New scan:

Malware Scanner report for kingstoncommercialcleaning.com

Malicious/Suspicious/Total urls checked
0/0/6
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked By Middle East Cyber Army   (253 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://kingstoncommercialcleaning.com/
200 OK
Content-Length: 22289
Content-Type: text/html
clean
http://kingstoncommercialcleaning.com/index.html
200 OK
Content-Length: 18333
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked By Middle East Cyber Army

...[2918 bytes skipped]...
lass="right">

</a>
</span>
<div class="clr"></div>
</div><!--/ Codrops top bar -->
<header>


<p
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Hacked By Middle East Cyber Army </title>

<meta name="Keywords" content="Middle East Cyber Army">
<link rel="shortcut icon" href="http://www.iconj.com/ico/u/5/u5oywrf99u.ico" type="image/x-icon" />
<script language="JavaScript1.2">
function ejs_nodroit()
{
return(false);
}

document.oncontextmenu = ejs_nodroit;
</script>
<style type="text/css">
b
...[17915 bytes skipped]...


http://kingstoncommercialcleaning.com/googledrive.com/host/0B0FAryoVedK0Szk4WW9GR3ZKWDg/modernizr.custom.86080.js
HTTP/1.1 302 Found
Connection: close
Date: Sat, 01 Aug 2015 06:24:11 GMT
Location: http://we-sell-super-meds.com/
Server: Apache
Content-Length: 294
Content-Type: text/html; charset=iso-8859-1
clean
http://we-sell-super-meds.com/
HTTP/1.1 302 Found
Connection: close
Date: Sat, 01 Aug 2015 06:24:12 GMT
Location: http://perfectrxbargain.xyz
Server: nginx
Vary: Accept-Encoding,User-Agent
Content-Length: 0
Content-Type: text/html; charset=UTF-8
X-Powered-By: PHP/5.3.3
clean
http://perfectrxbargain.xyz/
403 Forbidden
Content-Length: 168
Content-Type: text/html
clean
http://perfectrxbargain.xyz/test404page.js
403 Forbidden
Content-Length: 168
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: kingstoncommercialcleaning.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 01 Aug 2015 06:24:08 GMT
Server: Apache
Content-Encoding: none
Content-Type: text/html
Second query (visit from search engine):
GET / HTTP/1.1
Host: kingstoncommercialcleaning.com
Referer: http://www.google.com/search?q=kingstoncommercialcleaning.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=kingstoncommercialcleaning.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://kingstoncommercialcleaning.com/

Result: kingstoncommercialcleaning.com is not infected or malware details are not published yet.