Attacked url: http://bolibygg.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Tue, 20 Jun 2017 23:43:57 +0200

Visitors with referer are redirected to http://islas.co.uk/college/image/

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: bolibygg.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Date: Tue, 20 Jun 2017 21:43:58 GMT
Server: Apache
X-Powered-By: PHP/5.3.29
Link: <http://bolibygg.se/wp-json/>; rel="https://api.w.org/"
Connection: close
Content-Type: text/html; charset=UTF-8
Pool-Info: /Common/CloudLinux-cluster-34 10.160.2.34 80


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: bolibygg.se
Referer: http://www.google.com/search?q=bolibygg.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 302 Moved Temporarily
Date: Tue, 20 Jun 2017 21:43:50 GMT
Server: Apache
X-Powered-By: PHP/5.3.29
Location: http://islas.co.uk/college/image/
Connection: close
Content-Type: text/html
Pool-Info: /Common/CloudLinux-cluster-34 10.160.2.34 80

bolibygg.se is on 195.74.38.148
ASN for 195.74.38.148: 41528
Abusix contact information: drift@binero.se (information only)
195.74.38.148 corresponds with cl-34.atm.binero.net
Abuse.net does not have any reliable address for cl-34.atm.binero.net
Found address in whois: drift@binero.se abuse@binero.se