New scan:

Malware Scanner report for hyla.ba

Malicious/Suspicious/Total urls checked
0/0/9
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/2/2
2 suspicious iframes found. See details below
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked by   (2441 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.hyla.ba/
200 OK
Content-Length: 3453
Content-Type: text/html
suspicious
Hidden iFrame found.
size: 1x0     
src: http://www.youtube.com/embed/laps9g22ciu?rel=0&autoplay=1

<iframe width="1" height="0" src="http://www.youtube.com/embed/laps9g22ciu?rel=0&autoplay=1" frameborder="0" allowfullscreen >

Deface/Content modification. The following signature was found: Hacked by

...[1612 bytes skipped]...
br/>


</script>
<link rel="SHORTCUT ICON" href="http://www.fileden.com/files/2011/4/9/3112106/V1RU54.ico">
<link href='http://fonts.googleapis.com/css?family=Keania+One' rel='stylesheet' type='text/css'>
<br><img src='http://i61.tinypic.com/x22al1.jpg'height="450px" width="700px"> </br>
<br>
<font size="7" face="Keania One" color='red'>Hacked by <font color='red'> Mr.Kacang </font><br/>


<br><font face='Iceland' size='5' color='yellow'>go home ur drunk</br>
<style type="text/css">
.absoluta {position: absolute;
bottom: 0;
right: 0;
background-color: #000;
color: #fff;
}
</style>
<link href='http://fonts.googleapis.com/css?family=Iceland' rel='stylesheet' type='text/css'>
<font face='Iceland' size='
...[1794 bytes skipped]...


http://goo.gl/2ejf7
HTTP/1.1 301 Moved Permanently
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Connection: close
Date: Fri, 28 Nov 2014 11:13:04 GMT
Pragma: no-cache
Location: http://edhoo-xp.googlecode.com/files/hadling.js
Server: GSE
Content-Type: text/html; charset=UTF-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Alternate-Protocol: 80:quic,p=0.002
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
clean
http://edhoo-xp.googlecode.com/files/hadling.js
200 OK
Content-Length: 2662
Content-Type: text/plain
clean
http://edhoo-xp.googlecode.com/test404page.js
404 Not Found
Content-Length: 1439
Content-Type: text/html
clean
http://edhoo-xp.googlecode.com//www.google.com/
404 Not Found
Content-Length: 1425
Content-Type: text/html
clean
http://yondarkness.googlecode.com/files/AntiCopas.js
200 OK
Content-Length: 2016
Content-Type: text/plain
clean
http://yondarkness.googlecode.com/files/
404 Not Found
Content-Length: 1431
Content-Type: text/html
clean
http://yondarkness.googlecode.com//www.google.com/
404 Not Found
Content-Length: 1425
Content-Type: text/html
clean
http://www.hyla.ba//www.google.com/
200 OK
Content-Length: 3497
Content-Type: text/html
suspicious
Hidden iFrame found.
size: 1x0     
src: http://www.youtube.com/embed/laps9g22ciu?rel=0&autoplay=1

<iframe width="1" height="0" src="http://www.youtube.com/embed/laps9g22ciu?rel=0&autoplay=1" frameborder="0" allowfullscreen >


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: hyla.ba

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: hyla.ba
Referer: http://www.google.com/search?q=hyla.ba

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=hyla.ba

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://hyla.ba/

Result: hyla.ba is not infected or malware details are not published yet.