Flagged by webutation and here: wot.com/en/scorecard/gn-biz.com?utm_source=addon&utm_content=popup
Most complaints come from Russian users reporting this as a scam and business fraud site.
VirusWatch archives report: Up(nil): unknown_html RIPE DE abuse at hetzner dot de 176.9.197.181 to 176.9.197.181 gn-biz dot com htxp://gn-biz.com/ → gn-biz.com,176.9.197.181,cn1.gnetwork dot biz,Parked/expired,
No Malware Detected by External Scan
pol
Blocked by Google Safebrowsing.
http://killmalware.com/bage.me/#
This URL hosts a threat identified as: HTML/Infected.WebPage.Gen2 or hosted it?
A common attack against the web infrastructure can be the infection of harmless web pages. Some malware changes every HTML file stored on the disc and adds a link (very often an IFrame) to a site hosting malicious code. Other attacks can aim for the web servers and try to insert forwarding to the pages hosted there. The owner of these pages is advised to take them offline. Fix the hole (either on his own PC or on the server), check the pages for infections, clean them and go online again. Infected Web Pages often contain additional Iframe, Object or Script Tags. The Script Tags often contain encrypted Code.
HTML Malware description by Avira
Hidden iFrame found.
size: 1x1 style: hidden
src: htxp://3.tm-stat.net/index.php
http://quttera.com/detailed_report/bage.me → /index.html
Severity: Malicious
Reason: Detected known malicious content.
Details: Threat detected according to previously retrieved information
File size[byte]: 5756
File type: ASCII
MD5: 9398CB5FD9F75EEE74FCCC08E1120CCE
Scan duration[sec]: 0.001000
/#
Severity: Malicious
Reason: Detected known malicious content.
Details: Threat detected according to previously retrieved information
File size[byte]: 5756
File type: ASCII
MD5: 9398CB5FD9F75EEE74FCCC08E1120CCE
Sucuri sitescan:
Scan duration[sec]: 0.001000
Website Malware MW:IFRAME:HD202 htxp://bage.me/
Website Malware MW:IFRAME:HD202 htxp://bage.me/air/bage_1.5.4.air
Hidden Iframes. Details: http://sucuri.net/malware/entry/MW:IFRAME:HD202
’)…
Site vulnerable because of Outdated Web Server Apache Found: Apache/2.2.22
Sites could also get infested because of outdated Joomla CMS (not here in this case)
polonus
Blacklisted by Yandex: http://killmalware.com/sk-konus.ru/#
Blacklisting status
Yandex reports sk-konus dot ru as suspicious website
Blacklisted
SE visitors redirects
Chain of redirects found:
to: htxp://avicennahealth.org/templates/beez/html/mod_poll/1/all.php
0 sites infected with redirects to this URL
to: htxp://www.caribsoft-online.biz/templates/rhuk_solarflare_ii/images/index.php
wXw.caribsoft-online.biz is reported by Google as suspicious
727 sites infected with redirects to this URL
Outdated Joomla Found:
Web application version:
Joomla Version 1.5.18 - 1.5.26 for: htxp://www.sk-konus.ru//media/system/js/caption.js
Joomla Version 1.5.18 to 1.5.26 for: htxp://www.sk-konus.ru//language/en-GB/en-GB.ini
Joomla version outdated: Upgrade required.
Injection check:
Suspicious Text before HTML
Javascript check:
Suspicious
base href=“htxp://www.sk-konus.ru/” /> <meta name="keywor…
Quttera misses detection.
polonus
This site seems vulnerable for SEO-Spam, now cleansed? → http://killmalware.com/johncarlos68.com/#
Detection totally missed here: http://app.webinspector.com/public/reports/23126955
Still blacklisted by Yandex.
Sucuri flags: ISSUE DETECTED DEFINITION INFECTED URL
SEO Spam MW:SPAM:SEO htxp://www.johncarlos68.com/biography ( View Payload )
SEO Spam MW:SPAM:SEO htxp://www.johncarlos68.com/ ( View Payload )
Known Spam detected. Details: http://sucuri.net/malware/entry/MW:SPAM:SEO
Order lasix :: Online P*ll Shop Without Prescription
Nothing here: http://www.urlvoid.com/scan/johncarlos68.com/
Site fell through on the Spam check: Suspicion of Spam
ltradesman.com.au/can-you-buy-vi*gr*-over-the-counter-at-walgreens/">click . e vi*gr* buying him that onnline manuf...
Google Browser diff:
Not identical
Google: 92361 bytes Firefox: 58397 bytes
Diff: 33964 bytes
First difference:
nbsp;
ne subject that would alcohol, if you are sufficient feature of not assumes is still dysfunctions which are quick-dissolving more politi…
Site vulnerable because of outdated CMS: Web application version:
WordPress version: WordPress 3.7.3
Wordpress version from source: 3.7.3
Wordpress Version 3.7.x based on: htxp://www.johncarlos68.com//wp-admin/js/common.js
WordPress theme: htxp://www.johncarlos68.com/wp-content/themes/johnCarlos68/
Wordpress internal path: /hermes/bosnaweb05a/b1860/nf.semetria/public_html/johncarlos68.com/wp-content/themes/johnCarlos68/index.php
WordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress Under 3.9.1
pol
Definitely something more serious here: http://sitecheck.sucuri.net/results/allaboutcineworld.blogspot.com.es/
Website Malware malware-entry-mwjs2368?v2 htxp://allaboutcineworld.blogspot.com.es/
Website Malware malware-entry-mwjs2368?v2 htxp://allaboutcineworld.blogspot.com.es/404testpage4525d2fdc
Website Malware malware-entry-mwjs2368?v2 htxp://allaboutcineworld.blogspot.com.es/404javascript.js
Website Malware malware-entry-mwjs2368?v2 htxp://allaboutcineworld.blogspot.com.es//www.blogger.com/rearrange?blogID=7371214126283499237&widgetType=HTML&widgetId=HTML12&action=editWidget§ionId=content (
Website Malware malware-entry-mwjs2368?v2 htxp://allaboutcineworld.blogspot.com.es/2014/07/hot-spicy-photo-shoot-of-romantic-tamil.html
Website Malware malware-entry-mwjs2368?v2 htxp://allaboutcineworld.blogspot.com.es/search/label/hot%20pappali%20heroin
Known javascript malware (code see: Known javascript malware. Details: http://labs.sucuri.net/db/malware/malware-entry-mwjs2368?v2 )
78 suspicious files given by Quttera’s: http://quttera.com/detailed_report/allaboutcineworld.blogspot.com.es
Detected encoded JavaScript code commonly used to hide suspicious behaviour.
File name: /search/label/salim%20vijay%20antony [[\x34\x5B\x27\x35\x27\x5D\x28\x27\x3C\x33]] and more likewise infested.
Nothing here: http://urlquery.net/report.php?id=1405361435709
Infested with unknown_html_RFI_eval
iFrame check: Suspicious htxp://banners.friendfinder.com/go/page/banner_24368?size=40…
http://banners.friendfinder.com/go/page/iframe_cm_15370?pid=…
Included scripts check:
Suspect - please check list for unknown includes
Suspicious Script:
htxp://poisha.com/show-ads.js
document.write(“<iframe frameborder="0" src="”+url+“" height="”+iframe_height+“" width="”+iframe_width+"" scrolling="no" ></iframe "
polonus