New scan:

Malware Scanner report for xingyule.com

Malicious/Suspicious/Total urls checked
0/2/21
2 pages have suspicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "xingyule.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=xingyule.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://www.xingyule.com/
200 OK
Content-Length: 15702
Content-Type: text/html
clean
http://www.xingyule.com/Public/js/jquery.min.js
200 OK
Content-Length: 94840
Content-Type: application/javascript
clean
http://www.xingyule.com/Public/js/common.min.js
200 OK
Content-Length: 783
Content-Type: application/javascript
clean
http://www.xingyule.com/Public/js/jquery.form.js
200 OK
Content-Length: 18577
Content-Type: application/javascript
clean
http://www.xingyule.com/Public/js/jquery.nivo.slider.pack.js
200 OK
Content-Length: 9287
Content-Type: application/javascript
clean
http://tjs.sjs.sinajs.cn/open/api/js/wb.js
200 OK
Content-Length: 34226
Content-Type: application/x-javascript
clean
http://s6.cnzz.com/stat.php?id=5266922&web_id=5266922&show=pic1
200 OK
Content-Length: 10075
Content-Type: application/javascript
clean
http://www.xingyule.com/auth/qq.html
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Wed, 28 Jan 2015 02:25:15 GMT
Pragma: no-cache
Location: https://graph.qq.com/oauth2.0/authorize?client_id=101183014&redirect_uri=http%3A%2F%2Fwww.xingyule.com%2Fauth%2Fqq_callback&response_type=code&scope=get_user_info
Server: Apache/2.2.17 (Win32) PHP/5.3.3
Content-Length: 3
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=7t8edppmq3c3bu57mnjuk12325; path=/
X-Powered-By: PHP/5.3.3
clean
https://graph.qq.com/oauth2.0/authorize?client_id=101183014&redirect_uri=http%3a%2f%2fwww.xingyule.com%2fauth%2fqq_callback&response_type=code&scope=get_user_info
HTTP/1.1 302 Moved Temporarily
Connection: close
Date: Wed, 28 Jan 2015 02:53:01 GMT
Location: http://openapi.qzone.qq.com/oauth/show?which=Login&display=pc&client_id=101183014&redirect_uri=http%3a%2f%2fwww.xingyule.com%2fauth%2fqq_callback&response_type=code&scope=get_user_info
Server: tws
Content-Length: 0
Content-Type: text/html
clean
http://openapi.qzone.qq.com/oauth/show?which=login&display=pc&client_id=101183014&redirect_uri=http%3a%2f%2fwww.xingyule.com%2fauth%2fqq_callback&response_type=code&scope=get_user_info
200 OK
Content-Length: 7051
Content-Type: text/html
suspicious
Page code contains blacklisted domain: www.xingyule.com

...[1850 bytes skipped]...
or.userAgent].join("|_|"));
var src = 'http://badjs.qq.com/cgi-bin/js_report?'+ [bid,mid,msg].join("&");
errorTransport = new Image;
errorTransport.onerror = errorTransport.onload = function(){
errorTransport = errorTransport.onerror = errorTransport.onload = null ;
};
errorTransport.src = src; lse;
Q.crtDomain = 'http://www.xingyule.com';
Q.agree = function(){
window.isAgreed = true;
};
Q.logout = function(){
window.isLogouted = true;
};

Q.isNeedLogin = true;
Q.getParameter = function getParameter(name) {
var r = new RegExp("(\\?|#|&)" + name + "=([^&#]*)(&|#|$)"), m = location.href.match(r);
return decodeURIComponent(!m ? "" : m[2]);
};
Q.ptlogin2 = function(){

...[1780 bytes skipped]...

