![]() |
Malware detected
Google penalized my site and turned off traffic because they say that next line of code is suspicious and it is serving malware:
<!-- Generated by OpenX 2.8.8 --> <script type='text/javascript' src='http://femdomclicks.info/advertisers/www/delivery/spcjs.php?id=45'></script> Hosting provider scanned domain and didn't found anything. This is normal line of code from Open x that is there for years. I've manually checked advertisers links and there is no any kind of threat or suspicious sites. Once I removed that line of code, google resumed sending traffic without explanation where is malware ,actually. Any advice how to solve this mess?:error |
Because its OpenX.
That script is full of holes, and Google wont like it. Gotta do Server Side Scripting if you want to use it |
or perhaps it was voluum? The big tracker had a huge issue where it was being labeled as malware on all major security programs..........they tried to keep it low key but it killed campaigns all over the place. Why use a cNAME in the first place? I can't believe no one has mentioned it here yet?
|
|
Code:
Malicious files: 3 |
|
What this means? I've tested another domain that was just crawled by google. Google didn't report any malware, but this site did.
|
the problem is https://www.google.com/?gws_rd=ssl#q=bisexfemdom.info
|
so, clearly the problem is not the OpenX than your domain Screenshot by Lightshot (or WP install on it that probably got hacked...)
|
All times are GMT -7. The time now is 07:26 PM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123