| XSS | SQLi | RCE | Attack Score ▼ | URL | Action |
|---|---|---|---|---|---|
| 51 | 79 | 96 | 29 | display url | Benign Malicious |
| 47 | 91 | 88 | 29 | display url | Benign Malicious |
| 96 | 36 | 94 | 29 | display url | Benign Malicious |
| 97 | 97 | 32 | 29 | display url | Benign Malicious |
| 52 | 88 | 86 | 29 | display url | Benign Malicious |
| 48 | 89 | 89 | 29 | display url | Benign Malicious |
| 85 | 45 | 95 | 29 | display url | Benign Malicious |
| 97 | 98 | 30 | 29 | display url | Benign Malicious |
| 86 | 43 | 97 | 29 | display url | Benign Malicious |
| 65 | 65 | 96 | 29 | display url | Benign Malicious |
| 84 | 44 | 97 | 29 | display url | Benign Malicious |
| 96 | 36 | 94 | 29 | display url | Benign Malicious |
| 59 | 69 | 98 | 29 | display url | Benign Malicious |
| 97 | 98 | 30 | 28 | display url | Benign Malicious |
| 98 | 98 | 29 | 28 | display url | Benign Malicious |
| 93 | 42 | 90 | 28 | display url | Benign Malicious |
| 93 | 34 | 98 | 28 | display url | Benign Malicious |
| 64 | 95 | 66 | 28 | display url | Benign Malicious |
| 71 | 58 | 96 | 28 | display url | Benign Malicious |
| 95 | 96 | 33 | 28 | display url | Benign Malicious |
| 93 | 37 | 96 | 28 | display url | Benign Malicious |
| 93 | 41 | 91 | 28 | display url | Benign Malicious |
| 93 | 54 | 78 | 28 | display url | Benign Malicious |
| 98 | 30 | 98 | 28 | display url | Benign Malicious |
| 61 | 72 | 92 | 28 | display url | Benign Malicious |
| 70 | 63 | 91 | 28 | display url | Benign Malicious |
| 91 | 37 | 97 | 28 | display url | Benign Malicious |
| 89 | 38 | 98 | 28 | display url | Benign Malicious |
| 97 | 30 | 98 | 28 | display url | Benign Malicious |
| 47 | 86 | 91 | 27 | display url | Benign Malicious |
| 98 | 96 | 29 | 27 | display url | Benign Malicious |
| 97 | 97 | 29 | 27 | display url | Benign Malicious |
| 83 | 47 | 94 | 27 | display url | Benign Malicious |
| 93 | 44 | 87 | 27 | display url | Benign Malicious |
| 59 | 70 | 95 | 27 | display url | Benign Malicious |
| 72 | 56 | 96 | 27 | display url | Benign Malicious |
| 98 | 96 | 30 | 27 | display url | Benign Malicious |
| 51 | 87 | 86 | 27 | display url | Benign Malicious |
| 58 | 91 | 74 | 27 | display url | Benign Malicious |
| 46 | 82 | 95 | 27 | display url | Benign Malicious |
| 88 | 40 | 96 | 27 | display url | Benign Malicious |
| 61 | 67 | 97 | 27 | display url | Benign Malicious |
| 75 | 53 | 96 | 27 | display url | Benign Malicious |
| 73 | 54 | 97 | 27 | display url | Benign Malicious |
| 97 | 98 | 29 | 27 | display url | Benign Malicious |
| 91 | 94 | 40 | 27 | display url | Benign Malicious |
| 95 | 29 | 98 | 26 | display url | Benign Malicious |
| 97 | 29 | 98 | 26 | display url | Benign Malicious |
| 97 | 96 | 31 | 26 | display url | Benign Malicious |
| 70 | 57 | 96 | 26 | display url | Benign Malicious |
| 96 | 33 | 94 | 26 | display url | Benign Malicious |
| 98 | 26 | 98 | 26 | display url | Benign Malicious |
| 89 | 88 | 46 | 26 | display url | Benign Malicious |
| 95 | 97 | 31 | 26 | display url | Benign Malicious |
| 62 | 68 | 94 | 26 | display url | Benign Malicious |
| 97 | 97 | 29 | 26 | display url | Benign Malicious |
| 94 | 97 | 31 | 25 | display url | Benign Malicious |
