New scan:

Malware Scanner report for werevip.com

Malicious/Suspicious/Total urls checked
0/0/7
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked by Team_CC  (129 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://werevip.com/
200 OK
Content-Length: 8063
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked by Team_CC

<head>
<meta http-equiv="Content-Type" content="text/HTML; charset=utf-8" />
<link rel="shortcut icon" href="http://i.imgur.com/WL5gxz5.gif" type="image/x-icon">
<title>Hacked by Team_CC</title>
<link href='http://fonts.googleapis.com/css?family=Orbitron' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Wallpoet' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Cherry+Swash' rel='stylesheet' type='text/css'>
<link href='http://fonts.googleapis.com/css?family=Audiowide' rel='stylesheet' type='text
...[8801 bytes skipped]...


https://dendicious.googlecode.com/files/snow.js
200 OK
Content-Length: 3305
Content-Type: text/plain
clean
http://dendicious.googlecode.com/test404page.js
404 Not Found
Content-Length: 1575
Content-Type: text/html
clean
http://dendicious.googlecode.com//www.google.com/
404 Not Found
Content-Length: 1561
Content-Type: text/html
clean
http://otowebsite.googlecode.com/files/Getar.js.txt
200 OK
Content-Length: 739
Content-Type: text/plain
clean
http://goo.gl/ijGD6
HTTP/1.1 301 Moved Permanently
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Connection: close
Date: Fri, 20 Nov 2015 21:57:45 GMT
Pragma: no-cache
Accept-Ranges: none
Location: http://peterjepimarsblog.googlecode.com/files/mousegetar.js
Server: GSE
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Fri, 01 Jan 1990 00:00:00 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
clean
http://peterjepimarsblog.googlecode.com/files/mousegetar.js
200 OK
Content-Length: 6974
Content-Type: text/plain
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: werevip.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 20 Nov 2015 21:57:44 GMT
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html
Second query (visit from search engine):
GET / HTTP/1.1
Host: werevip.com
Referer: http://www.google.com/search?q=werevip.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=werevip.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://werevip.com/

Result: werevip.com is not infected or malware details are not published yet.