Attacked url: http://mhs.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Thu, 07 Sep 2017 20:17:56 +0200

Visitors with referer are redirected to http://vados.biz/gosw?keyword=&pill=

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: mhs.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Server: nginx/1.12.1
Date: Thu, 07 Sep 2017 18:18:04 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: X-Forwarded-For
X-Powered-By: PHP/5.6.30
Set-Cookie: wfvt_159242594=59b18d5c507f0; expires=Thu, 07-Sep-2017 18:48:04 GMT; Max-Age=1800; path=/; httponly
Link: <http://mhs.se/wp-json/>; rel="https://api.w.org/"
Link: <http://mhs.se/>; rel=shortlink


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: mhs.se
Referer: http://www.google.com/search?q=mhs.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 302 Found
Server: nginx/1.12.1
Date: Thu, 07 Sep 2017 18:18:02 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: X-Forwarded-For
X-Powered-By: PHP/5.6.30
Location: http://vados.biz/gosw?keyword=&pill=

mhs.se is on 194.9.94.228
ASN for 194.9.94.228: 39570
Abusix contact information: abuse@loopia.se (information only)
194.9.94.228 corresponds with s169.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se