See flagged on three counts: https://threatintelligenceplatform.com/report/shiftactioncoaching.com/9Oo3aR7ljV
See: Virus Total suspicious URLs analyser Failed Status: dangerous
Yandex Safebrowsing - malware site but not here: https://virustotal.com/#/url/c940e7ed78fdfe5dceaa7b51407e476e1fbca29342057897252533e9e3d721e9/detection
on content plug-ins (outdated) http://www.domxssscanner.com/scan?url=http%3A%2F%2Fshiftactioncoaching.com%2F
1 vulnerable library: http://retire.insecurity.today/#!/scan/8bb00dacc6e4d5f7751eade703a1baf4cd69315202c1c18b43bbeb35b414b5fc
errors in code
wXw.shiftactioncoaching.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1 benignundefined because not listed in the code…one has to just have to use the typeof operator. (info StackOverflow).
[nothing detected] wXw.shiftactioncoaching.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
status: (referer=http:/wXw.ask.com/web?q=puppies)saved 10056 bytes 90532aff6d4121954254cdf04994d834f7ec169b
info: [decodingLevel=0] found JavaScript
error: undefined variable jQuery
error: undefined function a
file: 90532aff6d4121954254cdf04994d834f7ec169b: 10056 bytes
CMS Insecurity: WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.
contact-form-7 4.7 latest release (4.9) Update required
https://contactform7.com/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.
Two reverse DNS - (more not given here): -http://shiftactioncoaching.com/
GoogleSafe:
OK Load:
135ms Server: 172.93.49.41
Apache/2.2.15 (CentOS) ASN: 54540 United States
Incero LLC Reverse DNS:
-ns3.xaudits.com
-http://www.shiftactioncoaching.com/
GoogleSafe:
OK Load:
722ms Server: 173.201.1.12
Apache ASN: 26496 United States
GoDaddy.com, LLC Reverse DNS:
-ip-173-201-1-12.ip.secureserver.net
polonus (volunteer website security analyst and website error-hunter)