New scan:

Malware Scanner report for googleplusfastcash.com

Malicious/Suspicious/Total urls checked
0/0/7
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked By err0r1046   (4 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://googleplusfastcash.com/
200 OK
Content-Length: 400
Content-Type: text/html
clean
http://googleplusfastcash.com/.ftpquota
403 Forbidden
Content-Length: 402
Content-Type: text/html
clean
http://googleplusfastcash.com/test404page.js
404 Not Found
Content-Length: 403
Content-Type: text/html
clean
http://googleplusfastcash.com/cgi-bin/
403 Forbidden
Content-Length: 401
Content-Type: text/html
clean
http://googleplusfastcash.com/favicon.ico
200 OK
Content-Length: 43
Content-Type: image/vnd.microsoft.icon
clean
http://googleplusfastcash.com/in.php
200 OK
Content-Length: 8830
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked By err0r1046

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>

<head>
<meta http-equiv="Content-Language" content="en-gb">
<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
<marquee bgcolor="#cccccc" loop="-1" scrollamount="2" width="100%"><title>Hacked By err0r1046 </title></marquee>
</head>http://i43.tinypic.com/o89ixs.jpg
<EMBED src=http://fsh.chirkutonorkut.com/albums/HI/yamlaPD08.swf width=1 height=1 /></td><td width="50%">
<body background="http://img54.xooimage.com/files/f/7/2/kbk29185-227a592.gif" bgcolor="black">
<EMBED src='http://www.riadatman.com/Minute.swf' width="0" height="0" type="application/x-shockwave-flash"
...[10147 bytes skipped]...


http://t1.gstatic.com/images?q=tbn:ANd9GcS-aFLvOojgs0INAggb5pkGPVLU9nHVurRa7-2zPxEzbRpbulg8
200 OK
Content-Length: 5907
Content-Type: image/jpeg
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: googleplusfastcash.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 14 Jul 2015 19:28:06 GMT
Server: Apache
Vary: Accept-Encoding
Content-Length: 400
Content-Type: text/html;charset=ISO-8859-1

...400 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: googleplusfastcash.com
Referer: http://www.google.com/search?q=googleplusfastcash.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=googleplusfastcash.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://googleplusfastcash.com/

Result: googleplusfastcash.com is not infected or malware details are not published yet.