Is peperonity.com Safe?

Trusted by WOT

Website security score

74%
WOT’s security score is based on our unique technology and community expert reviews.
Is this website claimed?
No
Community reviews
★ 4.2
WOT’s algorithm
83%
Child Safety
29%

What does the community say?

Leave a review

How would you rate this website from 1 to 5?
starempty-star
starempty-star
starempty-star
starempty-star
starempty-star
Share your feedback and help the communityReviews must consist of at least 15 charactersChoose the tags that best describe this website
Malware or Viruses
Poor customer service
Phishing
Scam
Potentially illegal
Misleading or unethical
Privacy Risk
Suspicious
Hate, discrimination
Spam
Potential unwanted program
Ads / Pop-ups
Adult Content
Incidental nudity
Gruesome or shocking
Cancel
Post Review
4.2
starstarstarstarempty-star

Based on 6 reviews

Sort by:
Newest
Одличан сајт! Често га посећујем и заиста је занимљив... :)
Helpful
Не для детей !
Helpful
Kinder kommen ja doch rein. Werden aber zumindestens nach der "Sicherheits"-Frage mit erotischen Inhalten konfrontiert.
Helpful
It has warnings for adult content of any of the sites within, staff help isn't always there for you right at that moment but it provides a good environment for safety. Needs to upgrade it's spam security to protect members from spammers. Has a block feature to stop unwanted mail from members. Not a bad site. Still has a few kinks to work out in the end, but still great to chat with other members and a good place to put a site up of your own design with the features available. Plus it's free so that's a great bonus.
1
((about "/")) Information site. At guest access (not join with), may be only shown none-adult-contents expect one of link anchors. ((about some of "/go/media/*****" ; hidden contents)) Some URL in this adult contents pages contain force execution code character "!". ex. "peperonity.com/go/media/MMMMM%213/;jsessionid=XXXXXX?ACT=YYYYYYYY" "%21"+"3" -> "!3" May be: "MMMMM" is media-code, "XXXXXX" is session-id, "YYYYYYYY" is asp control data. At saving media file by browser operator, above string "!3" may works save file name as "MMMMM!3.htm" , loading from web server and executing HTML file "3.htm". Server operator(s) seem to use this trap for protection against media file saving by net surfers... but may not that all... [Appendix] (1)Testbed OS & Browser: Ubuntu/8.04 (hardy) Firefox/3.0.16 (2)This site may be uses ASP, so location of "3.htm" could not detected. (3)Detail Log: (Link code: 664Gfx98-100106Hnbc)
1
Check If You’ve Been CompromisedConnect with Google to scan your browsing history.
Connect with Google
As seen on
By signing in, you agree to data collection and use as described in our Terms Of Use and Privacy Policy
alternative-placeholder

About WOT

We reviewed more than 2 Million website and counting. WOT is a lightweight extension designed to help you browse quickly and securely. It will clean your browser, speed it up, and protect your private information.

Is this your website?

Claim your website to access WOT’s business tools and connect with your customers.
Claim This Website
This site uses cookies for analytics and personalization. By continuing, you agree to our cookie policy.
Accept