These websites are scams and phishing social networks (Facebook, Instagram, Snapchat, Twitter…). You should blocks them urgently:
These urls are all scam and dangerous, some are redirecting to offers with nude porn games!
So IP and IP related detections are much more informative than mere domain related scan results.
Question here is what is CloudFlare harboring on their cloud platform.
They are known to quickly react to abuse, but in the mean time their business core policy also, more often than not,
offers too wide a vulnerability window, and attracts cybercriminals all sorts to “open shop” to use their cloud service.
This all through a lenient invitation policy towards scammers and the likes.
They should be more restrictive to known to be bad rep websites,
and not turn a blind eye until some other instance like av flags abuse.
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
This also insecurity being found there: (Google alerts that website has terms commonly used in spam hacks)
See: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=bnR2Ynt0Z1t9W3MuXl1tYA%3D%3D~enc
Retirable jQuery libraries detected…
bootstrap 4.1.0 Found in -https://ntvbetgiris.com/js/bootstrap.min.js
Vulnerability info:
High 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042
jquery 3.2.1 Found in -https://ntvbetgiris.com/js/jquery.min.js
Vulnerability info:
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution