Leosghost - 3:43 pm on Mar 8, 2013 (gmt 0)
The background ads ( sometimes called "wraps" ) that you see there are not from Google ( although there is adsense elsewhere on the page ) the wrap is definitely from ams1.ib.adnxs.com ( which is what shows in the on hover ) and when I "click on it" ( I do not advise that anyone does the same ) I "go" via the adnxs.com system..
Sites can run more than one ad network at once..and if they are serving via DFP or similar they can be "rotating" ads from different suppliers in and out ..so we may not both be seeing the same things at the same time ( there were two adsense banners one at the top, one at the bottom-then I "refreshed"- there is now one adsense banner at the top and an adxns banner at the bottom..but the wraps are still adnxs generated and require a "missing plug in" ( although they showed me a brief "static wrap image" )..which I would guess would deliver the malware..
Opera dragonfly shows me it is redirecting and is run by http*://bs.serving-sys.com/BurstingPipe/adServer.bs blah blah blah (*deliberately unlinked ) etc..It is a RealMedia "thing", they are known for their ad "wraps".. and it is Geo targeted..after all redirects are finished it send me to an eu ( as a sin a subdomain ) sign up page for a "blizzard" game..
A simple "view source" will not show this, it would make one think it was a part of the page set aside to run what they call in source a G "site skin"..