Attacked url: http://reflexfigurer.se/
Attack type: Header hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Sun, 14 Apr 2013 17:14:01 +0000

Hijacking with http header 'Refresh', redirecting visitors to http://fcbarcelonadodocom.info/ro

HTTP headers sent:
HEAD / HTTP/1.1
Host: reflexfigurer.se
Referer: http://www.google.com/search?q=reflexfigurer.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Date: Sun, 14 Apr 2013 17:21:40 GMT
Server: Apache/2.2.20 (FreeBSD) PHP/5.3.6 with Suhosin-Patch mod_ssl/2.2.20 OpenSSL/0.9.8q
X-Powered-By: PHP/5.3.6
Refresh: 25; url="http://fcbarcelonadodocom.info/ro"
Set-Cookie: 39ae42b573f8a542dfad9adf935d4c06=f5ea823e4613cab9c0f53068acb43959; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Sun, 14 Apr 2013 17:21:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8

reflexfigurer.se is on 194.9.95.119
ASN for 194.9.95.119: 39570
Abusix contact information: abuse@loopia.se (information only)
194.9.95.119 corresponds with s298.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se