Let us check that site. Following issues are being found up by web security test.
iFrame check: Suspicious
<iframe id="rightads" src="" scrolling="no" border="0" frameborder="0" marginheight="0" marginwidth="0" style="width:160
That is a hidden iFrame found.
Javascript check: Suspicious
r") != undefined) { //document.write('<iframe id="bottomads" src="" scrolling="no" border="0" frameborder="0" marginheight="0" marginwidth="0" style="width:824px; height:11... *
* is part of script to test whether visitors have strong ad blocking enabled, see second and third script at:
http://fetch.scritch.org/%2Bfetch/?url=www.ryuutama.com&useragent=Fetch+useragent&accept_encoding=Note - so site established that I have a strong ABP blocking enabled in my browser (note by me, pol)
404 error Check:
Suspicious
Suspicious 404 Page:
document.write('<iframe id="bottomads" src="" scrolling="no" border="0" frameborder="0" marginheight="0" marginwidth="0"
External links check:
http://statcounter.com/free-hit-counter/ invisible free tracker, but not malicious as such.
So site may have adware, and it tests visitors against being able to block these ads.
Site is vulnerable, re:
https://security-tracker.debian.org/tracker/CVE-2013-2110 &
http://www.security-database.com/detail.php?alert=DSA-2816, also leaking Mongo shell data.
DrWeb's URL checker gives an all green: Checking: htxp://widgets.amung.us/small.js
File size: 4801 bytes
File MD5: 848fe442ae30543c80d9972d35a3e8de
htxp://widgets.amung.us/small.js - Ok
Checking: htxp://www.ryuutama.com//js/jquery-1.8.3.min.js
File size: 91.44 KB
File MD5: e1288116312e4728f98923c79b034b67
htxp://www.ryuutama.com//js/jquery-1.8.3.min.js - archive JS-HTML
>htxp://www.ryuutama.com//js/jquery-1.8.3.min.js/JSTag_1[13407][39be] - Ok
htxp://www.ryuutama.com//js/jquery-1.8.3.min.js - Ok
Checking: hxtp://www.ryuutama.com//js/jquery.lazyload.js
File size: 7837 bytes
File MD5: 873cfb74844b0cf8a5063d58058ead8c
htxp://www.ryuutama.com//js/jquery.lazyload.js - Ok
Checking: htxp://www.ryuutama.com//js/advertisement.js
File size: 58 bytes
File MD5: 3ec054140f246a21fbf55aff6dbea6d6
htxp://www.ryuutama.com//js/advertisement.js - archive JS-HTML
htxp://www.ryuutama.com//js/advertisement.js - Ok
Checking: htxp://www.ryuutama.com//js/jquery.autocomplete.js
File size: 21.56 KB
File MD5: 2f34815c575309b41a04e3719a35c683
htxp://www.ryuutama.com//js/jquery.autocomplete.js - Ok
Checking: htxp://www.ryuutama.com//js/constants.js
File size: 23 bytes
File MD5: fb472f60ac7cb92ac23c4c13c374b1ed
htxp://www.ryuutama.com//js/constants.js - Ok
Checking: htxp://www.statcounter.com/counter/counter.js
File size: 9028 bytes
File MD5: 389f1acf246618ba207b9122dfbc57a8
htxp://www.statcounter.com/counter/counter.js - Ok
Checking: htxp://www.ryuutama.com/
Engine version: 7.0.9.4080
Total virus-finding records: 5391009
File size: 60.68 KB
File MD5: 0ea515f0d3e41508bf8cf5067bdf4c7f
htxp://www.ryuutama.com/ - archive JS-HTML
>htxp://www.ryuutama.com//JSTAG_1[410][4ab] - Ok
>htxp://www.ryuutama.com//JSTAG_2[15df][36f] - Ok
>htxp://www.ryuutama.com//JSTAG_3[eb4d][30a] - Ok
>htxp://www.ryuutama.com//JSTAG_4[f015][5a] - Ok
htxp://www.ryuutama.com/ - Ok
polonus