Obfuscated script malcode detected here?

See: https://www.scumware.org/report/programming.rasekhoonblog.com.html
See: https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=programming.rasekhoonblog.com&ref_sel=GSP2&ua_sel=ff&fs=1
See: https://observatory.mozilla.org/analyze.html?host=programming.rasekhoonblog.com
See: https://sritest.io/#report/0423b4b5-4d8e-4b1a-aff2-3a07499aff31
See: http://retire.insecurity.today/#!/scan/ffc78fcd23b5db219ceefc28a774533515e637788b3ba23d617e2c3a1da1177c
See: https://asafaweb.com/Scan?Url=programming.rasekhoonblog.com
See: http://fetch.scritch.org/%2Bfetch/?url=http%3A%2F%2Fprogramming.rasekhoonblog.com&useragent=Fetch+useragent&accept_encoding=

Is site being blocked or the obfuscated code flagged? JS/ScrScr.N (Command) JS.Redirector.Gen.19 (VirusBuster) JS/Redir (AVG) Trojan.JS.Redirector.ij (BitDefender) JS.Click.223 (Dr.Web) JS/TrojanClicker.Agent.NAZ trojan (ESET) Trojan.JS.Redirector (Ikarus) Trojan-Downloader.JS.JScript.c (Kaspersky) JS/Redirector.AF (McAfee)

polonus

Detected by 6 scanners: https://www.virustotal.com/pl/url/37bcbde4dad4c2c12d8420e5306ea67552086431ed76aa151a8c1d20a576ca7e/analysis/1500136886/

78 potentially suspicous files: Reason: Suspicious JavaScript code injection.
Details: Procedure [unescape] has been called with a hidden string ‘document.write(e0cc904799f(’’ containing execution of potentially suspicious code - <urlopen error [Errno -3] k = unescape(tmp[1] + “581114”);/
Re: https://quttera.com/detailed_report/programming.rasekhoonblog.com

polonus (volunteer website security analyst and website error-hunter)