Adware widget link blocked by uMatrix, could it be classiefied as PUP?

Where we found the javascript link? → https://urlquery.net/report/32acf4cd-a7c3-4093-b2d2-7de002d3e58d
Hosted at see: https://www.shodan.io/host/94.102.217.154
Re: https://toolbar.netcraft.com/site_report?url=neuber.biz
DOM-XSS issues: Results from scanning URL: -https://connect.ekomi.de/integration_1364287645/B8895E9D8401B80.js
Number of sources found: 12 ; number of sinks found: 4
Retirable library: https://retire.insecurity.today/#!/scan/5113e32d11fec477e5a321790f44d0ad04365fd5e140c23de34ad8015f804f86
Privacy implications: https://privacyscore.org/site/134080/
Server-leaks - server-status - excessive server info proliferation: Server: Apache/2.2.9 (Debian) DAV/2 mod_ssl/2.2.9 OpenSSL/0.9.8g PHP/5.2.6-1+lenny13 with Suhosin-Patch - mode proxy vulnerable towards attacks. Potentially risky methods: TRACE unexpected token
See vulnberablities for -rixor.netbeat.de and for vulnerabilities the shodan IP page.

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

Just a new one in: https://urlquery.net/report/ef00e550-60e3-46a4-b351-6f5eedd2785e
with 3 suricata threat alerts, re: https://urlquery.net/report/ef00e550-60e3-46a4-b351-6f5eedd2785e

Not given at VT: https://www.virustotal.com/nl/url/ea16d95d877b70b0d914badb0745038f7cd1bec97e655aec8c8343059bf56cd8/analysis/#additional-info
and https://www.virustotal.com/nl/file/46733e24d9ed6b87d5cea6c635bf4fef56cbc0d33e7a43cf6cbd205c4e00bafd/analysis/1556791375/
See reaction: https://www.virustotal.com/nl/file/46733e24d9ed6b87d5cea6c635bf4fef56cbc0d33e7a43cf6cbd205c4e00bafd/analysis/1556791375/#behavioural-info (info source HybridAnalysis)

pol