New scan:

Malware Scanner report for mshinskaja.ru

Malicious/Suspicious/Total urls checked
0/0/2
Blacklists
OK
Malicious redirects
Found
The website redirects visitors from search engines to the 3rd-party URL. The chain of malicious redirects found:
->http://web-redirect.ru/?web
475 websites infected. web-redirect.ru is marked by Yandex as suspicious.
->http://wstore.kz/components/com_weblinks/2/separator.php


The website "mshinskaja.ru" is most probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues. Here is our redirects fixing guide.
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked by Iliya Norton  (267 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Malicious/Suspicious Redirects

RequestServer responseStatus
URL: http://mshinskaja.ru/
(imitation of visitor from search engine)


GET / HTTP/1.1
Host: mshinskaja.ru
Referer: http://www.google.com/search?q=redirect+check1
HTTP/1.1 302 Found
Connection: close
Date: Sun, 21 Sep 2014 13:13:40 GMT
Location: http://web-redirect.ru/?web
Server: nginx/1.4.1
Content-Length: 1890
Content-Type: text/html; charset=CP1251
Set-Cookie: _cutt_caches_images=1411305220; expires=Mon, 22-Sep-2014 13:13:40 GMT; path=/
X-Powered-By: PHP/5.2.17
malicious
URL: http://web-redirect.ru/?web
(imitation of visitor from search engine)


GET /?web HTTP/1.1
Host: web-redirect.ru
Referer: http://www.google.com/search?q=redirect+check2
HTTP/1.1 302 Found
Cache-Control: max-age=0
Connection: close
Date: Sun, 21 Sep 2014 14:13:26 GMT
Pragma: no-cache
Location: http://wstore.kz/components/com_weblinks/2/separator.php
Server: nginx/1.0.15
Content-Length: 0
Content-Type: text/html; charset=utf-8
Expires: Thu, 21 Jul 1977 07:30:00 GMT
Last-Modified: Sun, 21 Sep 2014 14:13:26 GMT
X-Powered-By: PHP/5.3.3
suspicious

Scanned pages/files

RequestServer responseStatus
http://mshinskaja.ru/
200 OK
Content-Length: 1801
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked by Iliya Norton

<html><head>
<title>Hacked by Iliya Norton</title>
<!-- Meta -->
<meta charset="utf-8">
<meta content="Hacked by Iliya Norton" name="description">
<!-- End Meta -->

<style type="text/css">
body {background-color:black;}

#iliya {
font-family:Comic Sans Ms;
font-size:70px;
text-shadow: 2px 0px 30px #05fc28;
color:red
}

#iliya2 {
font-family:Comic Sa
...[1893 bytes skipped]...


http://mshinskaja.ru/test404page.js
404 Not Found
Content-Length: 291
Content-Type: text/html
clean

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=mshinskaja.ru

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://mshinskaja.ru/

Result: mshinskaja.ru is not infected or malware details are not published yet.