New scan:

Malware Scanner report for jvfd.org

Malicious/Suspicious/Total urls checked
5/0/20
5 pages have malicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://jvfd.org/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 02 Feb 2015 23:00:59 GMT
Location: http://www.jvfd.org/
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.jvfd.org/xmlrpc.php
X-Powered-By: PHP/5.3.29
clean
http://www.jvfd.org/
200 OK
Content-Length: 18031
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


document.write('<style type="text/css">');
document.write('div.domtab div{display:none;}<');
document.write('/s'+'tyle>');

Antivirus reports:

Kaspersky
HEUR:Trojan.Script.Generic
Microsoft
Trojan:JS/IframeRef.J

http://www.jvfd.org/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/ajax/static/ajax.js?ver=4.1
200 OK
Content-Length: 33
Content-Type: application/javascript
clean
http://www.jvfd.org/wp-includes/js/jquery/jquery.js?ver=1.11.1
200 OK
Content-Length: 95807
Content-Type: application/javascript
clean
http://www.jvfd.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
200 OK
Content-Length: 7200
Content-Type: application/javascript
clean
http://www.jvfd.org/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/ajax/static/persist.js?ver=4.1
200 OK
Content-Length: 24995
Content-Type: application/javascript
clean
http://www.jvfd.org/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/ajax/static/store.js?ver=4.1
200 OK
Content-Length: 5337
Content-Type: application/javascript
clean
http://www.jvfd.org/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/ajax/static/ngg_store.js?ver=4.1
200 OK
Content-Length: 891
Content-Type: application/javascript
clean
http://www.jvfd.org/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/lightbox/static/lightbox_context.js?ver=4.1
200 OK
Content-Length: 890
Content-Type: application/javascript
clean
http://www.jvfd.org/wp-content/themes/revolution_news-20/javascript/domtab.js
200 OK
Content-Length: 9140
Content-Type: application/javascript
clean
http://www.jvfd.org/wp-content/themes/revolution_news-20/javascript/date.js
200 OK
Content-Length: 496
Content-Type: application/javascript
clean
http://www.google-analytics.com/urchin.js
200 OK
Content-Length: 22678
Content-Type: text/javascript
clean
http://jvfd.org/?page_id=3
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 02 Feb 2015 23:01:08 GMT
Location: http://www.jvfd.org/history/
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.jvfd.org/xmlrpc.php
X-Powered-By: PHP/5.3.29
clean
http://www.jvfd.org/history/
200 OK
Content-Length: 14729
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


document.write('<style type="text/css">');
document.write('div.domtab div{display:none;}<');
document.write('/s'+'tyle>');

Antivirus reports:

Kaspersky
HEUR:Trojan.Script.Generic
Microsoft
Trojan:JS/IframeRef.J

http://www.jvfd.org/?page_id=3
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 02 Feb 2015 23:01:11 GMT
Location: http://www.jvfd.org/history/
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.jvfd.org/xmlrpc.php
X-Powered-By: PHP/5.3.29
clean
http://www.jvfd.org/test404page.js
404 Not Found
Content-Length: 19163
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


document.write('<style type="text/css">');
document.write('div.domtab div{display:none;}<');
document.write('/s'+'tyle>');

Antivirus reports:

Kaspersky
HEUR:Trojan.Script.Generic
Microsoft
Trojan:JS/IframeRef.J

http://www.jvfd.org/?page_id=2
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 02 Feb 2015 23:01:15 GMT
Location: http://www.jvfd.org/about/
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.jvfd.org/xmlrpc.php
X-Powered-By: PHP/5.3.29
clean
http://www.jvfd.org/about/
200 OK
Content-Length: 15060
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


document.write('<style type="text/css">');
document.write('div.domtab div{display:none;}<');
document.write('/s'+'tyle>');

Antivirus reports:

Kaspersky
HEUR:Trojan.Script.Generic
Microsoft
Trojan:JS/IframeRef.J

http://www.jvfd.org/?page_id=11
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 02 Feb 2015 23:01:19 GMT
Location: http://www.jvfd.org/fire-stations/
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.jvfd.org/xmlrpc.php
X-Powered-By: PHP/5.3.29
clean
http://www.jvfd.org/fire-stations/
200 OK
Content-Length: 14589
Content-Type: text/html
malicious
Malicious code - confirmed by antiviruses (see below)


document.write('<style type="text/css">');
document.write('div.domtab div{display:none;}<');
document.write('/s'+'tyle>');

Antivirus reports:

Kaspersky
HEUR:Trojan.Script.Generic
Microsoft
Trojan:JS/IframeRef.J


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: jvfd.org

Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 02 Feb 2015 23:00:59 GMT
Location: http://www.jvfd.org/
Server: Apache/2.2.22
Vary: User-Agent,Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Pingback: http://www.jvfd.org/xmlrpc.php
X-Powered-By: PHP/5.3.29

...0 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: jvfd.org
Referer: http://www.google.com/search?q=jvfd.org

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=jvfd.org

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://jvfd.org/

Result: jvfd.org is not infected or malware details are not published yet.