What abuse is going on here?

See it actively engaged in abusive activities: https://www.abuseipdb.com/check/89.19.29.189

See no alerts given here: https://urlquery.net/report/66a5e0c6-42d1-41e6-baad-2de317fb7df7
See on code: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=Xlt6Z1subnt0LnR9~enc
and 99 security errors here: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=Xlt6Z1subnt0LnR9~enc
Vulnerable javascript libraries detected with SNYK: ERROR

‘Bootstrap@3.3.7’ has 1 known vulnerability (1 medium). See ‘https://snyk.io/vuln/npm:bootstrap’ for more information.

-http://cizgi.net.tr/

ERROR

‘jQuery UI@1.11.4’ has 1 known vulnerability (1 high). See ‘https://snyk.io/vuln/npm:jquery-ui’ for more information.

-http://cizgi.net.tr/

Suspiicous code runtime:

(script) -natro.com/ResourceFiles/v1/plugins/jquery-fancybox/jquery.fancybox.js?v=2.1.5
status: (referer=-cizgi.net.tr/)saved 58780 bytes ad10d9b42817ff180381cd2b57a572223099e3ee
info: [embed] -natro.com/ResourceFiles/v1/plugins/jquery-fancybox/
info: [decodingLevel=0] found JavaScript
suspicious: maxruntime exceeded 10 seconds (incomplete) 0 bytes
file: ad10d9b42817ff180381cd2b57a572223099e3ee: 58780 bytes
file: ddaaa73eb4708dd37249ec3329406b2fec62181d: 59088 bytes
file: 6594f0bdb11a6455708e154ac81d1cf39bc17b5c: 59094 bytes
file: cb8991163f1877880adf13c50949a05426116a08: 59303 bytes
file: 52f7b89964bc24f727c84e9fda4bc998b33828d8: 59495 bytes
file: 21c60aea52d842e9339b24c7d910abe44a008262: 59209 bytes
file: 8bb1a93396c562c78f36120a2a967f96419d7153: 59333 bytes
&

[script] -static.criteo.net/js/ld/ld.js info: [decodingLevel=0] found JavaScript error: undefined variable m info: DecodedGenericCLSID detected 7b603d9a-7e36-27fb-501f-c0723fc844a4 info: DecodedMsg detected /info.ActiveXObject 7b603d9a-7e36-27fb-501f-c0723fc844a4 info: [element] URL=-www.google-analytics.com/analytics.js info: [1] no JavaScript file: 9b02ff47a77a8f69f37f5c656f4fe1317625ac42: 107207 bytes file: e8a7139efc2f3555f4b4e1fdb858d37d5287c210: 164 bytes
&
(script) -static.criteo.net/js/ld/ld.js status: (referer=cizgi.net.tr/)saved 19136 bytes bd688c6158d3ebbf4aa4cfe805dd658d5a85b91b info: [decodingLevel=0] found JavaScript error: undefined variable document.location.hostname error: line:1: SyntaxError: missing ; before statement: error: line:1: var document.location.hostname = 1; error: line:1: ....^ file: bd688c6158d3ebbf4aa4cfe805dd658d5a85b91b: 19136 bytes
Risk found from -lpcdn.lpsnmedia.net, consider https://otx.alienvault.com/indicator/domain/lpsnmedia.net

polonus (volunteer website security analyst and website error-hunter)