Brought to my attention by our good forum friend, Pernaman. I analyzed url and IP.
Pernaman, thank you very much for reporting and bringing this to our attention.
Inittially I analyzed just using fetch online: http://fetch.scritch.org/%2Bfetch/?url=http%3A%2F%2Fragekage.com%2F&useragent=Fetch+useragent&accept_encoding=
and the only script found at that site came from the builder of the site, Kenton Glass, -http://kenton.me/-/mint/?js
http://toolbar.netcraft.com/site_report?url=http://kenton.glass
The website report risk status: http://toolbar.netcraft.com/site_report?url=http://ragekage.com
Consider this: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fkenton.me
This was in the footer: https://twitter.com/notnek
This was blocked by MBAM as malcious, namely the reverse DNS: http://block.malwarebytes.org/ blocks -5b.89.7e4b.ip4.static.sl-reverse.com blocked for SPAM by Spamhaus and listed for
Illegal 3rd party exploits, including proxies, worms and trojan exploits
So it seemed the website is clean, but the IP has become blacklisted for abuse…
polonus (volunteer website security analyst and website error-hunter)