New scan:

Malware Scanner report for how-cook.ru

Malicious/Suspicious/Total urls checked
0/5/15
5 pages have suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "how-cook.ru" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=how-cook.ru

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://how-cook.ru/
200 OK
Content-Length: 31969
Content-Type: text/html
suspicious
Page code contains blacklisted domain: xaxa.in

<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1251" />
<title>Êàê ãîòîâèòü.ðó - êóëèíàðíûå ðåöåïòû íà ëþáîé âêóñ!</title>
<meta name="description" content="Êàê ãîòîâèòü.ðó - êóëèíàðíûé ïîðòàë. Íà ñòðàíèöàõ íàøåãî ñàéòà âû íàéäåòå òûñÿ÷è ðåöåïòîâ!" />
<meta name="keywords" content="êàê ãîòîâèòü, ðåöåïòû, ñàëàòû, çàê
...[4082 bytes skipped]...

http://how-cook.ru/engine/classes/js/jquery.js
200 OK
Content-Length: 94840
Content-Type: application/x-javascript
clean
http://how-cook.ru/engine/classes/js/jqueryui.js
200 OK
Content-Length: 67244
Content-Type: application/x-javascript
clean
http://how-cook.ru/engine/classes/js/dle_js.js
200 OK
Content-Length: 21141
Content-Type: application/x-javascript
clean
http://how-cook.ru/engine/classes/highslide/highslide.js
200 OK
Content-Length: 46798
Content-Type: application/x-javascript
clean
http://how-cook.ru/templates/CocoFOOD/js/libs.js
200 OK
Content-Length: 1572
Content-Type: application/x-javascript
clean
http://how-cook.ru/templates/CocoFOOD/js/scripts.js
200 OK
Content-Length: 52731
Content-Type: application/x-javascript
clean
http://xaxa.in/analytics.js
200 OK
Content-Length: 7933
Content-Type: application/x-javascript
clean
http://gmoby.ru/analytics.js
200 OK
Content-Length: 7933
Content-Type: application/x-javascript
clean
http://asphalt7-android.org/analytics.js
200 OK
Content-Length: 7933
Content-Type: application/x-javascript
clean
http://mobapeople.com/6h3mo39hhjx5eb8l0flgyc13skikuus5
200 OK
Content-Length: 8011
Content-Type: text/javascript
clean
http://how-cook.ru/index.php?do=register
200 OK
Content-Length: 15245
Content-Type: text/html
suspicious
Page code contains blacklisted domain: xaxa.in

...[1529 bytes skipped]...
<link media="screen" href="/templates/CocoFOOD/style/newdle.css" type="text/css" rel="stylesheet" />
<script type="text/javascript" src="/templates/CocoFOOD/js/libs.js"></script>
<script type="text/javascript" src="/templates/CocoFOOD/js/scripts.js"></script>
</head>
<body>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://xaxa.in/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://xaxa.in/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://xaxa.in/analytics.js'></script>
<div id="loading-lay src='http://gmoby.ru/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://asphalt7-android.
...[2098 bytes skipped]...

http://how-cook.ru/index.php?do=lostpassword
200 OK
Content-Length: 12835
Content-Type: text/html
suspicious
Page code contains blacklisted domain: xaxa.in

...[1788 bytes skipped]...
<link media="screen" href="/templates/CocoFOOD/style/newdle.css" type="text/css" rel="stylesheet" />
<script type="text/javascript" src="/templates/CocoFOOD/js/libs.js"></script>
<script type="text/javascript" src="/templates/CocoFOOD/js/scripts.js"></script>
</head>
<body>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://xaxa.in/analytics.js'></scrip src='http://gmoby.ru/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://asphalt7-android.org/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://asphalt7-android.org/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://asphalt7-android.org/analytics.j
...[1797 bytes skipped]...

http://how-cook.ru/goryachie_bluda/
200 OK
Content-Length: 18875
Content-Type: text/html
suspicious
Page code contains blacklisted domain: xaxa.in

...[1815 bytes skipped]...
<link media="screen" href="/templates/CocoFOOD/style/newdle.css" type="text/css" rel="stylesheet" />
<script type="text/javascript" src="/templates/CocoFOOD/js/libs.js"></script>
<script type="text/javascript" src="/templates/CocoFOOD/js/scripts.js"></script>
</head>
<body>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://xaxa.in/analyt src='http://gmoby.ru/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://asphalt7-android.org/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://asphalt7-android.org/analytics.js'></script>
<script language='javascript' charset='UTF-8' type='text/javascript' src='http://asphalt7-android.org/analytics.js'></script>
...[1776 bytes skipped]...

http://how-cook.ru/holodnie_blyda/
200 OK
Content-Length: 24426
Content-Type: text/html
suspicious
Page code contains blacklisted domain: xaxa.in

<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-1251" />
<title>ãîòîâèì õîëîäíûå áëþäà | êàê-ãîòîâèòü.ðó</title>
<meta name="description" content="Ãîòîâèì õîëîäíûå áëþäà. Êàòåãîðèÿ ðàññêàæåò âàì î ëó÷øèõ ðåöåïòàõ õîëîäíûõ áëþä è çàêóñîê: ñóøè, ðîëëû, ìÿñî, îâîùè è ìíîãîå äðóãîå!" />
<meta name="keywords" content="õîë
...[4082 bytes skipped]...


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: how-cook.ru

Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Fri, 29 Aug 2014 02:40:21 GMT
Pragma: no-cache
Server: nginx/1.2.2
Vary: Accept-Encoding
Content-Type: text/html; charset=cp1251
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=o85n5kinas5lrjk0i5visg3sd7; path=/
Set-Cookie: dle_user_id=deleted; expires=Thu, 29-Aug-2013 02:40:20 GMT; path=/; domain=.how-cook.ru; httponly
Set-Cookie: dle_password=deleted; expires=Thu, 29-Aug-2013 02:40:20 GMT; path=/; domain=.how-cook.ru; httponly
Set-Cookie: dle_hash=deleted; expires=Thu, 29-Aug-2013 02:40:20 GMT; path=/; domain=.how-cook.ru; httponly
X-Powered-By: PHP/5.3.3-7+squeeze13
Second query (visit from search engine):
GET / HTTP/1.1
Host: how-cook.ru
Referer: http://www.google.com/search?q=how-cook.ru

Result:
The result is similar to the first query. There are no suspicious redirects found.