Re: -http://192.185.62.72:2095/horde/login.php (via /shared.js/shared.js etc.)
Console info
Uncaught SyntaxError: Unexpected token < in JSON at position 0
at JSON.parse (<anonymous>)
at XMLHttpRequest.xhr.onreadystatechange (app.js:21)
and
Syntax error @ "My Bootstrap_Variant.JS"!
##########################
JSHINT output:
##########################
SyntaxError: Unexpected token '<'
at eval (<anonymous>)
at <anonymous>:4:80
at Object.t [as F_c] (<anonymous>:3:191)
at Object.E_u (<anonymous>:4:244)
at eval (eval at exec_fn (:2:115), <anonymous>:74:477)
at Object.create (eval at exec_fn (:2:115), <anonymous>:76:193)
at c (eval at exec_fn (:2:115), <anonymous>:15:231)
at <anonymous>:4:80
at i (eval at exec_fn (:2:115), <anonymous>:13:165)
This website is insecure
This website is insecure.
60% of the trackers on this site could be protecting you from NSA snooping. Tell to fix it.
All trackers
At least 5 third parties know you are on this webpage.
-Optimizely
-Google
-shaaaaaaaaaaaaa.com
-192.185.62.72
-www.googletagmanager.com -www.googletagmanager.com
Risk rating 10 red out of 10:
https://sitereport.netcraft.com/?url=http://192.185.62.72Outgoing link = -https://go.cpanel.net/privacy
See malware on IP:
https://www.virustotal.com/gui/ip-address/192.185.62.72/relationsThe Real McCoy with 100% content: -https://id.cpanel.net/get/login?url=aHR0cHM6Ly9zdG9yZS5jcGFuZWwubmV0L215Lw==
But with bootstrap vulners:
bootstrap 4.1.3 Found in -https://id.cpanel.net/static/bwr/bootstrap/dist/js/bootstrap.js _____Vulnerability info:
Medium 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331
polonus (volunteer 3rd party cold recon website-security analyst and website error-hunter)