Now the specific link MaxBounty Steve provides:
Server redirect check:
Code: 302, htxp://www.maxbounty.com/lnk.asp?o=6073&c=918271&a=14601
Redirect to external server! → htxp://www.maxbounty.com/def.cfm?i=0&o=6073 → htxp://khvx.redirrus.com/?offer=6073&s1=0 →
htxp://exclusiverewards.myprizersavingzsurveys.eu/?sov=333912405&hid=djhfjnlntfhrptjp&id=XNSX. → htxp://exclusiverewards.myprizersavingzsurveys.eu/
Content displayed is from the redirect location = the URL htxp://exclusiverewards.myprizersavingzsurveys.eu/?sov=333912405&hid=djhfjnlntfhrptjp&id=XNSX.
no description in google because of robot.txt see: http://killmalware.com/www.maxbounty.com/lnk.asp?o=6073&c=918271&a=14601
found as sign of earlier compromittal → htxp://maxbounty.com/test404page.js
Spam check: Suspicion of Spam
er und frauen. sie sind nicht pornostars oder prostituierte.
umfragemeinung 2014 <script src="//ajax.googleapis dot com/ajax/libs/jquery/1...
Content after the < /html> tag should be considered suspicious.
192:< !-- Mini 1394239957 -->
The IP history of badness on VT: https://www.virustotal.com/nl/ip-address/66.40.15.30/information/
10 appearance(s) in spam e-mail or spam post urls 2 weeks ago.
<p>ThreatSTOP flagged that IP 3 months ago for the threat Parasites - danger level 1 - no active threats recorded.</p>
<p>polonus</p>