| 74 | 56 | 91 | 25 | display url | Benign Malicious |
| 98 | 26 | 98 | 25 | display url | Benign Malicious |
| 90 | 52 | 80 | 25 | display url | Benign Malicious |
| 48 | 94 | 81 | 25 | display url | Benign Malicious |
| 92 | 34 | 95 | 25 | display url | Benign Malicious |
| 90 | 53 | 80 | 25 | display url | Benign Malicious |
| 90 | 53 | 80 | 25 | display url | Benign Malicious |
| 91 | 33 | 98 | 25 | display url | Benign Malicious |
| 98 | 96 | 28 | 25 | display url | Benign Malicious |
| 98 | 98 | 25 | 25 | display url | Benign Malicious |
| 66 | 95 | 61 | 25 | display url | Benign Malicious |
| 90 | 53 | 80 | 25 | display url | Benign Malicious |
| 93 | 31 | 98 | 25 | display url | Benign Malicious |
| 98 | 96 | 28 | 25 | display url | Benign Malicious |
| 98 | 96 | 28 | 25 | display url | Benign Malicious |
| 63 | 65 | 95 | 25 | display url | Benign Malicious |
| 82 | 45 | 95 | 25 | display url | Benign Malicious |
| 72 | 57 | 93 | 25 | display url | Benign Malicious |
| 86 | 66 | 70 | 25 | display url | Benign Malicious |
| 98 | 26 | 97 | 24 | display url | Benign Malicious |
| 44 | 82 | 95 | 24 | display url | Benign Malicious |
| 98 | 98 | 25 | 24 | display url | Benign Malicious |
| 97 | 25 | 98 | 24 | display url | Benign Malicious |
| 34 | 89 | 98 | 24 | display url | Benign Malicious |
| 64 | 61 | 96 | 24 | display url | Benign Malicious |
| 51 | 75 | 95 | 24 | display url | Benign Malicious |
| 54 | 75 | 92 | 24 | display url | Benign Malicious |
| 34 | 91 | 96 | 24 | display url | Benign Malicious |
| 72 | 96 | 51 | 23 | display url | Benign Malicious |
| 98 | 25 | 97 | 23 | display url | Benign Malicious |
| 98 | 23 | 98 | 23 | display url | Benign Malicious |
| 98 | 23 | 98 | 23 | display url | Benign Malicious |
| 95 | 28 | 96 | 23 | display url | Benign Malicious |
| 91 | 32 | 97 | 23 | display url | Benign Malicious |
| 95 | 29 | 96 | 23 | display url | Benign Malicious |
| 98 | 97 | 25 | 23 | display url | Benign Malicious |
| 81 | 42 | 96 | 23 | display url | Benign Malicious |
| 41 | 95 | 84 | 23 | display url | Benign Malicious |
| 67 | 66 | 87 | 23 | display url | Benign Malicious |
| 97 | 98 | 25 | 23 | display url | Benign Malicious |
| 88 | 38 | 94 | 23 | display url | Benign Malicious |
| 80 | 48 | 92 | 23 | display url | Benign Malicious |
| 96 | 92 | 32 | 23 | display url | Benign Malicious |
| 86 | 38 | 96 | 23 | display url | Benign Malicious |
| 98 | 98 | 24 | 23 | display url | Benign Malicious |
| 78 | 50 | 92 | 23 | display url | Benign Malicious |
| 65 | 63 | 92 | 23 | display url | Benign Malicious |
| 81 | 47 | 91 | 23 | display url | Benign Malicious |
| 52 | 75 | 93 | 23 | display url | Benign Malicious |
| 80 | 51 | 89 | 23 | display url | Benign Malicious |
| 80 | 44 | 97 | 23 | display url | Benign Malicious |
| 46 | 80 | 94 | 23 | display url | Benign Malicious |
| 98 | 23 | 98 | 22 | display url | Benign Malicious |
| 98 | 23 | 98 | 22 | display url | Benign Malicious |
| 98 | 98 | 23 | 22 | display url | Benign Malicious |
| 98 | 24 | 97 | 22 | display url | Benign Malicious |
| 98 | 23 | 98 | 22 | display url | Benign Malicious |
| 84 | 46 | 89 | 22 | display url | Benign Malicious |