http://qzonestyle.gtimg.cn/c/=/open/connect/widget/pc/login/pt_adapt.js,qlogin_v2.js?v=20140527
200 OK
Content-Length: 24403
Content-Type: application/x-javascript
clean
http://www.xingyule.com/test404page.js
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Wed, 28 Jan 2015 02:25:20 GMT
Pragma: no-cache
Location: /404.html
Server: Apache/2.2.17 (Win32) PHP/5.3.3
Content-Length: 3
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=fs8jkemcagqg9c09rdu3ool9o2; path=/
X-Powered-By: PHP/5.3.3
clean
http://www.xingyule.com/404.html
HTTP/1.1 200 OK
Connection: close
Date: Wed, 28 Jan 2015 02:25:21 GMT
Accept-Ranges: bytes
ETag: "1000000013a17-1bc-4fc3e1bd5a200"
Server: Apache/2.2.17 (Win32) PHP/5.3.3
Content-Length: 444
Content-Type: text/html
Last-Modified: Fri, 20 Jun 2014 05:53:12 GMT
clean
http://www.xingyule.com/auth/weibo.html
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Wed, 28 Jan 2015 02:25:23 GMT
Pragma: no-cache
Location: https://api.weibo.com/oauth2/authorize?response_type=code&client_id=225964099&redirect_uri=http%3A%2F%2Fwww.xingyule.com%2Fauth%2Fweibo_callback
Server: Apache/2.2.17 (Win32) PHP/5.3.3
Content-Length: 3
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=q2d77i7oqbvd477cvm0d1jf9l4; path=/
X-Powered-By: PHP/5.3.3
clean
https://api.weibo.com/oauth2/authorize?response_type=code&client_id=225964099&redirect_uri=http%3a%2f%2fwww.xingyule.com%2fauth%2fweibo_callback
200 OK
Content-Length: 6909
Content-Type: text/html
suspicious
Page code contains blacklisted domain: www.xingyule.com

...[841 bytes skipped]...
<p class="login_account"><a href="###" class="special_login_link" node-type="loginswitch">二维码登录</a><span class="vline vline_login">|</span><a class="sign_up_link" href="http://weibo.com/signup/signup.php?from=zw&appsrc=mp1x9&backurl=https%3A%2F%2Fapi.weibo.com%2F2%2Foauth2%2Fauthorize%3Fclient_id%3D225964099%26response_type%3Dcode%26display%3Ddefault%26redirect_uri%3Dhttp%253A%252F%252Fwww.xingyule.com%252Fauth%252Fweibo_callback%26from%3D%26with_cookie%3D" target="_blank">注册</a>
</p>
</div>
<!-- 带头像 -->
<div class="WB_panel oauth_main">
<form name="authZForm" action="/oauth2/authorize" method="post" node-type="form">
<div class="oauth_content" node-type="commonlogin">
<p class="oauth_main_info">使用你的微博帐号访问 <a href="http://app.weibo.co
...[3145 bytes skipped]...

https://api.weibo.com/oauth2/js/qrcode_login.js?version=20140625
200 OK
Content-Length: 11131
Content-Type: text/javascript
clean
http://www.xingyule.com/oauth2/js/oauth2Web.js?version=20141113
HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection: close
Date: Wed, 28 Jan 2015 02:25:27 GMT
Pragma: no-cache
Location: /404.html
Server: Apache/2.2.17 (Win32) PHP/5.3.3
Content-Length: 3
Content-Type: text/html
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Set-Cookie: PHPSESSID=vna2cvni09bsk9cjdm40icklf3; path=/
X-Powered-By: PHP/5.3.3
clean
http://www.xingyule.com/about/intro.html
200 OK
Content-Length: 5563
Content-Type: text/html
clean
http://www.xingyule.com/1.html
200 OK
Content-Length: 15980
Content-Type: text/html
clean
http://www.xingyule.com/2.html
200 OK
Content-Length: 16085
Content-Type: text/html
clean
http://www.xingyule.com/3.html
200 OK
Content-Length: 16058
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: xingyule.com

Result:
Second query (visit from search engine):
GET / HTTP/1.1
Host: xingyule.com
Referer: http://www.google.com/search?q=xingyule.com

Result:
The result is similar to the first query. There are no suspicious redirects found.