New scan:

Malware Scanner report for tyora.fi

Malicious/Suspicious/Total urls checked
0/0/3
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/1/1
1 suspicious iframe found. See details below
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked By K4iZen  (3 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://www.tyora.fi/
HTTP/1.1 302 Found
Connection: close
Date: Thu, 02 Apr 2015 11:51:13 GMT
Location: http://tyora.fi
Server: Apache/2.2.22 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 277
Content-Type: text/html; charset=iso-8859-1
clean
http://tyora.fi/
200 OK
Content-Length: 4684
Content-Type: text/html
suspicious
Hidden iFrame found.
size: 1x1     
src: http://www.youtube.com/embed/fuw9isjrkbq?rel=0&autoplay=1&loop=1&playlist=guslypfx7oq

<iframe width="1" height="1" src="http://www.youtube.com/embed/fuw9isjrkbq?rel=0&autoplay=1&loop=1&playlist=guslypfx7oq" frameborder="0" allowfullscreen>

Deface/Content modification. The following signature was found: Hacked By K4iZen

...[555 bytes skipped]...
NS4;
}
else if (document.all&&!document.getElementById){
document.onmousedown=clickIE4;
}

document.oncontextmenu=new Function("alert(message);return false")

</script>

<script type="text/javascript">
function tb8_makeArray(n){
this.length = n;
return this.length;
}
tb8_messages = new tb8_makeArray(3);
tb8_messages[0] = "Hacked By K4iZen";
tb8_messages[1] = "Hello Mr. Administrator";
tb8_messages[2] = "We are Elite Crew Hackers";
tb8_messages[3] = "Please patch your security! ";
tb8_rptType = 'infinite';
tb8_rptNbr = 5;
tb8_speed = 100;
tb8_delay = 2000;
var tb8_counter=1;
var tb8_currMsg=0;
var tb8_tekst ="";
var tb8_i=0;
var tb8_TID = null;
function tb8_pisi(){
tb8_tekst = tb8_tekst + tb8_messages[tb8_currMsg].substring(tb8_i, tb8_i+1)
...[4293 bytes skipped]...


http://tyora.fi/test404page.js
404 Not Found
Content-Length: 286
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: tyora.fi

Result:
HTTP/1.1 200 OK
Connection: close
Date: Thu, 02 Apr 2015 11:51:13 GMT
Server: Apache/2.2.22 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 4684
Content-Type: text/html
X-Powered-By: PHP/5.4.6-1ubuntu1.2

...4684 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: tyora.fi
Referer: http://www.google.com/search?q=tyora.fi

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=tyora.fi

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://tyora.fi/

Result: tyora.fi is not infected or malware details are not published yet.