Re: https://aw-snap.info/file-viewer/?tgt=http%3A%2F%2Fwww.jpforever.com%2F&ref_sel=GSP2&ua_sel=ff&fs=1
hacked and defaced website, where hosted → going to IP address: http://78.157.200.45/cgi-sys/defaultwebpage.cgi
stating: © Visual Orb 2012We are not responsible for the content of external sites…
9 red out of qo web risk: http://toolbar.netcraft.com/site_report?url=http://78.157.200.45
A meagre F-status here: https://observatory.mozilla.org/analyze.html?host=www.jpforever.com
Then we look at: http://toolbar.netcraft.com/site_report?url=http://jpforever.com
dns1.dnshostnetwork.com as a hosting nameserver is vulnerable to poodle and heartbleed.
PositiveSSL Multi-Domain,Domain Control Validated certifying for
Common name:
sni143613.cloudflaressl.com
SAN:
sni143613.cloudflaressl.com, *.boxpaw.top, *.dnshostnetwork.com, *.drugie-danie.top, *.earpen.top, *.filesense.mobi, *.fuorukazerejakewai.win, *.gaincreditcards.com, *.gbimssydney.org, *.gbimssydney.org.au, *.ideayou.top, *.keyfew.top, *.majestyloansforpeoplewithnocredit.top, *.numbercy.top, *.perdadepesorapido.xyz, *.skyfew.top, *.sundaystore24h.tk, *.tadakawashoumushotou.win, *.urozambiamaesakanauraji.win, boxpaw.top, dnshostnetwork.com, drugie-danie.top, earpen.top, filesense.mobi, fuorukazerejakewai.win, gaincreditcards.com, gbimssydney.org, gbimssydney.org.au, ideayou.top, keyfew.top, majestyloansforpeoplewithnocredit.top, numbercy.top, perdadepesorapido.xyz, skyfew.top, sundaystore24h.tk, tadakawashoumushotou.win, urozambiamaesakanauraji.win
CloudFlare abuse: https://observatory.mozilla.org/analyze.html?host=dns1.dnshostnetwork.com
polonus (volunteer website security analyst and website error-hunter)