New scan:

Malware Scanner report for wildcardts.com

Malicious/Suspicious/Total urls checked
0/0/15
Blacklists
OK
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
Found
Probably the website is defaced. The following signature was found:

Hacked by KaSHI HaXor  (15 websites defaced)

See details below

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Scanned pages/files

RequestServer responseStatus
http://wildcardts.com/
200 OK
Content-Length: 14003
Content-Type: text/html
suspicious
Deface/Content modification. The following signature was found: Hacked by KaSHI HaXor

...[10470 bytes skipped]...
tion="left" onmouseover="this.stop();" onmouseout="this.start();" scrolldelay="150">
<table width="100%" cellpadding="0" cellspacing="0" border="0" >
<tr>

<td align="center" height="122" class="fieldlefttxt">
<a href="products.php?cat_id=1">
<img src="pics/fb photo_4.png" height="100px;"/><br />
Hacked by KaSHI HaXor</a></td>
<td width="10px"></td>

</tr>
</table>
</marquee>
</div>
</div>
<div class="boxbottom">&nbsp;</div>
</div>
<div id="boxes1">
<div class="boxtop">
<div class="textposition">
<div class="headingtxt"><a href="services.php">S
...[5346 bytes skipped]...


http://wildcardts.com/jscripts/stm31.js
200 OK
Content-Length: 44689
Content-Type: application/javascript
clean
http://wildcardts.com/jscripts/AC_RunActiveContent.js
200 OK
Content-Length: 8029
Content-Type: application/javascript
clean
http://wildcardts.com/jscripts/flash_fix.js
200 OK
Content-Length: 7283
Content-Type: application/javascript
clean
http://wildcardts.com/jscripts/mainmenu.js
200 OK
Content-Length: 16394
Content-Type: application/javascript
clean
http://wildcardts.com/callto://wildcard.ts/
404 Not Found
Content-Length: 338
Content-Type: text/html
clean
http://wildcardts.com/test404page.js
404 Not Found
Content-Length: 331
Content-Type: text/html
clean
http://wildcardts.com/products.php
200 OK
Content-Length: 33531
Content-Type: text/html
clean
http://wildcardts.com/jscripts/jquery-1.4.2.min.js
200 OK
Content-Length: 72174
Content-Type: application/javascript
clean
http://wildcardts.com/jscripts/jqueryfunctions.js
200 OK
Content-Length: 7227
Content-Type: application/javascript
clean
http://wildcardts.com/products.php?cat_id=1
200 OK
Content-Length: 7795
Content-Type: text/html
clean
http://wildcardts.com/product_details.php?cat_id=11&prod_id=1
200 OK
Content-Length: 15405
Content-Type: text/html
clean
http://wildcardts.com/product_details.php?cat_id=11&prod_id=2
200 OK
Content-Length: 12465
Content-Type: text/html
clean
http://wildcardts.com/product_details.php?cat_id=11&prod_id=3
200 OK
Content-Length: 11827
Content-Type: text/html
clean
http://wildcardts.com/product_details.php?cat_id=11&prod_id=4
200 OK
Content-Length: 12802
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: wildcardts.com

Result:
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Sun, 02 Aug 2015 23:38:09 GMT
Pragma: no-cache
Server: Apache Phusion_Passenger/4.0.10 mod_bwlimited/1.4 mod_fcgid/2.3.9
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=7j7h707kf35t7nm7gvik75fk25; path=/
X-Powered-By: PHP/5.4.43
Second query (visit from search engine):
GET / HTTP/1.1
Host: wildcardts.com
Referer: http://www.google.com/search?q=wildcardts.com

Result:
The result is similar to the first query. There are no suspicious redirects found.

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=wildcardts.com

Result: This site is not currently listed as suspicious.
Query: http://yandex.com/infected?l10n=en&url=http://wildcardts.com/

Result: wildcardts.com is not infected or malware details are not published yet.