Blackhole site detected by avast

See: htxp://zulu.zscaler.com/submission/show/55e7c9c4928ee66aa181a73cdefaf1c9-1336085375
2 malicious external elements there. Avast detects as JS:Redirector-RO [Trj]
according to: hxtps://www.virustotal.com/file/9049f5c8c018e01d769dd62c443f780358608c1029d86c2571484f6b12b46399/analysis/
This has been blocklisted: htxp://zulu.zscaler.com/submission/show/ae77bee5670d0d57693a2779796e3173-1336085781

polonus

It is very interesting how some sites tend to block the “GET” request by specific servers. I am unable to access the page with my main URL viewer but succeeded with my secondary.

However, when trying to check the js.js on your example site:
HTTP Request Header
Connect to 74.54.138.76 on port 80 … ok

GET /ryzN0yvW/js.js HTTP/1.1
Host: wXw.paydayloanlivetransfers.com
Connection: close
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept-Encoding: gzip
Accept-Charset: ISO-8859-1,UTF-8;q=0.7,*;q=0.7
Cache-Control: no-cache
Accept-Language: de,en;q=0.7,en-us;q=0.3
Referer: http://web-sniffer.net/

HTTP Response Header
Status: HTTP/1.1 200 OK
Content-Length: 77
Content-Type: application/x-javascript
Last-Modified: Thu, 03 May 2012 19:15:40 GMT
Accept-Ranges: bytes
ETag: “a69012216129cd1:ddcd5”
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Thu, 03 May 2012 23:13:12 GMT
Connection: close