Is it blocked or alerted? → https://urlquery.net/report.php?id=1455312328071
Not directly but Avast will block a dangerous redirect. **
The address you entered is unnecessarily exposing the following response headers which divulge its choice of web platform:
Server: nginx/1.0.14 alerted as “Outdated Web Server Nginx Found: nginx/1.0.14”
X-Powered-By: PHP/5.3.10
Result
It looks like 9 cookies are being set without the “HttpOnly” flag being set (name : value):
PHPSESSID : 0tjo1g61qq37ogag6odd0qi3b0
s1466 : 1%3A1%3A%3A%3A
ip : 54.235.159.202
gp_vote :
gp_count : 50
fb_vote :
fb_count : 81
twit_vote :
twit_count : 92
Unless the cookie legitimately needs to be read by JavaScript on the client, the “HttpOnly” flag should always be set to ensure it cannot be read by the client and used in an XSS attack. * Consider here for instance: http://www.domxssscanner.com/scan?url=http%3A%2F%2Ffilebit3cc.com%2F
and yes “jquery.cookie.js” is flagged as dom xss “source”
Vulnerable retirable code detected: -http://filebit3cc.com/
Detected libraries:
jquery - 1.7.2 : -http://dl19.file2bitcc.tk//skins/default/js/jquery.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery-ui-dialog - 1.8.18 : -http://dl19.file2bitcc.tk//skins/default/js/jquery-ui-1.8.18.custom.min.js
Info: Severity: medium
http://bugs.jqueryui.com/ticket/6016
2 vulnerable libraries detected
Quttera has detected this suspicious file: index
Severity: Suspicious
Reason: Detected suspicious redirection to external web resources at HTTP level.
Details: Detected HTTP redirection to -http://dl19.file2bitcc.tk. ** AOS flags as dangerous site and blocks this!
File size[byte]: 0
File type: Unknown
Page/File MD5: 00000000000000000000000000000000
Scan duration[sec]: 0.001000
Sucuri also flags as: Suspicious domain detected. Details: http://sucuri.net/malware/malware-entry-mwblacklisted35
</diWe are being protected as Avast also prevents us from landing there!
polonus