Now the specific link MaxBounty Steve provides:
Server redirect check:
Code: 302, htxp://www.maxbounty.com/lnk.asp?o=6073&c=918271&a=14601
Redirect to external server! → htxp://www.maxbounty.com/def.cfm?i=0&o=6073 → htxp://khvx.redirrus.com/?offer=6073&s1=0 →
htxp://exclusiverewards.myprizersavingzsurveys.eu/?sov=333912405&hid=djhfjnlntfhrptjp&id=XNSX. → htxp://exclusiverewards.myprizersavingzsurveys.eu/
Content displayed is from the redirect location = the URL htxp://exclusiverewards.myprizersavingzsurveys.eu/?sov=333912405&hid=djhfjnlntfhrptjp&id=XNSX.
no description in google because of robot.txt see: http://killmalware.com/www.maxbounty.com/lnk.asp?o=6073&c=918271&a=14601
found as sign of earlier compromittal → htxp://maxbounty.com/test404page.js
Spam check: Suspicion of Spam
er und frauen. sie sind nicht pornostars oder prostituierte.

umfragemeinung 2014 <script src="//ajax.googleapis dot com/ajax/libs/jquery/1... Content after the < /html> tag should be considered suspicious. 192:< !-- Mini 1394239957 --> The IP history of badness on VT: https://www.virustotal.com/nl/ip-address/66.40.15.30/information/ 10 appearance(s) in spam e-mail or spam post urls 2 weeks ago. <p>ThreatSTOP flagged that IP 3 months ago for the threat Parasites - danger level 1 - no active threats recorded.</p> <p>polonus</p>