New scan:

Malware Scanner report for seksymoscow.ru

Malicious/Suspicious/Total urls checked
2/0/15
2 pages have malicious code. See details below
Blacklists
Found
The website is marked by Yandex as SMS-fraud resource.

The website "seksymoscow.ru" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=seksymoscow.ru

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://seksymoscow.ru/

Result: The website is marked by Yandex as SMS-fraud resource. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://seksymoscow.ru/
200 OK
Content-Length: 60223
Content-Type: text/html
malicious
Malicious code found. Script contains blacklisted domain: www.stdate.ru

var HTTP_FULL_PATH = '';
var xOffsetPreview = -15;
var yOffsetPreview = -200;
var IMGDIZHOME = 'http://www.stdate.ru:80/sex-znkm';

http://seksymoscow.ru/images/smrb_moscowwhite/js/jquery-1.5.2.min.js
200 OK
Content-Length: 85925
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/jquery/jquery.js
200 OK
Content-Length: 57254
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/jquery/jquery.blockUI.js
200 OK
Content-Length: 15235
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/jquery/jquery.previewImg.js
200 OK
Content-Length: 1740
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/initAjax.js
200 OK
Content-Length: 3629
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/global.js
200 OK
Content-Length: 10140
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/index.js
200 OK
Content-Length: 2257
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/joindiv.js
200 OK
Content-Length: 6506
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/anketa.js
200 OK
Content-Length: 4669
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/videoset.js
200 OK
Content-Length: 2172
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/rotate.js
200 OK
Content-Length: 614
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/javascript/podpiska.js
200 OK
Content-Length: 5173
Content-Type: application/x-javascript
clean
http://www.stdate.ru:80/sex-znkm/images/smrb_moscowwhite/js/checkform.js
200 OK
Content-Length: 2105
Content-Type: application/x-javascript
clean
http://seksymoscow.ru/index.php
200 OK
Content-Length: 60223
Content-Type: text/html
malicious
Malicious code found. Script contains blacklisted domain: www.stdate.ru

var HTTP_FULL_PATH = '';
var xOffsetPreview = -15;
var yOffsetPreview = -200;
var IMGDIZHOME = 'http://www.stdate.ru:80/sex-znkm';


Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: seksymoscow.ru

Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Date: Thu, 26 Feb 2015 09:23:38 GMT
Pragma: no-cache
Server: nginx/1.2.1
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Set-Cookie: PHPSESSID=umpud4t59uav07gh3bca9921u2; path=/
X-Powered-By: PHP/5.4.36-0+deb7u3
Second query (visit from search engine):
GET / HTTP/1.1
Host: seksymoscow.ru
Referer: http://www.google.com/search?q=seksymoscow.ru

Result:
The result is similar to the first query. There are no suspicious redirects found.