Malicious sites

Malicious sites are those that Google Chrome does not recommend visiting and blocks the transition when trying, with a notification.
Besides, Serpstat cooperates with the German Institute of Information Security which monitors sites that have been involved in violations of the law.
The report is presented in the form of a spreadsheet. It contains malicious donors and acceptors.

The Malicious sites report table contains:
Donor URL — the address of the domain or page that links;
Active backlinks — the number of links from the donor specified in the Donor URL column that lead to the analyzed site;
Platform — type of platform / operating system for which this vulnerability is relevant;
Vulnerability type — type of detected vulnerability;
Last Checked — The date when the vulnerability for the specified domain was last checked and confirmed.

The header of the table contains the switches Malicious domains/donor pages and Malicious domains/acceptor pages.
The Malicious donor domains mode is enabled by default. When switching, the corresponding information will be displayed in the table.

Also in the Malicious sites report you can:

  1. Copy the data to the clipboard.
  2. Set up the report display convenient for you  — you can select the columns you need to display in the report.
  3. Filter the report.
  4. Export in the required format.
    Report export

    To export to Google (Sheets, BQ), connect your Google account to Serpstat. Then, exports will be done only to the connected account. You can change the account for export by changing the account email in Settings or disabling access directly through Google Settings.

  5. Serpstat Recrawling URL Tool — tool for updating or adding information about page links by Serpstat bots. If you want to recrawl the URLs, just press the button in the upper right corner to start scanning and specify the pages of sites to crawl. The link data will be verified within 1 day.
    The number of pages to check is 500 URLs per day. The remaining credits are not summed up, but expire.
  6. Send feedback — opens the support chat for sending suggestions for improving or reporting an issue.
  7. Tutorial — the button will direct you to the tutorial for the report.
  8. Apply quick filters and sorting.

Filters settings

When using "and", the result will display domains that match the conditions of all filters, and when using "or", the result will display domains that meet the condition of at least one of the filters.
"Donor’s/Acceptor’s URL – filters out malicious donors/acceptors by name or part of a domain name.
Filter conditions:

  • "Contains all" –  displays all domains whose name contains the value entered in the filter.
  • "Does not contain all" – displays all domains, except for those whose name contains the value entered in the filter.
  • "Begins with" – displays all domains whose name begins with the value added to the filter.
  • "Ends with” – displays all domains whose name ends with the value added to the filter.
  • "Equal” – displays domains whose name is specified in the filter.
  • "Not equal” – displays all domains, except for those whose name is specified in the filter.

"Active links" – filters out malicious donors/acceptors by the number of links from/to domain.
Filter conditions:

  • "Equal" – result is equal to the specified number.
  • "Between" – result is in the range between "from" and "to" the specified numbers.
  • "Not equal" – result is not equal to the specified number.
  • "Greater than" – result is greater than the specified number.
  • "Greater than or equal" – result is greater than or equal to the specified number.
  • "Lower than" – result is lower than the specified number.
  • "Lower than or equal" – result is less than or equal to the specified number.

“Platform” – filters out malicious donors/acceptors by operating systems for which the site poses a threat.
Filter conditions:

  • "Contain all" – displays all domains that pose a threat to the operating systems selected in the filter.
  • "Does not contain all" – displays all domains, except for those that pose a threat to the operating systems selected in the filter.

"Vulnerability type” – filters out malicious donors/acceptors by types of vulnerabilities that the user may be exposed to when switching to them.
Filter conditions:

  • "Contains all" – displays all domains with the vulnerabilities selected in the filter.
  • "Does not contain all" – displays all domains with vulnerabilities, except those selected in the filter.

"Update date" – filters out malicious donors/acceptors by the date the information was updated in the service.
Filter conditions:

  • "Today" – displays all domains for which information was updated today.
  • "Yesterday" – displays all domains for which information was updated yesterday.
  • "Last 7 days" – displays all domains for which information has been updated within the last 7 days.
  • "Last 30 days” – displays all domains for which information has been updated within the last 30 days.
  • "Last 365 days” – displays all domains for which information has been updated within the last 365 days.
  • "Select period” displays all domains for which information has been updated during the period selected in the filter.

Share this article with your friends

Are you sure?

Introducing Serpstat

Find out about the main features of the service in a convenient way for you!

Please send a request, and our specialist will offer you education options: a personal demonstration, a trial period, or materials for self-study and increasing expertise — everything for a comfortable start to work with Serpstat.

Name

Email

Phone

We are glad of your comment
I agree to Serpstat`s Privacy Policy.

Thank you, we have saved your new mailing settings.

Open support chat