Left website that is vulnerable...

Re: https://sitecheck.sucuri.net/results/www.albany.net/allinone/all1user.html

Various vulnerabilities where it is (was) hosted: https://www.shodan.io/host/192.64.147.215

Various javascript errors like unexpected token and unexpected identifier,
DNS Rebinding Protection Script, Illegal Invocation (2), $ is not defined (PHP error),
Unexpected reserved mode restricted word, unespected token "&"via JSLint.
unexpected at JSOM parse position 0.

Insecure connection bein flagged

Detected JQuery i.8.3. Linting

See: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=www.albany.net/allinone/all1user.html#People
&
https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=d3d3LnxsYnxueS5ue3RgfGxsW25dbntgYmgucGhwPA%3D%3D~enc

Recommendations on website, see security flaws: https://webhint.io/scanner/d3ffd8fb-6b50-4d71-ab94-7fa16946e694

In the light of this voodoo dot com abuse, see: https://www.virustotal.com/gui/ip-address/192.64.147.215/relations
this website domain should be blocked

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

Hola Como puedo saber si mi web sobre gatos https://www.feelcats.com tiene problemas? algunas personas me han dicho que reciben notificaciones de su navegador pero yo no veo nada
gracias

Blacklist check
https://www.virustotal.com/gui/url/585cf0a07ad0c5dea94380e36fa2dfb65d2e95dbef725436843ecf077d413a55/detection

Sucuri scan https://sitecheck.sucuri.net/results/https/www.feelcats.com

Java script code (listed by Sucuri)
https://www.virustotal.com/gui/file/4af9208397b14eba62c40e131797ec40cab198445e57a9bf5c7f410da7896f1b/detection

feelcats_HTML scan
https://www.virustotal.com/gui/file/700974a0fc60ef3df0ef9ec4576cf150787264b2eed051692c2448487fcb19a3/detection

Hi lagata.elois,

Consider the scan results here of all that should be patched and upgraded for your website:
https://www.magereport.com/scan/?s=https://www.feelcats.com/
Quite some things come unprotected. Magento 1.x has reached end-date now!

For retirable jQuery library see: Retire.js
jquery 1.8.2 Found in -https://www.feelcats.com/media/js/841a37a0634ac9d7939850fa143a1b99-1551820798.js
Vulnerability info:
Medium CVE-2012-6708 11290 Selector interpreted as HTML
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution

From the Web Developer’s Point of View following errors appear:
Access to XMLHttpRequest at ‘hxtps://static.aroa.io/sync/userData.php’ from origin ‘hxtps://www.feelcats.com’ has been blocked by CORS policy: The ‘Access-Control-Allow-Origin’ header has a value ‘htxps://www.deporvillage.com’ that is not equal to the supplied
origin. Data have been pushed: -hxtps://static.aroa.io/c-3po-two-kk-r2-D2-0-class_v5.js

Wait for an avast team member to give the final verdict, as I do not see your website being blocked at the moment.
Avast Team Members are the only ones to come and unblock, as we here are just volunteers that may have relative knowledge.

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

thank you both Polonus and Pondus for your quick response

Detection is right.
Code html of script is attached

Our virus specialists have been working on this problem and they informed me that this detection is correct.

https://www.virustotal.com/gui/url/eabbf4ba46f41a9f7268fc9630fa00e0bad06eedbcdcdf373d82ff1f51e9c81c/detection

https://sitecheck.sucuri.net/results/103.139.113.34/validate.php