Site probably blocked because of PHISHING of other domains on same IP:
https://cymon.io/107.180.27.178and
https://www.threatcrowd.org/ip.php?ip=107.180.27.178Code to be retired: -http://www.revistamidinero.com.do
Detected libraries:
jquery-migrate - 1.4.1 : -http://revistamidinero.com.do/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
jquery - 1.12.4 : (active1) -http://revistamidinero.com.do/wp-includes/js/jquery/jquery.js?ver=1.12.4
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/(active) - the library was also found to be active by running code
1 vulnerable library detected
CMS Outdated: Outdated WordPress Found Security Updates WordPress Under 4.6
Warrning Directory Indexing Enabled
In the test we attempted to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is an information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.
/wp-content/uploads/ enabled
/wp-content/plugins/ disabled
Directory indexing was tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.
Also consider souces and sinks here:
http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.revistamidinero.com.doSecurity here = 0 ->
https://webcookies.org/cookies/www.revistamidinero.com.do/29993473 times F-Status:
https://observatory.mozilla.org/analyze.html?host=www.revistamidinero.com.doYou could ask for an exclusion of that general IP block, but that to decide is only for Avast Team Members, as we are just volunteers with experience and relevant knowledge. So wait for one to give the final verdict.
polonus (volunteer website security analyst and website error-hunter)