Blacklisted and vulnerabilities php
<?php $dart="/index.html"; $src=$_SERVER['REMOTE_ADDR']; $auth=false; switch($src){ case "localhost": case "127.0.0.1": default: $auth=false; }Can be faked remotely → https://stackoverflow.com/questions/5092563/how-to-fake-serverremote-addr-variableif(!$auth){header("Location: ".$dart);exit();}
?>
Detected malware at -graphic-desighner.com/ consider: https://urlquery.net/report/c3b301ff-a158-468e-a51a-5868d59e498e
Related https://www.virustotal.com/#/url/0b30141b72686a63445191a07063f10dd2eb01ae706d7d4cc92b7b8800d51a38/detection
and https://www.virustotal.com/#/url/4294f92d428bc9d6d9c84f7bc678ba1e62c12ad025b6f4a437e3bf70c0fc19c1/detection
vulnerable sizzle.js href - .innerHTML= 46 recommendations: https://webhint.io/scanner/b323e721-add1-4397-b6f4-249e218e1446
F-grade security: https://observatory.mozilla.org/analyze/graphic-desighner.com
Re: https://retire.insecurity.today/#!/scan/11ed78a7113980e65b6c8371bf6adabd5004c3363d4cd4d01b41f4a927ac24a6
Consider also https://www.virustotal.com/#/url/afcee895785e1535f4934e3e1a419e64d545fb954e0a1689cbf5ce45e8f790d3/detection
via -https://c0.wp.com/c/4.9.8/wp-includes/js/jquery/jquery.js
polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)