Attacked url: http://dentalmind.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Tue, 31 May 2016 04:48:16 +0200

Visitors with referer are redirected to http://www.cheapshop123.com/cheap1.php

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: dentalmind.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Date: Tue, 31 May 2016 02:47:46 GMT
Server: Apache/2.2.31 (FreeBSD) PHP/5.5.35 mod_ssl/2.2.31 OpenSSL/0.9.8zh-freebsd
X-Powered-By: PHP/5.5.35
X-Pingback: http://www.dentalmind.com/xmlrpc.php
Link: <http://www.dentalmind.com/>; rel=shortlink
Connection: close
Content-Type: text/html; charset=UTF-8


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: dentalmind.se
Referer: http://www.google.com/search?q=dentalmind.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Date: Tue, 31 May 2016 02:47:45 GMT
Server: Apache/2.2.31 (FreeBSD) PHP/5.5.35 mod_ssl/2.2.31 OpenSSL/0.9.8zh-freebsd
X-Powered-By: PHP/5.5.35
Location: http://www.cheapshop123.com/cheap1.php
X-Pingback: http://www.dentalmind.com/xmlrpc.php
Link: <http://www.dentalmind.com/>; rel=shortlink
Connection: close
Content-Type: text/html; charset=UTF-8

dentalmind.se is on 194.9.94.49
ASN for 194.9.94.49: 39570
Abusix contact information: abuse@loopia.se (information only)
194.9.94.49 corresponds with s98.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se