TScanned: -https://github.githubassets.com/assets/github-bootstrap-59d11841a5c00f27.js with 333 sources and 159 sinks
opened up to -http://kak-sama.ru/wp-content/plugins/q2w3-fixed-widget/js/q2w3-fixed-widget.min.js?ver=5.1.4
and -http://kak-sama.ru/wp-includes/js/wp-embed.min.js?ver=5.0.3
For the IP I get these weaknesses: https://www.shodan.io/host/89.163.140.78
Vulnerable library there: https://retire.insecurity.today/#!/scan/13f09e10e459b4a1e44e9836efa10b668afb7483f01196e909e6e71089dba2b7
Tracking performed via -https://usocial.pro/usocial/fingerprint2.min.js to mobili slider at:
-http://kingtrend.ru/catalog/catalog/view/javascript/jquery/owl-carousel/owl.carousel.min.js
and the vulnerability circle will close again when we again land at bottstrap.js with:
-http://kingtrend.ru/catalog/catalog/view/theme/storeset/js/bootstrap.js
polonus (volunteer website security analyst and website error-hunter)