New scan:

Malware Scanner report for vpoiskah-sexa.ru

Malicious/Suspicious/Total urls checked
0/1/11
1 page has suspicious code. See details below
Blacklists
Found
The website is marked by Yandex as SMS-fraud resource.

The website "vpoiskah-sexa.ru" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=vpoiskah-sexa.ru

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://vpoiskah-sexa.ru/

Result: The website is marked by Yandex as SMS-fraud resource. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://vpoiskah-sexa.ru/
200 OK
Content-Length: 86871
Content-Type: text/html
suspicious
Page code contains blacklisted domain: www.stdate.ru

...[327 bytes skipped]...
ºÑ знакомства - Россия, Москва, Новосибирск. Лучшие знакомства для секса с фото. Интим знакомства" />
<meta name="Keywords" content="Секс знакомства, интим знакомства, Россия, Москва, Новосибирск, фото, лучшие знакомства для секса" />

<link href="http://www.stdate.ru:80/sex-znkm/images/smrb_naidisex/index.css" type="text/css" rel="stylesheet" />
<link href="http://www.stdate.ru:80/sex-znkm/images/smrb_naidisex/preview.css" type="text/css" rel="stylesheet" />

<link rel="stylesheet" href="http://www.stdate.ru:80/sex-znkm/images/a_forall/css/at_smart.css" type="text/css" />
<script type="text/javascript">
var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-16932027-5']);
_gaq.push(['_t
...[104736 bytes skipped]...

http://vpoiskah-sexa.ru/javascript/jquery/jquery.js
200 OK
Content-Length: 57254
Content-Type: application/x-javascript
clean
http://vpoiskah-sexa.ru/javascript/jquery/jquery.blockUI.js
200 OK
Content-Length: 15235
Content-Type: application/x-javascript
clean
http://vpoiskah-sexa.ru/javascript/jquery/jquery.previewImg.js
200 OK
Content-Length: 1740
Content-Type: application/x-javascript
clean
http://vpoiskah-sexa.ru/javascript/initAjax.js
200 OK
Content-Length: 3629
Content-Type: application/x-javascript
clean
http://vpoiskah-sexa.ru/javascript/global.js
200 OK
Content-Length: 10140
Content-Type: application/x-javascript
clean
http://vpoiskah-sexa.ru/javascript/index.js
200 OK
Content-Length: 2257
Content-Type: application/x-javascript
clean
http://vpoiskah-sexa.ru/javascript/joindiv.js
200 OK
Content-Length: 6506
Content-Type: application/x-javascript
clean
http://vpoiskah-sexa.ru/javascript/hovers.js
200 OK
Content-Length: 1347
Content-Type: application/x-javascript
clean
http://vpoiskah-sexa.ru/nospam/
200 OK
Content-Length: 3022
Content-Type: text/html
clean
http://vpoiskah-sexa.ru/test404page.js
404 Not Found
Content-Length: 570
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: vpoiskah-sexa.ru

Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Date: Thu, 17 Jul 2014 02:28:31 GMT
Pragma: no-cache
Server: nginx/1.2.1
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Set-Cookie: PHPSESSID=3jqotgpboclbnjpuse9pbikjv5; path=/
X-Powered-By: PHP/5.4.4-14+deb7u8
Second query (visit from search engine):
GET / HTTP/1.1
Host: vpoiskah-sexa.ru
Referer: http://www.google.com/search?q=vpoiskah-sexa.ru

Result:
The result is similar to the first query. There are no suspicious redirects found.