URL:Mal or URL:Mal2 detections both mean the URL (either a domain, subdomain, path, IP, or any combination of these) is on our blacklist.
If the domain is blacklisted, the Avast popup shows the URL entered in the browser (so if the user entered "images.leblogduhacker.fr/logov2.jpg" and "leblogduhacker.fr" was blocked, Avast would show "images.leblogduhacker.fr/logov2.jpg").
If the domain is not blacklisted, Avast lets your browser check the DNS for the IP, and then tests the IP. If the IP is blacklisted, Avast would show something like "104.28.20.53" when displaying the popup.
This was the old "Network Shield" - checking if the URLs are blacklisted.
Then we have the old “Web Shield”, which actually checks the inside of the page (the source code). When Avast sees a suspicious code, it shows a popup with whatever was suspicious: this includes all JS: and HTML: detections.
A strange crossover is the HTML:Iframe-inf, HTML:Script-inf, etc - this means a blacklisted domain is being loaded into an otherwise clean domain.
The old network shield and old web shield were merged into Web Shield, as we know it from the current versions of Avast, as a means of simplification. Deep down there, though, it still works as previously, merging is mostly a GUI issue.
Currently there is not even a site on that domain.
I suspect something was detected on the domain and/or IP in the past.
maybe no reasons to blacklist or block it, but security could be improved. WordPress:
Warning User Enumeration is possible :
The first two user ID’s were tested to determine if user enumeration is possible.
ID User Login
1 Steven Perez admin
2 None
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.