Malware botnet controllers @34.65.143.203

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.

Malware botnet controller located at 34.65.143.203 on port 443:
$ telnet 34.65.143.203 443
Trying 34.65.143.203…
Connected to 34.65.143.203.
Escape character is ‘^]’

Malicious domains observed on this IP address:
avyanok.com. 600 IN A 34.65.143.203
biopiof.at. 600 IN A 34.65.143.203
clickclckjack.at. 600 IN A 34.65.143.203
dangerboy.at. 600 IN A 34.65.143.203
ikaryto.com. 600 IN A 34.65.143.203
immontyr.com. 600 IN A 34.65.143.203
intoolkom.at. 600 IN A 34.65.143.203
intooltak.com. 600 IN A 34.65.143.203
intromons.com. 600 IN A 34.65.143.203
irolano.com. 600 IN A 34.65.143.203
microsoftsofymicrosoftsoft.at. 600 IN A 34.65.143.203
querosityproject.com. 600 IN A 34.65.143.203
redhatbabby.at. 600 IN A 34.65.143.203
testaaaaaaaabox.xyz. 600 IN A 34.65.143.203

Опубликовано
В рубрике google.com

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *