See: https://aw-snap.info/file-viewer/?protocol=secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=d3d3Lndbc2hiWy5eXW1g~enc
Consider collapse.js → -https://www.wishbi.com/wp-content/themes/ipinpro/js/collapse.js
Bootstrap: collapse.js v3.3.6
Re: https://sitecheck.sucuri.net/results/www.whisbi.com
Consider: https://maltiverse.com/hostname/static.whisbi.com
Given as clean here: https://online.drweb.com/result/?lng=en&chromeplugin=1&url=http%3A%2F%2Fwww.whisbi.com
No detection: https://www.virustotal.com/gui/url/b2ce36b632e0620d89b0da281ada790fb661095de1d788e701c33380e659cb96/detection
TLS Recommendations
Password input field detected on an unencrypted HTTP page. Please use HTTPS protocol to protect login forms:
-http://static.wishbi.com/.git/HEAD
-http://static.wishbi.com/404javascript.js
-http://static.wishbi.com/404testpage4525d2fdc
HTTPS mixed content found. Your HTTPS website is referring to an HTTP resource:
-http://html5shim.googlecode.com/svn/trunk/html5.js on -https://www.wishbi.com/
-http://html5shim.googlecode.com/svn/trunk/html5.js on -https://www.wishbi.com/login/
-http://html5shim.googlecode.com/svn/trunk/html5.js on -https://www.wishbi.com/login/?redirect_to=/
-http://html5shim.googlecode.com/svn/trunk/html5.js on -https://www.wishbi.com/signup/
See: https://sitecheck.sucuri.net/results/static.wishbi.com
Generic Malware Google abuse or an FP?
polonus (volunteer 3rd part cold recon website security analyst and website error-hunter)