See: http://tium.co/3webmarketing.com for this sub-domain, flagged 5 times as malicious site: https://www.virustotal.com/en/url/e21f7e07387385a61c8ca69a52e726a5e56c4a7268abbb39a9c8c6514867df96/analysis/1467372399/
Nothing flagged here: https://urlquery.net/report.php?id=1467368592939
AOS does not flag and neither does WOT.Yandex blacklisted: http://www.yandex.com/infected?url=3webmarketing.com&l10n=en
Again we find GoDaddy abuse for a site with WordPress insecurity:
WordPress Version
4.3.5
Version does not appear to be latest 4.5.3 - update now.
WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.
ml-slider 3.3.5 latest release (3.3.7) Update required
https://www.metaslider.com
slider-image 3.1.8 latest release (3.1.88) Update required
http://huge-it.com/slider
contact-form-7 4.3.1 latest release (4.4.2) Update required
http://contactform7.com/
booking 5.4.4 latest release (6.2) Update required
http://wpbookingcalendar.com/demo/
contact-form-7-datepicker 2.5.1 latest release (2.5.2) Update required
https://github.com/relu/contact-form-7-datepicker/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.
IP badness history: https://www.virustotal.com/en/ip-address/184.168.232.1/information/
Google Safebrowsing link-alert for: Externally Linked Host Hosting Provider Country
wXw.hotelrealdinastia.com GoDaddy.com, LLC United States → http://tium.co/%20hotelrealdinastia.com
jQuery libraries to be retired: -http://3webmarketing.com/hotelrealprueba
Detected libraries:
jquery-migrate - 1.2.1 : -http://www.hotelrealdinastia.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.11.3 : (active1) -http://www.hotelrealdinastia.com/wp-includes/js/jquery/jquery.js?ver=1.11.3
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery.prettyPhoto - 3.1.6 : (active1) -http://www.hotelrealdinastia.com/wp-content/themes/anchor/js/plugins.js?ver=20120206
jquery - 2.1.1 : -http://qualifiedourspecialoffer.com/i/green/js/vendor.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 2.1.1 : -http://qualifiedourspecialoffer.com/i/green/js/vendor.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.12.2 : https://code.jquery.com/jquery-1.12.2.min.js
jquery - 2.1.1 : -http://qualifiedourspecialoffer.com/i/green/js/vendor.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.12.2 : https://code.jquery.com/jquery-1.12.2.min.js
(active) - the library was also found to be active by running code
5 vulnerable libraries detected
Google Safe Browse reports Possible infection with malware for -http://www.hotelrealdinastia.com
See: http://killmalware.com/www.hotelrealdinastia.com/
polonus