See all threats here: http://threatstop.com/checkip → 23 minutes ago threats MODIFIED ITAR, ITAR, CHINA threat level 1.
See: Up(nil): APNIC CN 60.210.11.231 to 60.210.11.231 60.210.11.231
See: http://toolbar.netcraft.com/site_report?url=60.210.11.231%2Flvs%2Fbanner_1.jpg (Risk rate 10 out of 10 RED)
htxp://60.210.11.231/file/MDAwMDAwMDGSJcByiJiZn3rq0LglSSlmpMcl_EJPHghyPvUhjxW-2w…/209c2a443f46eb26807ff78378f7ad8d17d786cd/10958773-vxd-UG& → https://www.virustotal.com/nl/url/486f4c473bf280bd41c5cc62f02f4272e424f7c7211f583249061b3fe93e2668/analysis/1398518686/
url after redirect: htxp://60.210.11.231/lvs/redirect.html?kne=&d=0823C937 (flagged by avast! Webshield as URL:Mal).
http://urlquery.net/report.php?id=1398515062630
Trying to redirects to: htxp://www.dbank.com/ping.php?js=all?v=1.26.23"%3B → htxp://www.dbank.com/ping.php?js=base
Emisoft is the only one to flag next to avast! shield.

pol

P.S. Everybody should be aware of the banner abuse by Zeus: http://www.gfi.com/blog/beware-malware-banner/
link article author = Mohammed Ali (actually old info from 2011, then new but now still actual)

D