The problem is that the URL in the URL:Mal image doesn’t match the site you were visiting, so somewhere on that page is an active link (or it was hacked) to what was blocked by the Network Shield.

Or it was something else possibly unrelated to this site as I don’t get any avast alert when I checked it out. However, I have firefox and the RequestPolicy add-on which blocks cross site scripting as there is an active link to 7879.in (almost certainly malicious), image1 and it is this which is being alerted on. Without RequestPolicy I would have had the alert too and if I didn’t have avast also would have been exposed to potential malware.

So this site would appear to have been hacked as there is a bunch of obfuscated script and an iframe tag after the closing HTML tag, a standards no, no and highly suspect. This is even more suspect as it is all on a single line (see image2), which I have broken to make it easier to see in the image.

As you can see from image3 avast alerts on the 7879.in site when accessed outside of the digicom.co.id site.

So essentially the detection is good and should have been in the viruses and worms topic as it is unrelated to the avast version only VPS.

@ Castayr
So the VT results are invalid for this blocking by the network shield.