New scan:

Malware Scanner report for rhuangonzaga.com

Malicious/Suspicious/Total urls checked
0/0/7
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked By Team System Dz  (402 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://rhuangonzaga.com/
200 OK
Content-Length: 7034
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked By Team System Dz

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office">
<head>
<meta http-equiv="Content-Language" content="ar-dz"/>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<title>Hacked By Team System Dz</title>
<meta name="keywords" content="Hacked By Team System Dz"/>
<meta name="description" content="Hacked By Team System Dz"/>
<script type="text/javascript">
//<![CDATA[
try{if (!window.CloudFlare) {var CloudFlare=[{verbose:0,p:0,byc:0,owlid:"cf",bag2:1,mirage2:0,oracle:0,paths:{cloudflare:"/cdn-cgi/nexp/dok3v=1613a3a185/"},atok:"8348665ab0c99e3aa4b83bc54d9ac081",petok:"d9afe85
...[7418 bytes skipped]...


http://rhuangonzaga.com/cdn-cgi/l/email-protection
200 OK
Content-Length: 4159
Content-Type: text/html
clean
http://rhuangonzaga.com/cdn-cgi/scripts/zepto.min.js
200 OK
Content-Length: 24975
Content-Type: application/javascript
clean
http://rhuangonzaga.com/cdn-cgi/scripts/cf.common.js
200 OK
Content-Length: 4408
Content-Type: application/javascript
clean
http://rhuangonzaga.com//www.cloudflare.com/sign-up/
404 Not Found
Content-Length: 927
Content-Type: text/html
clean
http://rhuangonzaga.com/test404page.js
404 Not Found
Content-Length: 914
Content-Type: text/html
clean
http://rhuangonzaga.com/cdn-cgi/l/
404 Not Found
Content-Length: 910
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: rhuangonzaga.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Tue, 14 Jul 2015 21:18:10 GMT
Server: cloudflare-nginx
Vary: Accept-Encoding,User-Agent
Content-Type: text/html
Last-Modified: Sat, 04 Jul 2015 08:05:16 GMT
CF-RAY: 20604232c16b0aea-WAW
Set-Cookie: __cfduid=d33684252a8c3685f98a1f7fee45130501436908690; expires=Wed, 13-Jul-16 21:18:10 GMT; path=/; domain=.rhuangonzaga.com; HttpOnly
Second query (visit from search engine):
GET / HTTP/1.1
Host: rhuangonzaga.com
Referer: http://www.google.com/search?q=rhuangonzaga.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=rhuangonzaga.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://rhuangonzaga.com/

Result: rhuangonzaga.com is not infected or malware details are not published yet.