| 50 | 75 | 94 | 22 | display url | Benign Malicious |
| 97 | 98 | 25 | 22 | display url | Benign Malicious |
| 96 | 97 | 26 | 22 | display url | Benign Malicious |
| 98 | 22 | 98 | 22 | display url | Benign Malicious |
| 86 | 39 | 95 | 22 | display url | Benign Malicious |
| 98 | 98 | 23 | 22 | display url | Benign Malicious |
| 98 | 98 | 23 | 22 | display url | Benign Malicious |
| 96 | 27 | 95 | 21 | display url | Benign Malicious |
| 89 | 52 | 77 | 21 | display url | Benign Malicious |
| 98 | 24 | 96 | 21 | display url | Benign Malicious |
| 66 | 63 | 89 | 21 | display url | Benign Malicious |
| 44 | 80 | 94 | 21 | display url | Benign Malicious |
| 65 | 58 | 95 | 21 | display url | Benign Malicious |
| 77 | 46 | 94 | 21 | display url | Benign Malicious |
| 70 | 50 | 97 | 21 | display url | Benign Malicious |
| 46 | 84 | 89 | 21 | display url | Benign Malicious |
| 52 | 71 | 95 | 21 | display url | Benign Malicious |
| 50 | 72 | 96 | 21 | display url | Benign Malicious |
| 98 | 98 | 22 | 21 | display url | Benign Malicious |
| 45 | 79 | 94 | 21 | display url | Benign Malicious |
| 50 | 71 | 97 | 21 | display url | Benign Malicious |
| 44 | 79 | 95 | 21 | display url | Benign Malicious |
| 98 | 22 | 98 | 21 | display url | Benign Malicious |
| 98 | 21 | 98 | 21 | display url | Benign Malicious |
| 98 | 98 | 22 | 21 | display url | Benign Malicious |
| 58 | 61 | 97 | 20 | display url | Benign Malicious |
| 95 | 26 | 95 | 20 | display url | Benign Malicious |
| 94 | 25 | 98 | 20 | display url | Benign Malicious |
| 71 | 50 | 96 | 20 | display url | Benign Malicious |
| 63 | 58 | 95 | 20 | display url | Benign Malicious |
| 95 | 25 | 96 | 20 | display url | Benign Malicious |
| 45 | 76 | 95 | 20 | display url | Benign Malicious |
| 86 | 33 | 98 | 20 | display url | Benign Malicious |
| 95 | 26 | 96 | 20 | display url | Benign Malicious |
| 94 | 38 | 84 | 20 | display url | Benign Malicious |
| 98 | 98 | 21 | 20 | display url | Benign Malicious |
| 93 | 90 | 33 | 20 | display url | Benign Malicious |
| 88 | 32 | 97 | 20 | display url | Benign Malicious |
| 54 | 68 | 94 | 20 | display url | Benign Malicious |
| 92 | 97 | 28 | 20 | display url | Benign Malicious |
| 78 | 43 | 96 | 20 | display url | Benign Malicious |
| 89 | 34 | 94 | 20 | display url | Benign Malicious |
| 96 | 98 | 23 | 20 | display url | Benign Malicious |
| 56 | 63 | 97 | 19 | display url | Benign Malicious |
| 94 | 97 | 26 | 19 | display url | Benign Malicious |
| 97 | 22 | 97 | 19 | display url | Benign Malicious |
| 95 | 25 | 96 | 19 | display url | Benign Malicious |
| 51 | 69 | 96 | 19 | display url | Benign Malicious |
| 96 | 25 | 96 | 19 | display url | Benign Malicious |
| 97 | 98 | 21 | 19 | display url | Benign Malicious |
| 27 | 94 | 95 | 19 | display url | Benign Malicious |
| 93 | 25 | 98 | 19 | display url | Benign Malicious |
| 71 | 52 | 94 | 19 | display url | Benign Malicious |
| 98 | 98 | 20 | 18 | display url | Benign Malicious |
| 98 | 98 | 20 | 18 | display url | Benign Malicious |
| 98 | 20 | 97 | 18 | display url | Benign Malicious |
| 98 | 20 | 97 | 18 | display url | Benign Malicious |
| 96 | 25 | 95 | 18 | display url | Benign Malicious |
