See where? https://security.stackexchange.com/questions/96244/selective-javascript-commands-avoiding-vulnerabilities-exploitation
See what link: http://www.domxssscanner.com/scan?url=https%3A%2F%2Fengine.adzerk.net%2Fados%3Ft%3D1496136994970%26request%3D%257B%2522Placements%2522%3A[%257B%2522A%2522%3A22%2C%2522S%2522%3A0%2C%2522D%2522%3A%2522adzerk1438332406%2522%2C%2522ATA%2522%3A[5%2C17]%2C%2522DynamicSiteOverride%2522%3A%2522security.stackexchange.com%2522%2C%2522Z%2522%3A[56016]%257D]%2C%2522Keywords%2522%3A%2522x-community%252Cx-host-security.stackexchange.com%2522%2C%2522Referrer%2522%3A%2522%2522%2C%2522IsAsync%2522%3Atrue%257D
Also read on Reddit: https://www.reddit.com/r/wireless/comments/3ckip1/httpsengineadzerknetr_not_being_blocked_by_router/
engine dot adzerk dot net is listed in OpenDNS’s Block Tool http://forums.opendns.com
polonus (volunteer website security analyst and website error-hunter)