SE::Google::Compromised - Checking for This site may be hacked label in Google
Google Compromised parser overview
Google Compromised parser allows you to check for the presence of the This site may be hacked label in Google search results. With the help of the Google Compromised parser, you can check your own domain databases for the label. You can learn more about this label in the Google search help.
A-Parser functionality allows you to save parsing settings for further use (presets), set up a parsing schedule, and much more.
Saving results is possible in the format and structure that you need, thanks to the built-in powerful Template Toolkit template engine, which allows you to apply additional logic to the results and output data in various formats, including JSON, SQL, and CSV.
List of collected data
- Checking for the This site may be hacked label in Google
- Supports all the features of the SE::Google parser.
- Checking a list of domains for the This site may be hacked label in Google
- Monitoring your own domains
- As queries, you need to specify the URL of the site you are looking for, for example:
You can use built-in macros for automatic substitution of subqueries from files. For example, if we want to check sites/site by a keyword database, we will specify several main queries:
In the query format, we will specify a macro for substituting additional words from the Keywords.txt file. This method allows you to check the site database by a keyword database and get positions as a result:
This macro will create as many additional queries as there are in the file for each original search query, which in total will give
[number of original queries (domains)] x [number of queries in the Keywords file] = [total number of queries] as a result of the macro's work.
You can also specify the protocol in the query format so that you can use only domains as queries:
This format will add
http:// to each query.
Result output options
A-Parser supports flexible result formatting thanks to the built-in Template Toolkit template engine, which allows it to output results in any form, as well as in a structured form, such as CSV or JSON.
Exporting a list of sites with the label check result
As a result, the URL is displayed, and whether it has the This site may be hacked label in Google.
Links + anchors + snippets with position output
Outputting links, anchors, and snippets to a CSV table
Saving related keywords
Checking link indexing
Saving in SQL format
Dumping results to JSON
A-Parser allows you to process results directly during parsing. In this section, we have provided the most popular use cases for the SE::Google::Compromised parser.
Saving domains with a check value of "1"
Add a filter and select the check value variable ($compromised - Is site compromised) in the drop-down list. Select the type:
String equals. Then you need to enter the value we need in the "String":
1. With this filter, you can remove all results with an unnecessary value.
How to import an example into A-Parser
See also: Results filters
Link deduplication by domain
Extraction of domains
Removal of tags from anchors and snippets
Filtering links by inclusion
Supports all settings of the parser SE::Google, as well as additional ones:
|Parameter name||Default value||Description|
|Pages count||Number of parsing pages (from 1 to 10)|
|Links per page||Number of links in the output on each page (from 10 to 100)|