Attacked url: http://xn--sjalt-kua.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Tue, 27 Feb 2018 19:51:46 +0100

Visitors with referer are redirected to http://ajax.auowen.com/libs/jquery.php

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: xn--sjalt-kua.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 823
Content-Type: text/html
Server: Microsoft-IIS/7.5
Set-Cookie: ASPSESSIONIDQQBTASQD=CIJJIBFCNKOLCFFJDDDMEOJK; path=/
X-Powered-By: ASP.NET
Date: Tue, 27 Feb 2018 18:51:48 GMT
Connection: close


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: xn--sjalt-kua.se
Referer: http://www.google.com/search?q=xn--sjalt-kua.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 159
Content-Type: text/html
Location: http://ajax.auowen.com/libs/jquery.php
Server: Microsoft-IIS/7.5
Set-Cookie: ASPSESSIONIDQQBTASQD=BIJJIBFCMGANNIEICJCICEOI; path=/
X-Powered-By: ASP.NET
Date: Tue, 27 Feb 2018 18:51:48 GMT
Connection: close

xn--sjalt-kua.se is on 194.9.94.80
ASN for 194.9.94.80: 39570
Abusix contact information: abuse@loopia.se (information only)
194.9.94.80 corresponds with iis11.windowscluster.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se