Phishing is the act of attempting to obtain authentication information, credit card details or other personal account information via masquerading as a trustworthy entity (such as a bank).
The URL or website is marked as containing phishing content by Comodo analysts or an trusted external source (such as Google Safe Browsing
The scanned URL is a direct link to a malware file or contains links to malware files. If these are executed by the user they may cause infection.
A drive-by download attack means the user may be infected just by visiting the malicious web page in a browser without any further user actions.
A worm is a type of malware which replicates itself in order to spread to other computers. It usually attempts to spread via a network system and normally does not corrupt or modify files on an infected system.
A backdoor is a type of malware which bypasses normal authentication and allows illegal access to a computer. It may be used to obtain personal information and to control the computer system remotely.
A trojan is a type of malware which poses as legitimate software but once installed performs malicious actions.
Suspicious iframes are ifames on legitimate web servers which have been injected and contain links to malicious content (exploit packs, redirectors etc).
A heuristic virus is a type of malware which may be detected by its behavior.
Suspicious code detected. This may mean the scanned page has been compromised and contains suspicious code.
Active connections are automatically (iframes, java scripts) made to suspicious URL's of other websites.
Suspicious activity is detected during dynamic analysis of the URL. Actions which may identify attacks (large memory allocation, browser crashing, calling functions in an attempt to exploit vulnerabilities) are detected.
Show Whois information