I've been redirected twice now from ed.com to various xorg.pl domains and it tries to run a js script that my a/v flags up. Looking at your source I can see this at the bottom, which looks very suspicious:
<script src="http://kdjkfjskdfjlskdjf "dot" com/kp.php"></script>
Yes, that's right dj, our hosting provider has some security issue and we are trying to find a way to fix the compromised files in our site.
http://blog.sucuri.net/2010/05/second-round-of-godaddy-sites-hacked.html
Solved :applause:
Thanks.
There definitely was a problem yesterday.
I like how Go Daddy blames wordpress for everything even when guys without wordpress were infected.
It's back: http://blog.sucuri.net/2010/05/continuing-attacks-at-godaddy.html
3rd time, fixed
Avast detects modules/ad/serve.php as infected with the HTML:Script-inf trojan :(