Hey I hope this is in the right section. If not, sorry.
My website - jworld2.sitesled.com
, and I think all the other html pages hosted on my server account have unauthorized ads placed on them. If you click the link you can see it. It is the only ad on the site.
Viewing the page source, I found some html that I did not put there-
if (!document.phpAds_used) document.phpAds_used = ',';
phpAds_random = new String (Math.random()); phpAds_random = phpAds_random.substring(2,11);
document.write ("http://www.wecounthits.com/process/adengine/adjs.php?n=" + phpAds_random);
document.write ("&exclude=" + document.phpAds_used);
document.write ("&referer=" + escape(document.referrer));
document.write ("'><" + "/script>");
</script><noscript><a href='http://www.wecounthits.com/process/adengine/adclick.php?n=aa7be145' target='_blank'><img src='http://www.wecounthits.com/process/adengine/adview.php?what=zone:44&n=aa7be145' border='0' alt=''></a></noscript>
I tested this code and figured out that it is indeed this that created the ads on my site. Right clicking on the ad and going to properties, in the address section, I found a url that resembled this- http://b1.adbrite.com/iads/22644.gif
. I say it only resembled that because the ads are not always the same and the url may be slightly different. But the url always says "adbrite" in it. I searched about adbrite and it seems to be a professional ad placing service.
You can see the url for wecounthits.com. I went to that site and it is a statcounting site that says it does not put ads on people's sites. I put in the url http://www.wecounthits.com/process/adengine
from above. If you click on that link, you go to a page that says welcome to phpAdsNew, which I found out is now Openads. That is as far as I got into finding the source of the ads.
I may just be going nowhere here, but I was hoping that somebody knows anymore about this. It may just be the work of hackers. I was also hoping that there would be a way to get rid of the ads without having to upload all of the html files over again. Thank you for your patience and help!