New scan:

Malware Scanner report for julishaqvod.com

Malicious/Suspicious/Total urls checked
0/2/18
2 pages have suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "julishaqvod.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/2/3
2 suspicious iframes found. See details below
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=julishaqvod.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://www.julishaqvod.com/
200 OK
Content-Length: 29567
Content-Type: text/html
suspicious
Page code contains blacklisted domain: js.union.doudouguo.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>水菜丽【qvod/百度影音/电影作品(全集)】ed2k种子在线下载 </title>

<meta name="keywords" content="水菜丽【qvod/百åº
...[4209 bytes skipped]...

http://www.julishaqvod.com/static/js/common.js?y22
HTTP/1.1 200 OK
Date: Fri, 09 Jan 2015 09:05:35 GMT
Accept-Ranges: bytes
ETag: "084fc5d010ce1:c7f3"
Server: IIS
Content-Length: 67283
Content-Location: http://www.julishaqvod.com/static/js/common.js?y22
Content-Type: application/x-javascript
Last-Modified: Fri, 22 Feb 2013 07:41:28 GMT
X-Powered-By: WAF/2.0
clean
http://www.julishaqvod.com/test404page.js
200 OK
Content-Length: 3173
Content-Type: text/html
clean
http://www.julishaqvod.com/static/js/forum.js?y22
HTTP/1.1 200 OK
Date: Fri, 09 Jan 2015 09:05:39 GMT
Accept-Ranges: bytes
ETag: "084fc5d010ce1:c7f3"
Server: IIS
Content-Length: 15312
Content-Location: http://www.julishaqvod.com/static/js/forum.js?y22
Content-Type: application/x-javascript
Last-Modified: Fri, 22 Feb 2013 07:41:28 GMT
X-Powered-By: WAF/2.0
clean
http://www.julishaqvod.com/static/js/logging.js?y22
HTTP/1.1 200 OK
Date: Fri, 09 Jan 2015 09:05:40 GMT
Accept-Ranges: bytes
ETag: "084fc5d010ce1:c7f3"
Server: IIS
Content-Length: 603
Content-Location: http://www.julishaqvod.com/static/js/logging.js?y22
Content-Type: application/x-javascript
Last-Modified: Fri, 22 Feb 2013 07:41:28 GMT
X-Powered-By: WAF/2.0
clean
http://j.humanding.com/wangzhai/i.php?z=8608
200 OK
Content-Length: 600
Content-Type: text/html
clean
http://vip.at98.com/cpc/i.ashx? u=322612&s=0&b=197&w=960&h=130&bl=0&bb=1&ls=0&bc=gray&fc=%23000000&bkc=
200 OK
Content-Length: 62
Content-Type: application/x-javascript
clean
http://js.union.doudouguo.com/cpro.js
200 OK
Content-Length: 4834
Content-Type: application/x-javascript
suspicious
Hidden iFrame found.
size: 0x0     
src: http://qiqu.bjjhdz.com/x/app/76_522.htm?uid=

<iframe src="http://qiqu.bjjhdz.com/x/app/76_522.htm?uid=' + window.ddgu_uid + '&zoneid=' + window.ddgu_zid + '" width="0" height="0" frameborder="0" scrolling="no">

Hidden iFrame found.
size: 0x0     
src: http://qiqu.bjjhdz.com/x/app/76_522.htm?uid=

<iframe src="http://qiqu.bjjhdz.com/x/app/76_522.htm?uid=' + window.ddgu_uid + '" width="0" height="0" frameborder="0" scrolling="no">

http://www.julishaqvod.com/source/plugin/dzkk_xshow/images/title.js
HTTP/1.1 200 OK
Date: Fri, 09 Jan 2015 09:05:49 GMT
Accept-Ranges: bytes
ETag: "cca803b83abce1:c7f3"
Server: IIS
Content-Length: 2624
Content-Location: http://www.julishaqvod.com/source/plugin/dzkk_xshow/images/title.js
Content-Type: application/x-javascript
Last-Modified: Sat, 07 Sep 2013 04:32:15 GMT
X-Powered-By: WAF/2.0
clean
http://vip.at98.com/cpc/i.ashx? u=322612&s=0&b=197&w=960&h=130&bl=0&bb=1&ls=0&bc=gray&fc=%23000000&bkc=
200 OK
Content-Length: 62
Content-Type: application/x-javascript
clean
http://j.humanding.com/wangzhai/i.php?z=8240
200 OK
Content-Length: 600
Content-Type: text/html
clean
http://code12.onetad.com/js/294/294793.js
200 OK
Content-Length: 5660
Content-Type: application/x-javascript
suspicious
Page code contains blacklisted domain: www.loldaojucheng.com

cid='294793';
username='s2685623';
adid_ary='||2||';
ad_replace='1';
playtime='0';
width='0';
height='0';
codetype='1';
var kurl=new Array();
var ktype=new Array();
kurl[0]='www.nvtouba.com';
ktype[0]=1;
konetuid='81422';
kurl[1]='www.loldaojucheng.com';
ktype[1]=1;
kurl[2]='laobingun.com';
ktype[2]=1;
kurl[3]='3dhaoqin.com';
ktype[3]=1;
kurl[4]='bsmln.com';
ktype[4]=1;
kurl[5]='www.haoqin2.com';
ktype[5]=1;
kurl[6]='duwenze.net';
ktype[6]=1;
kurl[7]='gongyuefei.org';
ktype[7]=1;
kurl[8]='www.lifanba.net';
ktype[8]=1;
kurl[9]='www.90cunai.com';
ktype[9]=1;
kurl[10]='www.topman8.com';
ktype[10]=1;
kurl[11
...[4013 bytes skipped]...

http://code12.onetad.com/ok.php?user=s2685623
200 OK
Content-Length: 0
Content-Type: text/html
clean
http://f1.1lo0.net/code/pop_cpf.asp?pid=260646
200 OK
Content-Length: 32
Content-Type: text/html
clean
http://tcss.qq.com/ping.js?v=1y22
200 OK
Content-Length: 8909
Content-Type: application/x-javascript
clean
http://count5.51yes.com/click.aspx?id=56229291&logo=1
200 OK
Content-Length: 1773
Content-Type: text/html
clean
http://www.julishaqvod.com/home.php?mod=misc&ac=sendmail&rand=1420794333
200 OK
Content-Length: 0
Content-Type: text/javascript
clean
http://discuz.gtimg.cn/cloud/scripts/discuz_tips.js?v=1
200 OK
Content-Length: 6173
Content-Type: application/x-javascript
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: julishaqvod.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: julishaqvod.com
Referer: http://www.google.com/search?q=julishaqvod.com

Result:
The result is similar to the first query. There are no suspicious redirects found.