Attacked url: http://joopot.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Wed, 17 Jan 2018 08:04:14 +0100

Visitors with referer are redirected to http://www.tatlitarifleri.tv/2670/

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: joopot.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 403 Forbidden
Date: Wed, 17 Jan 2018 07:04:51 GMT
Server: Apache
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Language: en


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: joopot.se
Referer: http://www.google.com/search?q=joopot.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 302 Found
Date: Wed, 17 Jan 2018 07:04:51 GMT
Server: Apache
Location: http://www.tatlitarifleri.tv/2670/
Connection: close
Content-Type: text/html; charset=iso-8859-1

joopot.se is on 195.74.38.63
ASN for 195.74.38.63: 35041
Abusix contact information: drift@binero.se (information only)
195.74.38.63 corresponds with cl-02.atm.binero.net
Abuse.net has 1 reliable address(es) for binero.net
Found address(es): abuse@binero.se