What kind of ProtocolSwitchingRedirector abuse is this?

Re: https://www.shodan.io/host/185.230.62.161
See malware detected on two domains: https://urlquery.net/report/2f923cc1-c35a-4653-930e-8c7092b63e87
Re: https://www.virustotal.com/en/url/c170b7254a197e288a16ad62807c453d2c7b53106744aa0b9882ed3e26a68760/analysis/
Re 3 to flag: https://www.virustotal.com/en/url/c170b7254a197e288a16ad62807c453d2c7b53106744aa0b9882ed3e26a68760/analysis/
Internet scanner detected from IP 80.84.132.100 → https://www.shodan.io/host/80.84.132.100

Website is insecure by default 100% of the trackers on this site could be protecting you from NSA snooping. Tell -momeweb.com to fix it.

All trackers
At least 4 third parties know you are on this webpage.

-static.parastorage.com
-Google
-static.wixstatic.com
-frog.wix.com -frog.wix.com
Legend

GoDaddy abuse: https://www.virustotal.com/en/domain/frog.wix.com/information/
Malware flagged, VT captcha checking whether you are human,
then alert " Trusted source! This file belongs to the Microsoft Corporation software catalogue. "
Alerted as medium security risk: https://sitecheck.sucuri.net/results/frog.wix.com (Amazon AWS).

Consider: https://www.shodan.io/host/34.194.96.135

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

Also consider the errors and scan results here: https://privacyscore.org/site/133359/
delivering a 404 not found…co nnection not secure.

Also found

uMatrix has prevented the following page from loading:

hxtp://frog.wix.com/

polonus