Threat Database Rogue Websites

Threat Scorecard

Ranking: 4,374
Threat Level: 50 % (Medium)
Infected Computers: 211
First Seen: March 30, 2023
Last Seen: January 7, 2024
OS(es) Affected: Windows

Upon examination of, it has been discovered that the website is a fraudulent search engine that displays results obtained from other search engines. It is important to note that bogus search engines are typically promoted through browser hijackers that alter the settings of web browsers without the user's permission. is found to be yet another version of Consequently, it is strongly advised not to trust or rely on its search results.

The Results Presented by Dubious Search Engines could be Unreliable is known to redirect users to multiple web addresses, including,, and, among others, through the use of and This fake search engine presents search results from both legitimate and dubious search engines. Furthermore, may have been designed with the intention of deceiving users into clicking on ads or downloading potentially harmful software.

Moreover, fake search engines, like, can pose a significant risk to user privacy and security. Such fraudulent search engines have a tendency to collect sensitive user information, such as IP addresses, search queries, and browsing history. Cybercriminals can exploit this information for targeted advertising, identity theft, or other malicious activities, which can potentially compromise user safety and privacy.

In addition, shady search engines like can harm the overall user experience by displaying irrelevant or low-quality search results, which can be frustrating for users who are trying to find information. As a result, it is strongly recommended to use well-known and trusted search engines.

Fake Search Engines are Mostly Promoted via Intrusive Browser Hijackers and PUPs

Browser hijackers and Potentially Unwanted Programs (PUPs) are types of dubious apps that can cause a range of problems for users. They are designed to alter the behavior of web browsers, typically by redirecting users to unwanted websites or displaying intrusive advertisements.

One common method used by these types of programs is to modify browser settings such as the homepage, search engine, or new tab page, without the user's consent. They can also install browser extensions or toolbars that may collect personal information, track browsing behavior, or display unwanted ads.

Additionally, browser hijackers and PUPs may inject pop-up ads or banners into web pages, regardless of whether they are related to the content of the site or not. This can be frustrating for users, as it can interfere with their browsing experience and make it difficult to access the information they are looking for.

URLs may call the following URLs:


Most Viewed