| 93 | 64 | 58 | 18 | display url | Benign Malicious |
| 95 | 24 | 96 | 18 | display url | Benign Malicious |
| 98 | 18 | 98 | 18 | display url | Benign Malicious |
| 33 | 84 | 98 | 18 | display url | Benign Malicious |
| 37 | 88 | 90 | 18 | display url | Benign Malicious |
| 93 | 27 | 96 | 18 | display url | Benign Malicious |
| 97 | 23 | 95 | 18 | display url | Benign Malicious |
| 98 | 98 | 19 | 18 | display url | Benign Malicious |
| 97 | 97 | 20 | 18 | display url | Benign Malicious |
| 70 | 51 | 94 | 18 | display url | Benign Malicious |
| 98 | 18 | 98 | 18 | display url | Benign Malicious |
| 98 | 98 | 17 | 17 | display url | Benign Malicious |
| 50 | 95 | 70 | 17 | display url | Benign Malicious |
| 98 | 17 | 98 | 17 | display url | Benign Malicious |
| 77 | 38 | 98 | 17 | display url | Benign Malicious |
| 98 | 20 | 97 | 17 | display url | Benign Malicious |
| 98 | 98 | 17 | 17 | display url | Benign Malicious |
| 98 | 98 | 17 | 17 | display url | Benign Malicious |
| 96 | 21 | 97 | 17 | display url | Benign Malicious |
| 74 | 49 | 92 | 17 | display url | Benign Malicious |
| 96 | 23 | 95 | 17 | display url | Benign Malicious |
| 93 | 45 | 76 | 17 | display url | Benign Malicious |
| 87 | 44 | 83 | 17 | display url | Benign Malicious |
| 69 | 47 | 98 | 17 | display url | Benign Malicious |
| 98 | 20 | 97 | 17 | display url | Benign Malicious |
| 93 | 44 | 78 | 17 | display url | Benign Malicious |
| 98 | 98 | 17 | 17 | display url | Benign Malicious |
| 54 | 61 | 98 | 17 | display url | Benign Malicious |
| 86 | 62 | 66 | 17 | display url | Benign Malicious |
| 98 | 98 | 18 | 17 | display url | Benign Malicious |
| 98 | 98 | 19 | 17 | display url | Benign Malicious |
| 96 | 20 | 98 | 17 | display url | Benign Malicious |
| 98 | 98 | 17 | 17 | display url | Benign Malicious |
| 48 | 73 | 93 | 17 | display url | Benign Malicious |
| 27 | 92 | 95 | 17 | display url | Benign Malicious |
| 25 | 89 | 98 | 16 | display url | Benign Malicious |
| 97 | 98 | 19 | 16 | display url | Benign Malicious |
| 94 | 37 | 82 | 16 | display url | Benign Malicious |
| 98 | 18 | 97 | 16 | display url | Benign Malicious |
| 98 | 18 | 97 | 16 | display url | Benign Malicious |
| 98 | 98 | 17 | 16 | display url | Benign Malicious |
| 93 | 44 | 76 | 16 | display url | Benign Malicious |
| 87 | 86 | 40 | 16 | display url | Benign Malicious |
| 98 | 98 | 17 | 16 | display url | Benign Malicious |
| 98 | 98 | 17 | 16 | display url | Benign Malicious |
| 91 | 31 | 90 | 16 | display url | Benign Malicious |
| 89 | 67 | 57 | 16 | display url | Benign Malicious |
| 86 | 85 | 42 | 16 | display url | Benign Malicious |
| 37 | 81 | 96 | 16 | display url | Benign Malicious |
| 50 | 66 | 97 | 15 | display url | Benign Malicious |
| 58 | 57 | 97 | 15 | display url | Benign Malicious |
| 98 | 16 | 98 | 15 | display url | Benign Malicious |
| 27 | 95 | 90 | 15 | display url | Benign Malicious |
| 96 | 22 | 95 | 15 | display url | Benign Malicious |
| 82 | 36 | 94 | 15 | display url | Benign Malicious |
| 98 | 18 | 96 | 15 | display url | Benign Malicious |
| 48 | 73 | 91 | 15 | display url | Benign Malicious |
| 34 | 84 | 94 | 15 | display url | Benign Malicious |
