Attacked url: http://etena.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Tue, 15 Aug 2017 04:44:28 +0200

Visitors with referer are redirected to http://www.fapp.pw/app/se.php

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: etena.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 302 Found
Server: nginx/1.12.1
Date: Tue, 15 Aug 2017 02:44:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: X-Forwarded-For
X-Powered-By: PHP/5.6.30
Location: http://www.etena.se/


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: etena.se
Referer: http://www.google.com/search?q=etena.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 301 Moved Permanently
Server: nginx/1.12.1
Date: Tue, 15 Aug 2017 02:44:30 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: close
Location: http://www.fapp.pw/app/se.php

etena.se is on 194.9.94.137
ASN for 194.9.94.137: 39570
Abusix contact information: abuse@loopia.se (information only)
194.9.94.137 corresponds with s529.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se