See: https://urlscan.io/result/a24aa861-32bd-4557-9eae-af8de77ee865/#summary and http://urlquery.net/report.php?id=1490032329408 See: https://www.abuseipdb.com/check/41.218.189.97 Site Advisor reports This link might be dangerous. We tested it and found security risks. Beware. link: -http://ban.go2cloud.org/aff_c?offer_id=277&aff_id=7473 See: https://urlscan.io/result/6d4ebe35-a26d-487a-ac89-443481cc00c6#summary Redirects traffic path: whois:-http://ban.go2cloud.org/aff_c?offer_id=277&aff_id=7473 and then going onto: whois:-http://profitmaximizer.co/de/?ot=snip&token=snip&clickid=snip&aff=ud&ct=snip Also consider: https://webcookies.org/cookies/profitmaximizer.co/3142421 Re: -http://profitmaximizer.co/de Detected libraries: jquery - 1.11.3 : (active1) http://code.jquery.com/jquery-1.11.3.min.js Info: Severity: medium https://github.com/jquery/jquery/issues/2432 http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/ (active) - the library was also found to be active by running code 1 vulnerable library detected And then consider this: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fprofitmaximizer.co%2Fde%2Fjs%2Fscripts.js%3F2 Is this all just junk for their docs? InnerHTML and innerdata ??? Read this discussion from the pro’s at StackOverflow’s: http://stackoverflow.com/questions/8318581/html-vs-innerhtml-jquery-javascript-xss-attacks
polonus