My domain is blcoked by Avast, please help.

Dear Avast

Somehow my site content was infected by malware files and blocked as “phishing” site by Avast, my domain name is d-themes.com.
Can you please help me to unblock it asap? I tried to contact Avast through contact forms by no reply yet. I could get very fast response from malwarebytes.com company.
Your help is highly appreciated.

Regards.

PS. I checked all the site content and fixed all malware related files.

https://sitecheck.sucuri.net/results/d-themes.com

Please check using https protocol.
https://sitecheck.sucuri.net/results/https/d-themes.com

You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php

I already contacted using this url yesterday, but still no response.
This is an urgent problem for us.
Please help me to remove our domain from the blacklist asap.

Thanks.

OK, now you need to wait for the verdict from threat lab. You should get a reply within 48 hours.

Hi Asyn,

This domain (d-themes dot com) is a parked domain. Bitdefender flags it as such.

polonus

I installed Bitdefender chrome extension but no problem with that. :frowning:

https://d-themes.com/wordpress/riode

The domain does not have content for root url, just has content inside sub directories.

HTTPS Everywhere starts to protest your link as it is HTTP networkbased-downgrade attack.

Errors on the redirect site: yntaxError: Unexpected identifier
eval ()()
:4:80()
Object.t [as F_c] (:3:191)()
Object.E_u (:4:244)()
eval (eval at exec_fn (:2:115), :67:477)()
Object.create (eval at exec_fn (:2:115), :69:193)()
c (eval at exec_fn (:2:115), :7:231)()
:4:80()
i (eval at exec_fn (:2:115), :5:165)()
eval (eval at exec_fn (:2:115), :5:292)()

SyntaxError: Invalid regular expression flags
eval ()()
:4:80()
Object.t [as F_c] (:3:191)()
Object.E_u (:4:244)()
eval (eval at exec_fn (:2:115), :67:477)()
Object.create (eval at exec_fn (:2:115), :69:193)()
c (eval at exec_fn (:2:115), :7:231)()
:4:80()
i (eval at exec_fn (:2:115), :5:165)()
eval (eval at exec_fn (:2:115), :5:292)()

20% on ads blocked for me. Linked Sites
Reputation checks have been performed on the IP address for each of the linked sites. Hosts found on blacklists with poor reputation may be a threat to users of the site. Hosting and locations are also included in the results.

Externally Linked Host Hosting / Company Netblock
-visualcomposer.com CLOUDFLARENET
-elementor.com CLOUDFLARENET
-go.wpbakery.com * CLOUDFLARENET all given the all green by Google’s. URL link shortener, meant to be private.
But vulnerable:
bootstrap 3.1.1 Found in hxtps://go.wpbakery.com/static/bootstrap.min.js _____Vulnerability info:
Medium 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331 1
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041 1
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040 1
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)