New scan:

Malware Scanner report for toyokunihonda.com

Malicious/Suspicious/Total urls checked
1/0/5
1 page has malicious code. See details below
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/1
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

./ Hacked By Rifaldi238  (8 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://toyokunihonda.com/
200 OK
Content-Length: 3731
Content-Type: text/html
suspicious
Malicious code - confirmed by antiviruses (see below)

var vclk_options = {sid:65918,media_id:2,media_type:2,version:"1.3",pfc:900000};

Antivirus reports:

TrendMicro-HouseCall
TROJ_GEN.F47V0724
Kaspersky
UDS:DangerousObject.Multi.Generic

Deface/Content modification. The following signature was found: ./ Hacked By Rifaldi238

<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1"><title>./ Hacked By Rifaldi238</title><link rel="SHORTCUT ICON" href="http://upload.wikimedia.org/wikipedia/commons/thumb/9/9f/Flag_of_Indonesia.svg/320px-Flag_of_Indonesia.svg.png">

<link rel="me" href="http://www.blogger.com/profile/01831587429137986659" />
<link rel="openid.server" href="http://www.blogger.com/openid-server.g" />
</head>
<title>Hacked by Rifaldi238</title>
<body
...[3814 bytes skipped]...


http://cl.netseer.com/dsatserving2/scripts/netseerads.js
200 OK
Content-Length: 9798
Content-Type: application/javascript
clean
http://cdn.fastclick.net/js/adcodes/pubcode.min.js?sid=65918&media_id=2&media_type=2&version=1.3&exc=1&pfc=900000
200 OK
Content-Length: 7796
Content-Type: application/x-javascript
clean
http://bomb-mp3.com/embedcl.php
200 OK
Content-Length: 0
Content-Type: text/html
clean
http://bomb-mp3.com/test404page.js
404 Not Found
Content-Length: 646
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: toyokunihonda.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 21 Aug 2014 18:31:20 GMT
Accept-Ranges: bytes
Server: Apache
Content-Length: 3731
Content-Type: text/html
Host-Header: 192fc2e7e50945beb8231a492d6a8024
X-Cache: SGCACHE-MISS
X-Forwarded-For: 78.158.11.226
X-Host: toyokunihonda.com
X-Url: /

...3731 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: toyokunihonda.com
Referer: http://www.google.com/search?q=toyokunihonda.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=toyokunihonda.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://toyokunihonda.com/

Result: toyokunihonda.com is not infected or malware details are not published yet.