type: application/x-javascript
clean
http://gmoby.ru/analytics.js
200 OK
Content-Length: 7933
Content-Type: application/x-javascript
clean
http://asphalt7-android.org/analytics.js
200 OK
Content-Length: 7933
Content-Type: application/x-javascript
clean
http://mobapeople.com/6h3mo39hhjx5eb8l0flgyc13skikuus5
200 OK
Content-Length: 7992
Content-Type: text/javascript
clean
http://disco-mu.ru/index.php
200 OK
Content-Length: 70708
Content-Type: text/html
suspicious
Suspicious code found

<a href="http://bkwar.ru/r.php?ref=24975" rel="nofollow" title="quattro.servegame.com"><img src="http://bkwar.ru/i/banerbkwar.gif" alt="Áîéöîâñêèé êëóá â íîâîì ñòèëå" /></a>


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: disco-mu.ru

Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Wed, 27 Aug 2014 23:11:56 GMT
Pragma: no-cache
Server: nginx/1.4.2
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=fb0f1fd196db563ad38bb2f6cdfc9562; path=/
Set-Cookie: dle_user_id=deleted; expires=Tue, 27-Aug-2013 23:11:55 GMT; path=/; domain=.disco-mu.ru; httponly
Set-Cookie: dle_password=deleted; expires=Tue, 27-Aug-2013 23:11:55 GMT; path=/; domain=.disco-mu.ru; httponly
Set-Cookie: dle_hash=deleted; expires=Tue, 27-Aug-2013 23:11:55 GMT; path=/; domain=.disco-mu.ru; httponly
X-Powered-By: PHP/5.3.3
Second query (visit from search engine):
GET / HTTP/1.1
Host: disco-mu.ru
Referer: http://www.google.com/search?q=disco-mu.ru

Result:
The result is similar to the first query. There are no suspicious redirects found.