New scan:

Malware Scanner report for gyongyositrans.com

Malicious/Suspicious/Total urls checked
0/0/11
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked by Moroccan Hassan  (101 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://gyongyositrans.com/
200 OK
Content-Length: 7972
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked by Moroccan Hassan

...[148 bytes skipped]...
tml; charset=utf-8" />
<meta name="keywords" content="natural horsemanship, l?l?ik?z?,suttog?join-up,hooking-on,monty roberts,ray hunt,buck brannaman,john lyons,horse,riding,lovagl?,pat parelli," />
<meta name="description" content="Eroszakmentes l?ik?z?, tanfolyamok, oktat?" />
<meta name="generator" content="Joomla! - Open Source Content Management" />
<title>Hacked by Moroccan Hassan</title>
<link href="/index.php/en?format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
<link href="/index.php/en?format=feed&amp;type=atom" rel="alternate" type="application/atom+xml" title="Atom 1.0" />
<link rel="stylesheet" href="/plugins/editors/jckeditor/typography/typography2.php" type="text/css" />
<link rel="stylesheet" href="/templates/system/css/system.css" type
...[8425 bytes skipped]...


http://gyongyositrans.com/media/system/js/mootools-core.js
404 Not Found
Content-Length: 419
Content-Type: text/html
clean
http://gyongyositrans.com/test404page.js
404 Not Found
Content-Length: 401
Content-Type: text/html
clean
http://gyongyositrans.com/media/system/js/core.js
404 Not Found
Content-Length: 410
Content-Type: text/html
clean
http://gyongyositrans.com/media/system/js/mootools-more.js
404 Not Found
Content-Length: 419
Content-Type: text/html
clean
http://gyongyositrans.com/media/system/js/caption.js
200 OK
Content-Length: 1963
Content-Type: application/javascript
clean
http://gyongyositrans.com/plugins/system/jat3/jat3/base-themes/default/js/core.js
404 Not Found
Content-Length: 442
Content-Type: text/html
clean
http://gyongyositrans.com/plugins/system/jat3/jat3/base-themes/default/js/menu/mega.js
404 Not Found
Content-Length: 447
Content-Type: text/html
clean
http://gyongyositrans.com/media/mod_pwebfblikebox/js/mootools.likebox.js
404 Not Found
Content-Length: 433
Content-Type: text/html
clean
http://gyongyositrans.com/media/mod_vt_nivo_slider/js/jquery/latest/jquery.min.js
404 Not Found
Content-Length: 442
Content-Type: text/html
clean
http://gyongyositrans.com/media/mod_vt_nivo_slider/js/jquery.nivo.slider.min.js
404 Not Found
Content-Length: 440
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: gyongyositrans.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Wed, 25 Jun 2014 10:27:11 GMT
Accept-Ranges: bytes
ETag: "bdcb8b-1f24-4f4bd85d27080"
Server: Apache/2
Vary: Accept-Encoding,User-Agent
Content-Length: 7972
Content-Type: text/html
Last-Modified: Sun, 16 Mar 2014 18:32:18 GMT

...7972 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: gyongyositrans.com
Referer: http://www.google.com/search?q=gyongyositrans.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=gyongyositrans.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://gyongyositrans.com/

Result: gyongyositrans.com is not infected or malware details are not published yet.