New scan:

Malware Scanner report for parkislandmn.com

Malicious/Suspicious/Total urls checked
0/0/21
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

hacked by jord4nroo7  (11 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://parkislandmn.com/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sun, 19 Jul 2015 04:43:06 GMT
Location: http://www.parkislandmn.com/
Server: nginx
Content-Length: 236
Content-Type: text/html; charset=iso-8859-1
Ngpass_ngall: 1
clean
http://www.parkislandmn.com/
200 OK
Content-Length: 3263
Content-Type: text/html
clean
http://www.parkislandmn.com/scripts/photoshuffler.js
200 OK
Content-Length: 3511
Content-Type: application/javascript
clean
http://parkislandmn.com/scripts/jquery.js
HTTP/1.1 301 Moved Permanently
Cache-Control: max-age=604800
Connection: close
Date: Sun, 19 Jul 2015 04:43:08 GMT
Location: http://www.parkislandmn.com/scripts/jquery.js
Server: nginx
Content-Length: 253
Content-Type: text/html; charset=iso-8859-1
Expires: Sun, 26 Jul 2015 04:43:08 GMT
Ngpass_ngstatic: 1
clean
http://www.parkislandmn.com/scripts/jquery.js
200 OK
Content-Length: 77746
Content-Type: application/javascript
clean
http://parkislandmn.com/scripts/jquery-1.3.2.js
HTTP/1.1 301 Moved Permanently
Cache-Control: max-age=604800
Connection: close
Date: Sun, 19 Jul 2015 04:43:10 GMT
Location: http://www.parkislandmn.com/scripts/jquery-1.3.2.js
Server: nginx
Content-Length: 259
Content-Type: text/html; charset=iso-8859-1
Expires: Sun, 26 Jul 2015 04:43:10 GMT
Ngpass_ngstatic: 1
clean
http://www.parkislandmn.com/scripts/jquery-1.3.2.js
200 OK
Content-Length: 120645
Content-Type: application/javascript
clean
http://parkislandmn.com/scripts/jquery.opacityrollover.js
HTTP/1.1 301 Moved Permanently
Cache-Control: max-age=604800
Connection: close
Date: Sun, 19 Jul 2015 04:43:11 GMT
Location: http://www.parkislandmn.com/scripts/jquery.opacityrollover.js
Server: nginx
Content-Length: 269
Content-Type: text/html; charset=iso-8859-1
Expires: Sun, 26 Jul 2015 04:43:11 GMT
Ngpass_ngstatic: 1
clean
http://www.parkislandmn.com/scripts/jquery.opacityrollover.js
200 OK
Content-Length: 944
Content-Type: application/javascript
clean
http://parkislandmn.com/scripts/jquery.galleriffic.js
HTTP/1.1 301 Moved Permanently
Cache-Control: max-age=604800
Connection: close
Date: Sun, 19 Jul 2015 04:43:12 GMT
Location: http://www.parkislandmn.com/scripts/jquery.galleriffic.js
Server: nginx
Content-Length: 265
Content-Type: text/html; charset=iso-8859-1
Expires: Sun, 26 Jul 2015 04:43:12 GMT
Ngpass_ngstatic: 1
clean
http://www.parkislandmn.com/scripts/jquery.galleriffic.js
200 OK
Content-Length: 32119
Content-Type: application/javascript
clean
http://parkislandmn.com/apartments.php?id=20
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sun, 19 Jul 2015 04:43:13 GMT
Location: http://www.parkislandmn.com/apartments.php?id=20
Server: nginx
Content-Length: 256
Content-Type: text/html; charset=iso-8859-1
Ngpass_ngall: 1
clean
http://www.parkislandmn.com/apartments.php?id=20
200 OK
Content-Length: 9602
Content-Type: text/html
clean
http://www.parkislandmn.com/apartments.php?id=19
200 OK
Content-Length: 9444
Content-Type: text/html
clean
http://www.parkislandmn.com/apartments.php?id=22
200 OK
Content-Length: 9455
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: hacked by jord4nroo7

...[2652 bytes skipped]...
lt;li><a href="/specials.php">Specials</a></li>
<li><a href="/contact.php">Contact</a></li>
<li><a class="last" href="/index.php">Home</a></li>
</ul>
</div><!--/nav-->
</div><!--/menu-->
<div id="content">
<h1>2 Bedroom, 1 Bath Units</h1><h3>From $865</h3><p>hacked by jord4nroo7</p><h2>Amenities</h2><div><ul class="amenities"><li>Wood Floors</li><li>Deck/Patio with Sliding Glass Door</li><li>Air Conditioning</li><li>Dishwasher</li><li>Fireplace</li><li>Ceiling Fans</li><li>Secured Entrance</li></ul>
</div><!--/amenities-->
<div style="clear:both"></div>
<h2>Photos</h2>
<div
...[8368 bytes skipped]...


http://www.parkislandmn.com/amenities.php
200 OK
Content-Length: 3640
Content-Type: text/html
clean
http://www.parkislandmn.com/lake-minnetonka-boat-slips.php
200 OK
Content-Length: 3145
Content-Type: text/html
clean
http://www.parkislandmn.com/specials.php
200 OK
Content-Length: 2706
Content-Type: text/html
clean
http://www.parkislandmn.com/contact.php
200 OK
Content-Length: 3742
Content-Type: text/html
clean
http://www.parkislandmn.com/index.php
200 OK
Content-Length: 3263
Content-Type: text/html
clean
http://www.parkislandmn.com/test404page.js
404 Not Found
Content-Length: 331
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: parkislandmn.com

Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Sun, 19 Jul 2015 04:43:06 GMT
Location: http://www.parkislandmn.com/
Server: nginx
Content-Length: 236
Content-Type: text/html; charset=iso-8859-1
Ngpass_ngall: 1

...236 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: parkislandmn.com
Referer: http://www.google.com/search?q=parkislandmn.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=parkislandmn.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://parkislandmn.com/

Result: parkislandmn.com is not infected or malware details are not published yet.