@Eddy and others,
I get a message for this adware related detection JS:Downloader-YT [Trj] on -http://video.meta.ua/9443596 [gzip]
Probably those that do not detect have pup-detection disabled within avast free. Detection was there from 2010.
DNS issues on site:
With this domain I find stealth name servers: found stealth name servers at some of your servers. All name servers returned by domain name servers should be listed at parent servers
-ns1.meta.ua at -ns4.top.net.ua
-ns1.meta.com.ua at -ns4.top.net.ua
-ns1.meta.ua at -ns5.top.net.ua
-ns1.meta.com.ua at -ns5.top.net.ua
No detections at the main domain address:
http://toolbar.netcraft.com/site_report?url=http://video.meta.uaCertificates installed in the wrong order.
Some certificates in the chain are installed in the wrong order. See details below. Reinstall the certificates in the proper order.
Add Trust External CA root and Tested certificate....
Warnings
RC4
Your server's encryption settings are vulnerable. This server uses the RC4 cipher algorithm which is not secure. More information.
Root installed on the server.
For best practices, remove the self-signed root from the server.
This server uses a Domain Validated (DV) certificate. No information about the site owner has been validated. Data is protected, but exchanging personal or financial information is not recommended.
Similar detection as the one at hand here:
https://www.scumware.org/report/194.0.131.28.htmlXPL/Gen BE
Rank this week: Nº 702
Websites affected: 14
Users affected: 100 - 5,000
Affected Operating Systems: All Windows OS
excessive server info proliferation detected: nginx 1.7.6 10 disallowed entries
| /cron /mui /api /script /logs /vpla /mediaplugin vulnerable to :wp-content/plugins/ad-injection
|_/uploader /ajax /feedpath TLS randomnes on http 1.1
Also consider:
http://retire.insecurity.today/#!/scan/b61198803f57314e7c5cfbf2b2ef6e52e0ba5b70af374f10c56b4a54f4caf1bcpolonus (volunteer website security analyst and website error-hunter)