| 96 | 98 | 18 | 15 | display url | Benign Malicious |
| 61 | 60 | 92 | 15 | display url | Benign Malicious |
| 98 | 15 | 98 | 15 | display url | Benign Malicious |
| 89 | 25 | 98 | 15 | display url | Benign Malicious |
| 70 | 43 | 98 | 15 | display url | Benign Malicious |
| 97 | 17 | 98 | 15 | display url | Benign Malicious |
| 92 | 23 | 97 | 15 | display url | Benign Malicious |
| 98 | 16 | 98 | 15 | display url | Benign Malicious |
| 64 | 75 | 73 | 15 | display url | Benign Malicious |
| 74 | 39 | 97 | 14 | display url | Benign Malicious |
| 89 | 36 | 86 | 14 | display url | Benign Malicious |
| 93 | 51 | 66 | 14 | display url | Benign Malicious |
| 98 | 98 | 15 | 14 | display url | Benign Malicious |
| 94 | 21 | 96 | 14 | display url | Benign Malicious |
| 84 | 39 | 88 | 14 | display url | Benign Malicious |
| 95 | 22 | 94 | 14 | display url | Benign Malicious |
| 94 | 36 | 81 | 14 | display url | Benign Malicious |
| 87 | 26 | 97 | 14 | display url | Benign Malicious |
| 40 | 76 | 95 | 14 | display url | Benign Malicious |
| 73 | 41 | 97 | 14 | display url | Benign Malicious |
| 98 | 98 | 15 | 14 | display url | Benign Malicious |
| 73 | 43 | 96 | 14 | display url | Benign Malicious |
| 51 | 67 | 93 | 14 | display url | Benign Malicious |
| 56 | 62 | 93 | 14 | display url | Benign Malicious |
| 97 | 98 | 16 | 14 | display url | Benign Malicious |
| 96 | 18 | 96 | 14 | display url | Benign Malicious |
| 39 | 82 | 90 | 14 | display url | Benign Malicious |
| 97 | 19 | 95 | 14 | display url | Benign Malicious |
| 98 | 98 | 15 | 14 | display url | Benign Malicious |
| 68 | 47 | 96 | 14 | display url | Benign Malicious |
| 51 | 65 | 95 | 14 | display url | Benign Malicious |
| 98 | 14 | 98 | 14 | display url | Benign Malicious |
| 38 | 75 | 98 | 14 | display url | Benign Malicious |
| 77 | 37 | 96 | 13 | display url | Benign Malicious |
| 96 | 17 | 97 | 13 | display url | Benign Malicious |
| 63 | 56 | 92 | 13 | display url | Benign Malicious |
| 98 | 16 | 96 | 13 | display url | Benign Malicious |
| 95 | 60 | 55 | 13 | display url | Benign Malicious |
| 95 | 20 | 95 | 13 | display url | Benign Malicious |
| 42 | 78 | 89 | 13 | display url | Benign Malicious |
| 56 | 94 | 60 | 13 | display url | Benign Malicious |
| 51 | 62 | 97 | 13 | display url | Benign Malicious |
| 41 | 77 | 92 | 13 | display url | Benign Malicious |
| 95 | 98 | 17 | 13 | display url | Benign Malicious |
| 98 | 13 | 98 | 13 | display url | Benign Malicious |
| 91 | 26 | 92 | 12 | display url | Benign Malicious |
| 92 | 37 | 81 | 12 | display url | Benign Malicious |
| 92 | 36 | 81 | 12 | display url | Benign Malicious |
| 91 | 33 | 84 | 12 | display url | Benign Malicious |
| 95 | 31 | 83 | 12 | display url | Benign Malicious |
| 20 | 93 | 95 | 12 | display url | Benign Malicious |
| 85 | 27 | 97 | 12 | display url | Benign Malicious |
| 90 | 22 | 96 | 12 | display url | Benign Malicious |
| 37 | 74 | 97 | 12 | display url | Benign Malicious |
| 90 | 21 | 98 | 12 | display url | Benign Malicious |
| 84 | 27 | 97 | 12 | display url | Benign Malicious |
| 56 | 79 | 74 | 12 | display url | Benign Malicious |
| 98 | 98 | 13 | 12 | display url | Benign Malicious |
