Investigator Use
Sucuri SiteCheck (sitecheck.sucuri.net) is a free online website security scanner that performs external blacklist checks, malware detection, website integrity analysis, and basic security configuration assessment for any publicly accessible URL. It checks target websites against multiple malware and blacklist databases while also scanning for known indicators of compromise in the site's external-facing content.
For OSINT investigators working web application security cases, phishing investigations, or brand protection work, SiteCheck provides quick intelligence about whether a target website is currently flagged as malicious by security vendors, has known malware injections in its source code, or appears on domain blacklists used by browsers and email security systems.
Blacklist status checking is particularly relevant for phishing investigation workflows. When investigating a suspicious URL found in a phishing email or social media post, SiteCheck rapidly determines whether the domain is already known to major security services — Google Safe Browsing, McAfee SiteAdvisor, Norton SafeWeb, and others — providing immediate context about whether the threat is known or novel.
The external malware scan checks the loaded resources, JavaScript files, and page content for known malware signatures, drive-by download scripts, and injected redirect code. Compromised legitimate websites that are being used as phishing hosts or malware distributors frequently show malware injection indicators that SiteCheck surfaces.
SiteCheck also reports on the website's CMS version (WordPress, Joomla, Drupal), outdated plugins, and server software — information useful for both security assessments and for building a technical profile of a target site.
Limitations: SiteCheck performs external scanning only — it analyzes what the server serves to a browser without authenticated access to the site's backend. Sophisticated malware may only activate for specific user agents, geolocations, or after specific interaction, evading external scanners. Server-side code, database contents, and authenticated areas are not assessed.
Record the URL scanned, scan timestamp, blacklist status results, and any malware indicators found in investigation notes.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
CVE
Cyber Threat OSINT
CVE provides standardized vulnerability identifiers and references used in security research, triage, and threat intelligence workflows.
CVE Details
Cyber Threat OSINT
CVE Details aggregates vulnerability records, CVSS scores, and affected software lists for security analysis and patch prioritization.
Default Passwords
Cyber Threat OSINT
Find default passwords and credentials for routers, printers, servers, and network devices for authorized security auditing.
Exploit DB
Cyber Threat OSINT
The Exploit Database archives public exploits and proof-of-concept code for known vulnerabilities, used in penetration testing and research.
Honey DB
Cyber Threat OSINT
HoneyDB aggregates honeypot sensor data to identify malicious IP addresses, attacker tactics, and emerging threat patterns.
Hybrid analysis
Cyber Threat OSINT
Hybrid Analysis provides free malware sandboxing with Falcon Sandbox technology to analyze suspicious files and URLs for threat intelligence.