See: http://quttera.com/detailed_report/rekomedia.com
Because of Up(nil): unknown_html RIPE CZ abuse at ignum dot cz 217.31.62.14 to 217.31.62.14 rekomedia dot com htxp://rekomedia.com/
Detected by Bitdefender: https://www.virustotal.com/en/url/bafa3fb0032dcb73476f4c4d6003edca9b12bb1c94748cf58b52e86597f724a5/analysis/1371593960/
see: http://urlquery.net/queued.php?id=30256220
Exploit detected on other domain same IP: http://urlquery.net/report.php?id=909973 - live g01pack exploit kit
due to mass injections since 2011: http://community.websense.com/blogs/securitylabs/archive/2011/04/19/Mass-Injections-Leading-to-g01pack-Exploit-Kit.aspx
- the g01pack admin panel is just a faked honeypot tool used by attackers…
Blacklist status: http://sitecheck.sucuri.net/results/rekomedia.com
Site software vulnerable to: http://webcache.googleusercontent.com/search?q=cache:wKce2sKa0CMJ:https://security-tracker.debian.org/tracker/CVE-2012-2688%2BPHP/5.3.3-7%2Bsqueeze14+vulnerabilities&client=flock&channel=fds&oe=utf-8&hl=en&ct=clnk
and see: http://malwaremustdie.blogspot.nl/2013/01/some-obfuscation-notes-on-critxpack.html
polonus