| 97 | 14 | 97 | 12 | display url | Benign Malicious |
| 45 | 67 | 97 | 12 | display url | Benign Malicious |
| 87 | 34 | 87 | 12 | display url | Benign Malicious |
| 64 | 78 | 66 | 12 | display url | Benign Malicious |
| 98 | 98 | 12 | 11 | display url | Benign Malicious |
| 78 | 32 | 98 | 11 | display url | Benign Malicious |
| 96 | 15 | 97 | 11 | display url | Benign Malicious |
| 52 | 58 | 97 | 11 | display url | Benign Malicious |
| 86 | 26 | 96 | 11 | display url | Benign Malicious |
| 98 | 12 | 98 | 11 | display url | Benign Malicious |
| 23 | 88 | 96 | 11 | display url | Benign Malicious |
| 97 | 97 | 14 | 11 | display url | Benign Malicious |
| 89 | 22 | 97 | 11 | display url | Benign Malicious |
| 98 | 98 | 12 | 11 | display url | Benign Malicious |
| 98 | 11 | 98 | 11 | display url | Benign Malicious |
| 22 | 90 | 96 | 11 | display url | Benign Malicious |
| 54 | 77 | 77 | 11 | display url | Benign Malicious |
| 81 | 33 | 94 | 11 | display url | Benign Malicious |
| 42 | 70 | 95 | 11 | display url | Benign Malicious |
| 90 | 27 | 90 | 11 | display url | Benign Malicious |
| 31 | 87 | 91 | 11 | display url | Benign Malicious |
| 43 | 68 | 96 | 11 | display url | Benign Malicious |
| 52 | 59 | 97 | 11 | display url | Benign Malicious |
| 91 | 22 | 95 | 11 | display url | Benign Malicious |
| 41 | 73 | 93 | 11 | display url | Benign Malicious |
| 83 | 34 | 91 | 11 | display url | Benign Malicious |
| 79 | 36 | 93 | 11 | display url | Benign Malicious |
| 53 | 64 | 91 | 11 | display url | Benign Malicious |
| 92 | 71 | 45 | 11 | display url | Benign Malicious |
| 98 | 10 | 98 | 10 | display url | Benign Malicious |
| 95 | 15 | 98 | 10 | display url | Benign Malicious |
| 39 | 85 | 84 | 10 | display url | Benign Malicious |
| 56 | 56 | 94 | 10 | display url | Benign Malicious |
| 84 | 28 | 96 | 10 | display url | Benign Malicious |
| 54 | 55 | 98 | 10 | display url | Benign Malicious |
| 50 | 66 | 91 | 10 | display url | Benign Malicious |
| 84 | 31 | 92 | 10 | display url | Benign Malicious |
| 79 | 33 | 94 | 10 | display url | Benign Malicious |
| 30 | 84 | 94 | 10 | display url | Benign Malicious |
| 87 | 67 | 53 | 10 | display url | Benign Malicious |
| 95 | 96 | 17 | 10 | display url | Benign Malicious |
| 90 | 20 | 97 | 10 | display url | Benign Malicious |
| 57 | 73 | 77 | 10 | display url | Benign Malicious |
| 98 | 98 | 9 | 9 | display url | Benign Malicious |
| 98 | 98 | 11 | 9 | display url | Benign Malicious |
| 28 | 80 | 98 | 9 | display url | Benign Malicious |
| 89 | 38 | 79 | 9 | display url | Benign Malicious |
| 97 | 12 | 97 | 9 | display url | Benign Malicious |
| 97 | 98 | 11 | 9 | display url | Benign Malicious |
| 38 | 77 | 92 | 9 | display url | Benign Malicious |
| 78 | 66 | 61 | 9 | display url | Benign Malicious |
| 86 | 23 | 97 | 9 | display url | Benign Malicious |
| 93 | 16 | 97 | 9 | display url | Benign Malicious |
| 35 | 74 | 98 | 9 | display url | Benign Malicious |
| 33 | 76 | 98 | 9 | display url | Benign Malicious |
| 85 | 24 | 97 | 9 | display url | Benign Malicious |
| 38 | 70 | 98 | 9 | display url | Benign Malicious |
| 87 | 32 | 87 | 9 | display url | Benign Malicious |
| 74 | 72 | 61 | 9 | display url | Benign Malicious |
