Why the yellow flag on WOT here?

AOS gives it a green: http://hphosts2.rssing.com/chan-6561931/all_p9936.html
http://toolbar.netcraft.com/site_report?url=http://hphosts2.rssing.com reverse DNS on a DROWn vulnerable server: http://toolbar.netcraft.com/site_report?url=http://hphosts2.rssing.com

IP badness history: https://www.virustotal.com/en/ip-address/216.155.149.122/information/
spider seen: https://www.projecthoneypot.org/ip_216.155.149.122

Sub domain in a bad zone: http://www.dnsinspect.com/rssing.com/1465858869

Quatserve and other blackable adtracking script running on this website. Script loaded: http://s7.addthis.com/js/300/addthis_widget.js#pubid=mywesharemanager
Script loaded: -http://hphosts2.rssing.com/inc/js/rssing.js
Script loaded: -http://hphosts2.rssing.com/inc/js/imging.js
Script loaded: -http://edge.quantserve.com/quant.js
Script loaded: -http://www.google-analytics.com/analytics.js
Script loaded: -http://hphosts2.rssing.com/inc/js/rssing.js
Script loaded: -http://hphosts2.rssing.com/inc/js/imging.js
Script loaded: -http://edge.quantserve.com/quant.js
Script loaded: -http://www.google-analytics.com/analytics.js
Script loaded: -http://hphosts2.rssing.com/inc/js/rssing.js
Script loaded: -http://hphosts2.rssing.com/inc/js/imging.js
Script loaded: -http://edge.quantserve.com/quant.js
Script loaded: -http://www.google-analytics.com/analytics.js
Script loaded: -http://hphosts2.rssing.com/inc/js/rssing.js
Script loaded: -http://hphosts2.rssing.com/inc/js/imging.js
Script loaded: -http://edge.quantserve.com/quant.js
Script loaded: -http://www.google-analytics.com/analytics.js
Script loaded: -http://m.addthisedge.com/live/boost?pub=mywesharemanager&callback=ate.track.config_resp
Script loaded: -http://s7.addthis.com/static/menu.e01f53fa718d7a370a64.js
Script loaded: -http://apis.google.com/js/plusone.js
Script loaded: -http://apis.google.com/js/plusone.js
Script loaded: -http://m.addthis.com/live/red_lojson/300lo.json?si=575f3d7f4f6fcf8b&bl=1&sid=575f3d7f4f6fcf8b&pub=mywesharemanager&rev=v7.1.3-wp&ln=en&pc=men&cb=0&adu6=0&ab=-&dp=hphosts2.rssing.com&fp=chan-6561931%2Flatest.php&fr=&of=0&pd=0&irt=0&vcl=0&md=0&ct=1&tct=0&abt=0&cdn=0&pi=1&rb=0&gen=100&chr=UTF-8&colc=1465859455717&jsl=4096&uvs=575f3d7f1efd900e000&skipb=1&callback=addthis.cbs.oln9_96738984482362870
Status: success
Script loaded: -https://apis.google.com/
/scs/apps-static//js/k=oz.gapi.nl.67XL_ZcHCiI.O/m=plusone/rt=j/sv=1/d=1/ed=1/am=AQ/rs=AGLTcCMdjLWbnLE-lkI8NM_yNmJsHQMBJA/cb=gapi.loaded_0
Script loaded: -https://apis.google.com/
/scs/apps-static//js/k=oz.gapi.nl.67XL_ZcHCiI.O/m=auth/exm=plusone/rt=j/sv=1/d=1/ed=1/am=AQ/rs=AGLTcCMdjLWbnLE-lkI8NM_yNmJsHQMBJA/cb=gapi.loaded_1
Script loaded: -https://apis.google.com/
/scs/apps-static//js/k=oz.plusone.en_US.9FAJLMeELag.O/m=p1b,p1p/rt=j/sv=1/d=1/ed=1/rs=AGLTcCMLmRPJnv5FoROeVJsEYtKcthYEmw/cb=gapi.loaded_1
Script loaded: -https://apis.google.com/
/scs/apps-static//js/k=oz.gapi.nl.67XL_ZcHCiI.O/m=googleapis_client,iframes_styles_bubble_internal,gapi_iframes_style_common,gapi_iframes_iframer/rt=j/sv=1/d=1/ed=1/am=AQ/rs=AGLTcCMdjLWbnLE-lkI8NM_yNmJsHQMBJA/cb=gapi.loaded_0
Script loaded: -https://apis.google.com/js/rpc:shindig_random.js?onload=init
Script loaded: -https://ssl.gstatic.com/accounts/o/444357359-postmessagerelay.js
Script loaded: -https://apis.google.com/
/scs/apps-static/_/js/k=oz.gapi.nl.67XL_ZcHCiI.O/m=rpc,shindig_random/rt=j/sv=1/d=1/ed=1/am=AQ/rs=AGLTcCMdjLWbnLE-lkI8NM_yNmJsHQMBJA/cb=gapi.loaded_0
Load time: 3856ms

polonus (volunteer website security analyst and website error-hunter)