Skip to top of page

Is my website black-listed from Google? Tools to Find Out

Just input your domain in the form beliw to see if it has been black-listed from Google.

If it is, see the bottom of this page for information on how to remove your website from the Google black-list.

Check domain: http://
  (eg. www.digitalworkhorse.com)

Remove you website from the Google Black List.

Below is an interesting breakdown of what should be done in response to various hacking scenarios:

Apparently, you can easily report any website for Phishing at the below link, but it is not as easy to get off the list.

http://antiphishing.org

Steps:

1. A third party notifies either the web site operator or domain owner that its

web site is compromised. Together, the parties attempt to verify third party’s

authenticity while they investigate the claim.

Alternatively, the web site owner or operator may suspect or discover the

web site phishing attack through self‐examination or web site intrusion

monitoring. In this case, the owner or operator initiate whatever containment

actions they determine to be appropriate and proceed to step (3). (See the

section entitled Containment for additional information.)

2. The web site owner reports the incident. The APWG strongly encourages

web site owners to report the phishing URL to the APWG via email at

reportphishing@antiphishing.org. (See the section entitled Reporting for

additional information.)

3. If both the third party and the claim are legitimate, the web site owner

authorizes containment and the web site operator initiates whatever containment actions

the parties have determined to be appropriate. (See the

section entitled Containment for additional information.)

4. The web site owner and operator initiate recovery actions. Here, both parties

assess the damage to identify what data and services must be recovered. The

timeline assists parties in determining whether data recovery is required and

whether there is any accurate data available for recovery. (See the section

entitled Recovery for additional information.)

5. The web site owner and operator initiate restoration actions. Here, efforts

focus on returning the web site to full, uncompromised, “normal” activity.

(See the section entitled Restoration for additional information.)

6. The web site owner and operator revisit the incident to study how and why

the incident occurred to determine what additional measures might be taken

to reduce the possibility of future, similar incidents. (See the section entitled

Follow Up for additional information.)

Note: (2) and (3) may occur in reverse order, depending on the organization’s

preparedness and how it is structured. Some organizations empower web site

operators to contain without prior approval while others do not.

Many organizations outsource web site hosting to service providers. Third party

web hosting providers should have their own procedures for dealing with

phishing sites hosted on their servers. Ask your hosting provider to discuss these

procedures with you before an event occurs. All web site owners should also make

certain that the web site hosting provider is contractually obligated to notify them

in the event of a hacked web site incident, and both parties should agree on a

common set and order of response actions in advance.