| 72 | 37 | 97 | 9 | display url | Benign Malicious |
| 92 | 23 | 91 | 9 | display url | Benign Malicious |
| 97 | 97 | 11 | 9 | display url | Benign Malicious |
| 98 | 9 | 98 | 9 | display url | Benign Malicious |
| 98 | 98 | 8 | 8 | display url | Benign Malicious |
| 69 | 40 | 97 | 8 | display url | Benign Malicious |
| 93 | 35 | 77 | 8 | display url | Benign Malicious |
| 94 | 13 | 98 | 8 | display url | Benign Malicious |
| 88 | 24 | 93 | 8 | display url | Benign Malicious |
| 97 | 13 | 95 | 8 | display url | Benign Malicious |
| 98 | 10 | 97 | 8 | display url | Benign Malicious |
| 31 | 77 | 97 | 8 | display url | Benign Malicious |
| 72 | 48 | 84 | 8 | display url | Benign Malicious |
| 32 | 76 | 97 | 8 | display url | Benign Malicious |
| 30 | 88 | 87 | 8 | display url | Benign Malicious |
| 50 | 60 | 95 | 8 | display url | Benign Malicious |
| 95 | 13 | 97 | 8 | display url | Benign Malicious |
| 98 | 10 | 97 | 8 | display url | Benign Malicious |
| 38 | 79 | 89 | 8 | display url | Benign Malicious |
| 50 | 63 | 93 | 8 | display url | Benign Malicious |
| 76 | 58 | 72 | 8 | display url | Benign Malicious |
| 96 | 11 | 98 | 8 | display url | Benign Malicious |
| 50 | 61 | 94 | 8 | display url | Benign Malicious |
| 93 | 15 | 98 | 8 | display url | Benign Malicious |
| 55 | 53 | 97 | 8 | display url | Benign Malicious |
| 98 | 9 | 98 | 8 | display url | Benign Malicious |
| 98 | 98 | 9 | 7 | display url | Benign Malicious |
| 96 | 12 | 97 | 7 | display url | Benign Malicious |
| 98 | 13 | 94 | 7 | display url | Benign Malicious |
| 95 | 12 | 97 | 7 | display url | Benign Malicious |
| 98 | 98 | 8 | 7 | display url | Benign Malicious |
| 97 | 97 | 10 | 7 | display url | Benign Malicious |
| 96 | 16 | 92 | 7 | display url | Benign Malicious |
| 98 | 97 | 9 | 7 | display url | Benign Malicious |
| 19 | 88 | 97 | 7 | display url | Benign Malicious |
| 46 | 63 | 95 | 7 | display url | Benign Malicious |
| 78 | 30 | 97 | 7 | display url | Benign Malicious |
| 74 | 33 | 97 | 7 | display url | Benign Malicious |
| 98 | 8 | 98 | 7 | display url | Benign Malicious |
| 94 | 17 | 93 | 7 | display url | Benign Malicious |
| 25 | 85 | 94 | 7 | display url | Benign Malicious |
| 19 | 88 | 97 | 7 | display url | Benign Malicious |
| 18 | 88 | 97 | 7 | display url | Benign Malicious |
| 63 | 84 | 56 | 7 | display url | Benign Malicious |
| 97 | 10 | 96 | 6 | display url | Benign Malicious |
| 34 | 80 | 89 | 6 | display url | Benign Malicious |
| 97 | 98 | 7 | 6 | display url | Benign Malicious |
| 90 | 18 | 95 | 6 | display url | Benign Malicious |
| 93 | 17 | 94 | 6 | display url | Benign Malicious |
| 61 | 53 | 89 | 6 | display url | Benign Malicious |
| 98 | 98 | 8 | 6 | display url | Benign Malicious |
| 98 | 98 | 6 | 6 | display url | Benign Malicious |
| 70 | 36 | 97 | 6 | display url | Benign Malicious |
| 98 | 98 | 6 | 6 | display url | Benign Malicious |
| 93 | 18 | 93 | 6 | display url | Benign Malicious |
| 14 | 96 | 92 | 6 | display url | Benign Malicious |
| 26 | 95 | 83 | 6 | display url | Benign Malicious |
| 23 | 82 | 97 | 5 | display url | Benign Malicious |
| 71 | 42 | 90 | 5 | display url | Benign Malicious |
