WebCookies logo Web Cookies Scanner

All-in-one free web application security tool. Web application vulnerability and privacy scanner with support for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, Supercookies, Evercookies. Includes a free SSL/TLS, HTML and HTTP vulnerability scanner and URL malware scanner.

🍪 WebCookies sets a few strictly technical cookies and logs very little data

 Privacy policy
  • Home
  • Cookies
    • Number of cookies
    • Cookie names
    • Cookie domains
    • 3rd party domains
    • 3rd party cookies
    • Persistent cookies
  • Web intelligence
    • HTTP security
    • HTTP headers
    • Ruby CookieStore
    • BigIP cookies
    • Web plugins
    • Ads publisher ids
    • Ads.txt
  • Threat intelligence
    • Reputation alerts
    • Blacklisted pages
    • Suspicious patterns
    • Suspicious by rule
  • Do-Not-Track (DNT)
  • Contact

Websites with suspicious code patterns

Websites where we have detected JavaScript obfuscation, exploits, shellcode, invasive forms of user tracking and other suspicious code patterns. This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using the Yara standard).

  • GIF_1x1
    Type: User tracking and fingerprinting
    221696
  • generic_javascript_obfuscation5
    Type: Suspicious
    65891
  • PNG_1x1
    Type: User tracking and fingerprinting
    17783
  • generic_javascript_obfuscation4
    Type: Suspicious
    11353
  • Beacon_API
    Type: User tracking and fingerprinting
    10148
  • generic_javascript_obfuscation
    Type: Suspicious
    9243
  • generic_javascript_obfuscation2
    Type: Suspicious
    3996
  • Canvas_fingerprint
    Type: User tracking and fingerprinting
    3051
  • Session_replay
    Type: User tracking and fingerprinting
    2476
  • Google_cookie_matching
    Type: User tracking and fingerprinting
    2312
  • PossibleShellcodePattern
    Type: Suspicious
    1268
  • NavigatorPlugins
    Type: User tracking and fingerprinting
    1248
  • Battery_API
    Type: User tracking and fingerprinting
    756
  • Font_finterprint
    Type: User tracking and fingerprinting
    621
  • WebGL_fingerprint
    Type: User tracking and fingerprinting
    469
  • function_through_object
    Type: Suspicious
    448
  • JavaScript_obfuscation
    Type: Suspicious
    366
  • Audio_fingerprint3
    Type: User tracking and fingerprinting
    215
  • Hidden_iframe
    Type: Suspicious
    209
  • WebRTC_LAN_IP
    Type: User tracking and fingerprinting
    192
  • Doxing
    Type: Suspicious
    134
  • Generic_JavaScript_XOR_encryption
    Type: Suspicious
    102
  • Fingerprint2_library
    Type: User tracking and fingerprinting
    89
  • AWS_api
    Type: Suspicious
    83
  • Tor_address
    Type: Suspicious
    70
  • MWScan_compromise_indicator
    Type: Suspicious
    56
  • evil_eval
    Type: Suspicious
    47
  • Zcash_address
    Type: Web feature
    47
  • Twitter_api
    Type: Suspicious
    44
  • Real_Time_Bid_unencrypted_price
    Type: User tracking and fingerprinting
    41
  • Private_key
    Type: Suspicious
    39
  • Bitcoin_miner
    Type: Suspicious
    37
  • JSEncrypt
    Type: Suspicious
    37
  • JS_encryption
    Type: Suspicious
    32
  • Devtools_detection
    Type: Suspicious
    29
  • IPFS_CIDv1
    Type: Web feature
    29
  • defacement
    Type: Indicator of compromise
    25
  • PossibleExecutable
    Type: Suspicious
    24
  • obfuscated_eval
    Type: Suspicious
    22
  • ERC20_ETH
    Type: Web feature
    22
  • powershell
    Type: Suspicious
    22
  • misc_shells
    Type: Indicator of compromise
    20
  • Ethereum_DAI
    Type: Web feature
    18
  • ERC20_BAT
    Type: Web feature
    16
  • ERC20_USDT
    Type: Web feature
    15
  • ERC20_OMG
    Type: Web feature
    14
  • JavaScript_obfuscation3
    Type: Suspicious
    14
  • Ethereum_web3
    Type: Web feature
    13
  • ERC20_DAI
    Type: Web feature
    12
  • Password_manager_tracking
    Type: User tracking and fingerprinting
    12
  • ShellcodePattern
    Type: Suspicious
    10
  • maldoc_indirect_function_call_3
    Type: Suspicious
    9
  • ERC20_USDC
    Type: Web feature
    6
  • ERC20_ZRX
    Type: Web feature
    6
  • Audio_fingerprint
    Type: User tracking and fingerprinting
    6
  • ERC20_MANA
    Type: Web feature
    5
  • ERC20_SNT
    Type: Web feature
    5
  • invalid_trailer_structure
    Type: Suspicious
    5
  • XSS_polyglot
    Type: Suspicious
    4
  • possible_exploit
    Type: Suspicious
    4
  • ERC20_ENJ
    Type: Web feature
    4
  • GibberishAES_encryptor
    Type: Suspicious
    4
  • php_malfunctions
    Type: Suspicious
    4
  • ERC20_LINK
    Type: Web feature
    4
  • ERC20_HOT
    Type: Web feature
    3
  • ERC20_MATIC
    Type: Web feature
    3
  • ERC20_NEXO
    Type: Web feature
    3
  • IPFS_CIDv0
    Type: Web feature
    3
  • ERC20_PAX
    Type: Web feature
    3
  • maldoc_find_kernel32_base_method_1
    Type: Suspicious
    3
  • ERC20_BNT
    Type: Web feature
    3
  • JS_Encoded_CC_Hijack
    Type: Suspicious
    3
  • ERC20_LOOM
    Type: Web feature
    3
  • Audio_fingerprint2
    Type: User tracking and fingerprinting
    3
  • ERC20_MCO
    Type: Web feature
    2
  • JScrambler
    Type: Suspicious
    2
  • hex_script
    Type: Suspicious
    2
  • ERC20_OCEAN
    Type: Web feature
    2
  • ERC20_ELF
    Type: Web feature
    2
  • ERC20_GUSD
    Type: Web feature
    2
  • ERC20_TUSD
    Type: Web feature
    2
  • web_shell_crews
    Type: Indicator of compromise
    2
  • MSIEUseAfterFreePeersDll
    Type: Malware/exploit
    2
  • shell_names
    Type: Indicator of compromise
    2
  • ERC20_BNB
    Type: Web feature
    2
  • Slack_api
    Type: Suspicious
    1
  • ERC20_OGN
    Type: Web feature
    1
  • Ethereum_scam_2124
    Type: Malware/exploit
    1
  • Generic_AES_encryptor
    Type: Suspicious
    1
  • ERC20_ETHOS
    Type: Web feature
    1
  • Ethereum_scam_2610
    Type: Malware/exploit
    1
  • Heroku_api
    Type: Suspicious
    1
  • ERC20_SXP
    Type: Web feature
    1
  • PDFobfuscation
    Type: Suspicious
    1
  • maldoc_indirect_function_call_2
    Type: Suspicious
    1
  • generic_javascript_obfuscation3
    Type: Suspicious
    1

Copyright © Syrenis Ltd 2020. All rights reserved.