Attacked url: http://zogg.se/
Attack type: SERP-hijacking (see http://ikyon.com/attack-types/ for description)
Attack detected Mon, 08 Oct 2018 01:04:12 +0200

Visitors with referer are redirected to http://islas.co.uk/college/image/

HTTP traffic without referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: zogg.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 200 OK
Server: nginx
Date: Sun, 07 Oct 2018 23:04:23 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-Powered-By: PHP/5.6.36
Vary: Accept-Encoding,Cookie
Cache-Control: max-age=3, must-revalidate
WP-Super-Cache: Served supercache file from PHP
X-Loopia-Node: 172.22.223.70


HTTP traffic with referer:
HTTP headers sent:
HEAD / HTTP/1.1
Host: zogg.se
Referer: http://www.google.com/search?q=zogg.se
Connection: Close

HTTP headers recieved:
HTTP/1.1 302 Found
Server: nginx
Date: Sun, 07 Oct 2018 23:04:23 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-Powered-By: PHP/5.6.36
Location: http://islas.co.uk/college/image/
X-Loopia-Node: 172.22.223.70

zogg.se is on 93.188.2.52
ASN for 93.188.2.52: 39570
Abusix contact information: abuse@loopia.se (information only)
93.188.2.52 corresponds with webfront2.webcluster.loopia.se
Abuse.net has 1 reliable address(es) for loopia.se
Found address(es): abuse@loopia.se