New scan:

Malware Scanner report for tomgrimshaw.com

Malicious/Suspicious/Total urls checked
0/0/15
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/1
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

letter=Hacked By $J@ROOT {SYLHET}  (37 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.tomgrimshaw.com/
200 OK
Content-Length: 35626
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: letter=Hacked By $J@ROOT {SYLHET}

...[35151 bytes skipped]...
nmousedown='return false;' >

</td>

<td width=700>
<div align=center>
<font color=#33FF00 face=courier size=2>
<br><embed width="500" height="30" align="middle" pluginspage="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash" wmode="transparent" quality="high" src="http://www.widgeo.net/effets/2.swf" flashvars="letter=Hacked By $J@ROOT {SYLHET}"></br>

<br><embed width="500" height="30" align="middle" pluginspage="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash" wmode="transparent" quality="high" src="http://www.widgeo.net/effets/2.swf" flashvars="letter= [ BD GREY HAT HACKER ]"></br>

<br> [+] No System Is Perfect [+]
<br> ----------------------------
<br> [+] We Hack This Site To Inform About
...[2967 bytes skipped]...


http://www.ip2phrase.com/ip2phrase.asp?template=Your IP: <IP>
200 OK
Content-Length: 171
Content-Type: text/html
clean
http://www.ip2phrase.com/
200 OK
Content-Length: 34074
Content-Type: text/html
clean
http://code.google.com/apis/gears/gears_init.js
404 Not Found
Content-Length: 1449
Content-Type: text/html
clean
http://code.google.com//www.google.com/
404 Not Found
Content-Length: 1440
Content-Type: text/html
clean
http://code.google.com/test404page.js
404 Not Found
Content-Length: 1439
Content-Type: text/html
clean
http://ajax.googleapis.com/ajax/libs/prototype/1.6.1.0/prototype.js
200 OK
Content-Length: 139854
Content-Type: text/javascript
clean
http://ajax.googleapis.com/ajax/libs/scriptaculous/1.8.3/scriptaculous.js
200 OK
Content-Length: 2936
Content-Type: text/javascript
clean
http://ads.hexasoft.com.my/ads.js
200 OK
Content-Length: 4039
Content-Type: text/html
clean
http://ads.hexasoft.com.my/\"http://www.weatherdatasource.com/\"
404 Not Found
Content-Length: 245
Content-Type: text/html
clean
http://ads.hexasoft.com.my/\"http://www.ip2location.com/\"
404 Not Found
Content-Length: 239
Content-Type: text/html
clean
http://ads.hexasoft.com.my/\"http://www.geodatasource.com/\"
404 Not Found
Content-Length: 241
Content-Type: text/html
clean
http://ads.hexasoft.com.my/\"http://www.fraudlabspro.com/\"
404 Not Found
Content-Length: 240
Content-Type: text/html
clean
http://ads.hexasoft.com.my/\"http://www.mailboxvalidator.com\"
404 Not Found
Content-Length: 243
Content-Type: text/html
clean
http://ads.hexasoft.com.my/\"http://www.locaproxy.com/\"
404 Not Found
Content-Length: 237
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: tomgrimshaw.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: tomgrimshaw.com
Referer: http://www.google.com/search?q=tomgrimshaw.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=tomgrimshaw.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://tomgrimshaw.com/

Result: tomgrimshaw.com is not infected or malware details are not published yet.