Blacklist Checking: View Details What's This?
The URL, website or domain is marked as unsafe by Comodo analysts or by a trusted external source (such as Google Safe Browsing).
Phishing: View Details What's This?
Phishing is the act of attempting to obtain authentication information, credit card details or other personal account information via masquerading as a trustworthy entity (such as a bank). The URL or website is marked as containing phishing content by Comodo analysts or an trusted external source (such as Google Safe Browsing or PhishTank).
Malware Downloads: What's This?
The scanned URL is a direct link to a malware file or contains links to malware files. If these are executed by the user they may cause infection.
Drive-by-Downloads: What's This?
A drive-by download attack means the user may be infected just by visiting the malicious web page in a browser without any further user actions.
Worms: What's This?
A worm is a type of malware which replicates itself in order to spread to other computers. It usually attempts to spread via a network system and normally does not corrupt or modify files on an infected system.
Backdoors: What's This?
A backdoor is a type of malware which bypasses normal authentication and allows illegal access to a computer. It may be used to obtain personal information and to control the computer system remotely.
Trojans: What's This?
A trojan is a type of malware which poses as legitimate software but once installed performs malicious actions.
Suspicious Iframes: What's This?
Suspicious iframes are ifames on legitimate web servers which have been injected and contain links to malicious content (exploit packs, redirectors etc).
Heuristic Viruses: What's This?
A heuristic virus is a type of malware which may be detected by its behavior.
Suspicious Code: What's This?
Suspicious code detected. This may mean the scanned page has been compromised and contains suspicious code.
Suspicious Connections: What's This?
Active connections are automatically (iframes, java scripts) made to suspicious URL's of other websites.
Suspicious Activity: What's This?
Suspicious activity is detected during dynamic analysis of the URL. Actions which may identify attacks (large memory allocation, browser crashing, calling functions in an attempt to exploit vulnerabilities) are detected.