Re: http://killmalware.com/badem.com/#
parked and expired site: Script loaded:
kicks up
//alert(‘cookie params wrong’);
Re: http://toolbar.netcraft.com/site_report?url=http://return.uk.uniregistry.com
info: [script] return.uk.uniregistry.com/js.php?d=badem.com&s=1463504318
info: [script] 127.0.0.1/js/jquery.min.js
info: [frame] 127.0.0.1/tg.php?uid=badem573b4dbed4b000.89281220
info: [frame] 127.0.0.1/caf.php?uid=badem573b4dbed4b000.89281220&src=mountains&abp=1&country=NL
info: [frame] 127.0.0.1/page.php?badem573b4dbed4b000.89281220
Could such admin bars been targeted by attackers.
Consider: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fbadem.com%2F
where I get
[nothing detected] script
info: [decodingLevel=0] found JavaScript
error: line:5: SyntaxError: missing } after function body:
error: line:5:
error: line:5: ^
error: line:4: SyntaxError: missing = in XML attribute:
error: line:4: <!DOCTYPE HTML PUBLIC "-/W3C/DTD HTML 4.01/EN" "-http:/www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <meta http-equiv="Content-Script-Type" content="text/javascript"> <scri
error: line:4: .....................^
polonus (volunteer website security analyst and website error-hunter)