New scan:

Malware Scanner report for flexsin.com

Malicious/Suspicious/Total urls checked
0/3/16
3 pages have suspicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.flexsin.com/mobile-app-development
HTTP/1.1 301 Moved Permanently
Cache-Control: max-age=864000
Connection: close
Date: Tue, 11 Nov 2014 08:44:11 GMT
Location: http://www.flexsin.com/mobile-app-development/
Server: Apache/2.2.29 (Unix) mod_ssl/2.2.29 OpenSSL/1.0.1e-fips mod_bwlimited/1.4
Content-Length: 386
Content-Type: text/html; charset=iso-8859-1
Expires: Fri, 21 Nov 2014 08:44:11 GMT
clean
http://www.flexsin.com/mobile-app-development/
200 OK
Content-Length: 44098
Content-Type: text/html
suspicious
Suspicious code. Script contains iFrame.

...[457 bytes skipped]...
tener?f.addEventListener(r,s,false):f.attachEvent("on"+r,s);var ld=function(){function p(hd){
hd="head";return["<",hd,"></",hd,"><",i,' onl' + 'oad="var d=',g,";d.getElementsByTagName('head')[0].",j,"(d.",h,"('script')).",k,"='",l,"//",a.l,"'",'"',"></",i,">"].join("")}var i="body",m=d[i];if(!m){
return setTimeout(ld,100)}a.P(1);var j="appendChild",h="createElement",k="src",n=d[h]("div"),v=n[j](d[h](z)),b=d[h]("iframe"),g="document",e="domain",o;n.style.display="none";m.insertBefore(n,m.firstChild).id=z;b.frameBorder="0";b.id=z+"-loader";if(/MSIE[ ]+6/.test(navigator.userAgent)){
b.src="javascript:false"}b.allowTransparency="true";v[j](b);try{
b.contentWindow[g].open()}catch(w){
c[e]=d[e];o="javascript:var d="+g+".open();d.domain='"+d.domain+"';";b[k]=o+"void(0);"}try{
var t=b.contentWindow[g];t.write(p());t.close()}catch(x){
b[k]=o+'d.write("'+p().replace(/"/g,String.fromCharCo
...[290 bytes skipped]...

Decoded script:


function s() {
a.P(r);
f[z](r);
}

http://www.flexsin.com/mobile-app-development/include/function.js
200 OK
Content-Length: 6287
Content-Type: application/javascript
clean
http://www.flexsin.com/include/jquery.js
200 OK
Content-Length: 118695
Content-Type: application/javascript
clean
http://www.flexsin.com/include/jquery1.js
200 OK
Content-Length: 2636
Content-Type: application/javascript
clean
http://www.flexsin.com/include/jquery.colorbox.js
200 OK
Content-Length: 39804
Content-Type: application/javascript
clean
http://www.flexsin.com/include/jcarousellite.js
200 OK
Content-Length: 2634
Content-Type: application/javascript
clean
http://www.flexsin.com/mobile-application-development/mobile-application-portfolio.php
200 OK
Content-Length: 66246
Content-Type: text/html
suspicious
Suspicious code. Script contains iFrame.

...[457 bytes skipped]...
tener?f.addEventListener(r,s,false):f.attachEvent("on"+r,s);var ld=function(){function p(hd){
hd="head";return["<",hd,"></",hd,"><",i,' onl' + 'oad="var d=',g,";d.getElementsByTagName('head')[0].",j,"(d.",h,"('script')).",k,"='",l,"//",a.l,"'",'"',"></",i,">"].join("")}var i="body",m=d[i];if(!m){
return setTimeout(ld,100)}a.P(1);var j="appendChild",h="createElement",k="src",n=d[h]("div"),v=n[j](d[h](z)),b=d[h]("iframe"),g="document",e="domain",o;n.style.display="none";m.insertBefore(n,m.firstChild).id=z;b.frameBorder="0";b.id=z+"-loader";if(/MSIE[ ]+6/.test(navigator.userAgent)){
b.src="javascript:false"}b.allowTransparency="true";v[j](b);try{
b.contentWindow[g].open()}catch(w){
c[e]=d[e];o="javascript:var d="+g+".open();d.domain='"+d.domain+"';";b[k]=o+"void(0);"}try{
var t=b.contentWindow[g];t.write(p());t.close()}catch(x){
b[k]=o+'d.write("'+p().replace(/"/g,String.fromCharCo
...[290 bytes skipped]...

Decoded script:


function s() {
a.P(r);
f[z](r);
}

http://www.flexsin.com/mobile-application-development/../include/function.js
200 OK
Content-Length: 51215
Content-Type: application/javascript
clean
http://www.flexsin.com/mobile-application-development/../include/jquery.js
200 OK
Content-Length: 118695
Content-Type: application/javascript
clean
http://www.flexsin.com/mobile-application-development/../include/jquery1.js
200 OK
Content-Length: 2636
Content-Type: application/javascript
clean
http://w.sharethis.com/button/buttons.js
200 OK
Content-Length: 146864
Content-Type: application/x-javascript
clean
http://s.sharethis.com/loader.js
200 OK
Content-Length: 15748
Content-Type: application/x-javascript
clean
http://www.flexsin.com/include/menu.js
200 OK
Content-Length: 3678
Content-Type: application/javascript
clean
http://www.flexsin.com/include/ddaccordion.js
200 OK
Content-Length: 9916
Content-Type: application/javascript
clean
http://www.flexsin.com/
200 OK
Content-Length: 115862
Content-Type: text/html
suspicious
Suspicious code. Script contains iFrame.

...[457 bytes skipped]...
tener?f.addEventListener(r,s,false):f.attachEvent("on"+r,s);var ld=function(){function p(hd){
hd="head";return["<",hd,"></",hd,"><",i,' onl' + 'oad="var d=',g,";d.getElementsByTagName('head')[0].",j,"(d.",h,"('script')).",k,"='",l,"//",a.l,"'",'"',"></",i,">"].join("")}var i="body",m=d[i];if(!m){
return setTimeout(ld,100)}a.P(1);var j="appendChild",h="createElement",k="src",n=d[h]("div"),v=n[j](d[h](z)),b=d[h]("iframe"),g="document",e="domain",o;n.style.display="none";m.insertBefore(n,m.firstChild).id=z;b.frameBorder="0";b.id=z+"-loader";if(/MSIE[ ]+6/.test(navigator.userAgent)){
b.src="javascript:false"}b.allowTransparency="true";v[j](b);try{
b.contentWindow[g].open()}catch(w){
c[e]=d[e];o="javascript:var d="+g+".open();d.domain='"+d.domain+"';";b[k]=o+"void(0);"}try{
var t=b.contentWindow[g];t.write(p());t.close()}catch(x){
b[k]=o+'d.write("'+p().replace(/"/g,String.fromCharCo
...[290 bytes skipped]...

Decoded script:


function s() {
a.P(r);
f[z](r);
}


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: flexsin.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: flexsin.com
Referer: http://www.google.com/search?q=flexsin.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=flexsin.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://flexsin.com/

Result: flexsin.com is not infected or malware details are not published yet.