These embedded links should be whitelisted, also with pi-hole...

Re: https://aw-snap.info/file-viewer/?protocol=secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=XiNucy5nW2d5fC5eXW0%3D~enc
Now forwarded on the Akamai network, see IP: https://www.shodan.io/host/104.112.43.33
on Akamai’s HTTP Acceleration/Mirror service.
See: https://developers.gigya.com/display/GD/Web+SDK
rewritings on HTTPS: https://atlas.eff.org//domains/gigya.com.html
Consider: https://www.virustotal.com/nl/url/22539d6177d66bc2f7894ae1bc45002feb45a246461aacb33e0cdac6395a7cd2/analysis/1516013270/
and https://www.hybrid-analysis.com/sample/de0ae846eca3a4d7f0242f0c913053cf03468cd9fdc133285db4103e7f7aebf5?environmentId=100
Read: https://www.reddit.com/r/pihole/comments/7ydcwq/for_rtlxl_you_got_to_whitelist_domain_cdnsgigyacom/

polonus (volunteer website security analyst and website error-hunter)