See: http://killmalware.com/juliashbot.com/#
See: http://zulu.zscaler.com/submission/show/a5b04815bbe8d5f09009b5a0484af3b1-1398721202
Listed as suspicious but is it really malicious?
Sucuri gives it as likely compromised:
IP badness history: https://www.virustotal.com/nl/ip-address/69.89.25.177/information/
https://www.virustotal.com/nl/url/af4f8a28de0178918a2ea1f5c0237f6e5ec92ec615414fc674f8d85d38dcf07e/analysis/
Also this is flagged by Google Safebrowsing: htxp://juliashbot.com/cgi-bin/
Quttera finds: /index_files/index.html
Severity: Malicious
Reason: Detected encoded JavaScript code commonly used to hide malicious behaviour.
Details: Malicious
Offset: 5805
Threat dump: View code → http://jsfiddle.net/fAaWt/
Threat dump MD5: 0205AFAE8EE3FD599FB6D42CEA7FB425
File size[byte]: 101326
File type: HTML
MD5: 3120AA3C156EEF3EB606DE9DDF6EE057
Scan duration[sec]: 0.186000
/_vti_pvt
Severity: Malicious
Reason: Detected encoded JavaScript code commonly used to hide malicious behaviour.
Details: Malicious
Offset: 6041
Threat dump: View code → http://jsfiddle.net/fAaWt/
Threat dump MD5: 5ABCF3749DFF6A6164F74295DE8385F6
File size[byte]: 119268
File type: HTML
MD5: B670F895A7FAC008EADF2DED7BA6B78A
Scan duration[sec]: 0.332000
/public_ftp
Severity: Malicious
Reason: Detected encoded JavaScript code commonly used to hide malicious behaviour.
Details: Malicious
Offset: 5808
Threat dump: View code → http://jsfiddle.net/mP93L/
Threat dump MD5: 58E1F9CD00E346A5D3CAA5B53C66CABB
File size[byte]: 100033
File type: HTML
MD5: 9FA0F6C0731F84B4E7B2D9B5A79DE345
Scan duration[sec]: 0.131000
polonus