Hi linhee,
Alors, …
I do not see any problems there, nor with Virus Total result for address and IP relations.
Neither here: https://sitereport.netcraft.com/?url=https://www.restapi.fr
Nor with GET -https://restapi.fr/api/blog/5e16e37846e3e328c19cb656?delay=3
Quick Source review oversight:
HTML
www.restapi.fr/
16,916 bytes, 220 nodes
Javascript 6 (external 0, inline 6)
INLINE: self[‘tp_jgWluPUXPfX_func’] = function(frame){ if (frame === null) { co
3,872 bytes
INLINE: self[‘tp_JlkomuYIPMS_func’] = function(frame){ if (frame === null) { co
2,186 bytes
INLINE: self[‘tp_ZbDxKAJZRwd_func’] = function(frame){ if (frame === null) { co
2,614 bytes
INLINE: self[‘tp_ptZcxWEUaHO_func’] = function(frame){ if (frame === null) { co
2,424 bytes
INLINE: self[‘tp_bmpPOpikxYV_func’] = function(frame){ if (frame === null) { co
5,409 bytes
INLINE: /* * This entire block is wrapped in an IIFE to prevent polluting the scope of
412,307 bytes
CSS 4 (external 0, inline 4)
INLINE: -a.gootranslink:link {color: #0000FF !important; text-decoration: underline !impo
2,944 bytes INJECTED
INLINE: .BDTLL_icon_ok { background-image: url(data:image/png;base64,iVBORw0KGgoAAAA
26,787 bytes INJECTED
INLINE: .BDTLL_status { cursor: pointer; display: inline; margin-right: 3px;
117 bytes INJECTED
INLINE: -a.gootranslink:link {color: #0000FF !important; text-decoration: underline !impo
2,944 bytes INJECTED
Avast Online Security does not block,
JavaScript error on website
SyntaxError: Invalid regular expression flags
eval ()()
:3:100()
Object.N [as F_c] (:2:148)()
Object.E_u (:3:274)()
Ka (eval at exec_fn (:1:157), :61:375)()
Object.create (eval at exec_fn (:1:157), :73:235)()
L (eval at exec_fn (:1:157), :12:208)()
Probably you might have experienced a networking hick-up, report such an FP to avast from inside the software.
Je vous souhait bonne année 2021,
polonus (volunteer 3rd party cold reconnaissance website security analyst and website error hunter)