| 98 | 6 | 98 | 5 | display url | Benign Malicious |
| 30 | 74 | 97 | 5 | display url | Benign Malicious |
| 98 | 5 | 98 | 5 | display url | Benign Malicious |
| 92 | 15 | 96 | 5 | display url | Benign Malicious |
| 98 | 5 | 97 | 4 | display url | Benign Malicious |
| 24 | 95 | 82 | 4 | display url | Benign Malicious |
| 98 | 7 | 97 | 4 | display url | Benign Malicious |
| 73 | 89 | 38 | 4 | display url | Benign Malicious |
| 98 | 98 | 5 | 4 | display url | Benign Malicious |
| 98 | 5 | 98 | 4 | display url | Benign Malicious |
| 98 | 5 | 98 | 4 | display url | Benign Malicious |
| 97 | 98 | 5 | 4 | display url | Benign Malicious |
| 98 | 4 | 98 | 4 | display url | Benign Malicious |
| 14 | 91 | 96 | 4 | display url | Benign Malicious |
| 98 | 98 | 5 | 4 | display url | Benign Malicious |
| 98 | 98 | 3 | 3 | display url | Benign Malicious |
| 27 | 97 | 76 | 3 | display url | Benign Malicious |
| 98 | 98 | 4 | 3 | display url | Benign Malicious |
| 26 | 94 | 79 | 3 | display url | Benign Malicious |
| 37 | 67 | 96 | 3 | display url | Benign Malicious |
| 11 | 91 | 98 | 3 | display url | Benign Malicious |
| 98 | 98 | 4 | 3 | display url | Benign Malicious |
| 97 | 98 | 5 | 3 | display url | Benign Malicious |
| 98 | 5 | 97 | 3 | display url | Benign Malicious |
| 6 | 97 | 97 | 3 | display url | Benign Malicious |
| 98 | 98 | 3 | 3 | display url | Benign Malicious |
| 98 | 98 | 3 | 2 | display url | Benign Malicious |
| 98 | 3 | 98 | 2 | display url | Benign Malicious |
| 10 | 95 | 94 | 2 | display url | Benign Malicious |
| 96 | 98 | 5 | 2 | display url | Benign Malicious |
| 97 | 98 | 3 | 2 | display url | Benign Malicious |
| 9 | 93 | 98 | 2 | display url | Benign Malicious |
| 97 | 98 | 3 | 2 | display url | Benign Malicious |
| 98 | 98 | 2 | 2 | display url | Benign Malicious |
| 22 | 81 | 96 | 2 | display url | Benign Malicious |
| 97 | 98 | 4 | 2 | display url | Benign Malicious |
| 98 | 98 | 2 | 2 | display url | Benign Malicious |
| 20 | 85 | 94 | 2 | display url | Benign Malicious |
| 98 | 98 | 3 | 2 | display url | Benign Malicious |
| 98 | 98 | 1 | 1 | display url | Benign Malicious |
| 17 | 95 | 86 | 1 | display url | Benign Malicious |
| 97 | 98 | 2 | 1 | display url | Benign Malicious |
| 98 | 98 | 2 | 1 | display url | Benign Malicious |
| 98 | 98 | 2 | 1 | display url | Benign Malicious |
| 98 | 98 | 2 | 1 | display url | Benign Malicious |
| 98 | 98 | 2 | 1 | display url | Benign Malicious |
| 14 | 95 | 88 | 1 | display url | Benign Malicious |
| 98 | 98 | 1 | 1 | display url | Benign Malicious |
| 98 | 98 | 1 | 1 | display url | Benign Malicious |
| 14 | 93 | 90 | 1 | display url | Benign Malicious |
| 77 | 97 | 24 | 1 | display url | Benign Malicious |
| 10 | 94 | 94 | 1 | display url | Benign Malicious |
| 58 | 97 | 42 | 1 | display url | Benign Malicious |
| 88 | 97 | 12 | 1 | display url | Benign Malicious |
| 98 | 98 | 2 | 1 | display url | Benign Malicious |
| 97 | 98 | 2 | 1 | display url | Benign Malicious |
| 19 | 95 | 84 | 1 | display url | Benign Malicious |
| 98 | 98 | 1 | 1 | display url | Benign Malicious |
| 91 | 98 | 10 | 1 | display url | Benign Malicious |
| 82 | 96 | 21 | 1 | display url | Benign Malicious |