Re: -http://192.185.62.72:2095/horde/login.php (via /shared.js/shared.js etc.)
Console info
Uncaught SyntaxError: Unexpected token < in JSON at position 0
at JSON.parse ()
at XMLHttpRequest.xhr.onreadystatechange (app.js:21)
and
Syntax error @ "My Bootstrap_Variant.JS"! ########################## JSHINT output: ##########################SyntaxError: Unexpected token ‘<’
at eval ()
at :4:80
at Object.t [as F_c] (:3:191)
at Object.E_u (:4:244)
at eval (eval at exec_fn (:2:115), :74:477)
at Object.create (eval at exec_fn (:2:115), :76:193)
at c (eval at exec_fn (:2:115), :15:231)
at :4:80
at i (eval at exec_fn (:2:115), :13:165)
This website is insecure
This website is insecure.
60% of the trackers on this site could be protecting you from NSA snooping. Tell to fix it.
All trackers
At least 5 third parties know you are on this webpage.
-Optimizely
-shaaaaaaaaaaaaa.com
-192.185.62.72
-www.googletagmanager.com -www.googletagmanager.com
Risk rating 10 red out of 10: https://sitereport.netcraft.com/?url=http://192.185.62.72
Outgoing link = -https://go.cpanel.net/privacy
See malware on IP: https://www.virustotal.com/gui/ip-address/192.185.62.72/relations
The Real McCoy with 100% content: -https://id.cpanel.net/get/login?url=aHR0cHM6Ly9zdG9yZS5jcGFuZWwubmV0L215Lw==
But with bootstrap vulners:
bootstrap 4.1.3 Found in -https://id.cpanel.net/static/bwr/bootstrap/dist/js/bootstrap.js _____Vulnerability info:
Medium 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331
polonus (volunteer 3rd party cold recon website-security analyst and website error-hunter)