A conditional redirection was detected on the web site, sending users to a domain pushing the Fake V to anyone visiting the compromised site.
It is according to this scan: https://aw-snap.info/file-viewer/?tgt=http%3A%2F%2Famanin.net%2F&ref_sel=GSP2&ua_sel=ff&fs=1
Location: -http://senetrpals.ru/olafz?11
Note: This line has redirected the request to -http://senetrpals.ru/olafz?11
but Content that was returned by your request for the URL: -http://amanin.net/
Note: Content displayed is from the redirect location, the URL -http://senetrpals.ru/olafz?11
CGI hack? → e.g. -http://amanin.net/././././././././././././././ re: 亜麻仁油 効果のすべて
Drown exploit: https://test.drownattack.com/?site=dns0.heteml.jp
pol