New scan:

Malware Scanner report for fugleogferie.dk

Malicious/Suspicious/Total urls checked
0/0/3
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked By Av3loXiS  (27 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://fugleogferie.dk/
200 OK
Content-Length: 2182
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked By Av3loXiS

...[502 bytes skipped]...
# # #####

-->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<link rel="SHORTCUT ICON" href="http://i.hizliresim.com/w1WByj.png">
<title>Hacked By Av3loXiS</title>
<style type="text/css">
body {
background:url("http://pccholik.bedavahost.biz/154x5s1.gif");
text-shadow:1px 1px 10px #000;}

.style1 {
text-shadow:3px 3px 3px #000;
color: #990000;
font-size: 18px;
font-weight: bold;
}

.style1:hover{
text-shadow:3px 3px 3px #000;
color: #fff;
font-size: 18px;
font-weight: bold;
}
.style2 {
text-s
...[1250 bytes skipped]...


http://fugleogferie.dk/test404page.js
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 03 Jul 2014 20:26:14 GMT
Via: 1.1 varnish
Accept-Ranges: bytes
Age: 0
Location: http://fugleogferie.dk/test404page.js/
Server: - Meebox Web acceleration -
Vary: User-Agent
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Cache: MISS
X-Cacheable: YES
X-Pingback: http://fugleogferie.dk/xmlrpc.php
X-Powered-By: PHP/5.4.21
X-Varnish: 512214584
clean
http://fugleogferie.dk/test404page.js/
200 OK
Content-Length: 2182
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: fugleogferie.dk

Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 03 Jul 2014 20:26:14 GMT
Via: 1.1 varnish
Accept-Ranges: bytes
Age: 0
Server: - Meebox Web acceleration -
Vary: Accept-Encoding,User-Agent
Content-Length: 2182
Content-Type: text/html; charset=UTF-8
X-Cache: HIT
X-Cache-Hits: 1
X-Cacheable: YES
X-Pingback: http://fugleogferie.dk/xmlrpc.php
X-Powered-By: PHP/5.4.21
X-Varnish: 512214582 512214581

...2182 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: fugleogferie.dk
Referer: http://www.google.com/search?q=fugleogferie.dk

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=fugleogferie.dk

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://fugleogferie.dk/

Result: fugleogferie.dk is not infected or malware details are not published yet.