Another spammy uri or cleansed?

See recent reports on that AS in Poland: http://urlquery.net/report.php?id=1492283061349
and https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=www.zettchina.com%2Fes&ref_sel=GSP2&ua_sel=ff&fs=1
Sources and sinks galore: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fwww.zettchina.com%2Fes
Vulnerable library detected: http://retire.insecurity.today/#!/scan/0beee4d687fe719690d4ae79d546e264c3bd565576666d8111b61083a11a932e
F-F-X-status and recommended change: https://observatory.mozilla.org/analyze.html?host=www.zettchina.com

The address you entered is unnecessarily exposing the following response headers which divulge its choice of web platform:

Server: nginx/1.8.0
X-Powered-By: PHP/5.3.3
Configuring the application to not return unnecessary headers keeps this information silent and makes it significantly more difficult to identify the underlying frameworks.

Now benign and moved permanently? → http://zulu.zscaler.com/submission/show/4f251d92f9e300fd58e58f505eab1f02-1492283782

polonus