New scan:

Malware Scanner report for nickandeileen.com

Malicious/Suspicious/Total urls checked
0/1/4
1 page has suspicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked By:  (190 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://nickandeileen.com/
HTTP/1.1 302 Found
Connection: close
Date: Sat, 25 Oct 2014 11:22:21 GMT
Location: http://nickandeileen.com/cgi-sys/suspendedpage.cgi
Server: Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Content-Length: 413
Content-Type: text/html; charset=iso-8859-1
clean
http://nickandeileen.com/cgi-sys/suspendedpage.cgi
200 OK
Content-Length: 7085
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked By:

...[5985 bytes skipped]...
" allowscriptaccess="always"></embed><br/>
<center>
<div class="xxx">
<div style="background:black url(http://1.bp.blogspot.com/-oXAQc-BXZh0/UqcoBwUCzaI/AAAAAAAAAI8/4dlhHJ8G0WQ/s1600/port_listener.gif)" class="xxx">
<h2>
<span class="style1">
<font size="9" color="#000"><font size="25" color="#000">«๏ஜ【</font> Hacked By:</font>
<font color="#FF0000">
<span class="neon">
<font color="#FFFFFF">4Ri3 60ndr0n9</font>
</span>
</font>
<font size="25" face="" color="#000">】ஜ๏»</font></span></h2><font size="9" color="#FFF"></font>
</div>
</div>
<br/>

...[1640 bytes skipped]...


http://www.widgeo.net/effets/effets.php?id=1&adult=0&cat=informatique&msg=Security Tester By :&taille=400
200 OK
Content-Length: 2058
Content-Type: text/html
suspicious
Page code contains blacklisted domain: bit.ly

...[533 bytes skipped]...
/>document.write('<embed FlashVars="letter=Security Tester By " src="http://www.widgeo.net/effets/1.swf" quality="high" wmode="transparent" width="400" height="40" align="middle" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer"></embed>');
document.write('</OBJECT>');
var widgeo_popupjs_load = 'http://www.widgeo.net/popup_new.js';
var widget_pop_url = 'http://bit.ly/W1VTD7';
if ( document.title.search(/forex|trading|trader|money/) != -1 ){
widget_pop_url = 'http://goo.gl/KwUX4';
}
if( /Android|webOS|iPhone|iPad|iPod|BlackBerry|IEMobile|Opera Mini/i.test(navigator.userAgent) ) {
widgeo_popupjs_load = 'empty.php';
widget_pop_url = 'http://bit.ly/W1VTD7';
}
else if( navigator.userAgent.toLowerCase().indexOf("chrome") > -1 ){
widgeo_popupjs_load = 'http://ww
...[774 bytes skipped]...

http://www.widgeo.net/test404page.js
404 Not Found
Content-Length: 276
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: nickandeileen.com

Result:
HTTP/1.1 302 Found
Connection: close
Date: Sat, 25 Oct 2014 11:22:21 GMT
Location: http://nickandeileen.com/cgi-sys/suspendedpage.cgi
Server: Apache/2.2.24 (Unix) mod_ssl/2.2.24 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Content-Length: 413
Content-Type: text/html; charset=iso-8859-1

...413 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: nickandeileen.com
Referer: http://www.google.com/search?q=nickandeileen.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=nickandeileen.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://nickandeileen.com/

Result: nickandeileen.com is not infected or malware details are not published yet.