The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 45.130.41.15 on port 443 TCP: $ telnet 45.130.41.15 443 Trying 45.130.41.15… Connected to 45.130.41.15. Escape character… Читать далее RedLineStealer botnet controller @45.130.41.15
Рубрика: beget.ru
Spam support service
We currently consider Beget LLC as «spam support service» according to Spamhaus SBL policy. Beget LLC is providing bulletproof domain registration services to botnet operators: 2021-07-16 — SBL525639 byxibafaytidrcd.ru fylmvtwbbovspsa.ru mkrqbaxubmarpxg.ru opmcqchasbyuvtt.ru qxagkkjpphdreyw.ru 2021-07-22 — SBL525639 qxagkkjpphdreyw.ru bflvmdsywsvquae.ru byxibafaytidrcd.ru opmcqchasbyuvtt.ru mkrqbaxubmarpxg.ru fylmvtwbbovspsa.ru zynger.ru 2021-08-21 — SBL525639 ifsfpvttfjsetms.ru ikkfbfildrujmal.ru iloydveaouuvhds.ru dokvyafdvdaxqfd.ru eyhqwldorupvwdi.ru 2021-09-09 — SBL531777 kiipxvoqiqnyuuq.ru… Читать далее Spam support service
Spam support service
We currently consider Beget LLC as «spam support service» according to Spamhaus SBL policy. Beget LLC is providing bulletproof domain registration services to botnet operators and rejects abuse reports send by Spamhaus and 3rd parties: ================================== <support@beget.com>: host mx1.beget.com[5.101.158.68] said: 550-Message discarded as high-probability spam. Contact support@beget.ru ( 550 1mTIPl-0005Sw-6a ) (in reply to end… Читать далее Spam support service
Spam support service
We currently consider Beget LLC as «spam support service» according to Spamhaus SBL policy. Beget LLC is providing bulletproof domain registration services to botnet operators and rejects abuse reports send by Spamhaus and 3rd parties: ================================== <support@beget.com>: host mx1.beget.com[5.101.158.68] said: 550-Message discarded as high-probability spam. Contact support@beget.ru ( 550 1mTIPl-0005Sw-6a ) (in reply to end… Читать далее Spam support service
Spamvertised website
Received: from s8.werteo.ru (werteo.ru [77.223.99.155]) Date: Wed, 18 Nov 2020 11:4x:xx +0000 From: Aleksandr <info@s8.werteo.ru> Subject: Предложение Website operated by SEO spammer: mayboroda.pro. 557 IN A 87.236.21.151 maiboroda.pro. 562 IN A 92.53.96.212 https://vk.com/prodvizheniyesaytov Поисковое продвижение сайта SEO Email: zakaz@aseom.ru Skype: mayboroda_aleks
Hosting fraud and/or phishing domains
Domains discovered by Spamhaus DBL system: avito-arendarf.ru avito-deliverytrack.ru azimutpayments.com boxberry-deliverytrack.ru capitall-msk.online copyrighthelp-about.ml dhl-dostavka.ru dostavista-deliverytrack.ru pochta-deliverytrack.ru ponyexpress-dostavka.ru yandex-nakladnaya.ru spisanie-dolgov-bankrotstvo-samara.ru rukredit-evropa-bank-lk.ru yandex-transit.ru
Botnet spamming for: pussy31.us
pussy31.us. 20239 IN A 185.50.25.55 Hithere , prettyboy . Can I tell them thank you very much interesting a place where dreams come true desires? What if I say what do you need to find the girl for there was no more sex much easier? You can check it out on our website. But… Читать далее Botnet spamming for: pussy31.us
Carding fraud site/forum: track2.shop
http://dumps.biz >>> https://track2.shop/ track2.shop. 599 IN A 185.50.25.33 dumps.biz. 299 IN A 104.31.85.67 dumps.biz. 299 IN A 104.31.84.67 dumps.biz. 299 IN A 172.67.208.70 ___________________ Was: ;; ANSWER SECTION: track2.shop. 599 IN CNAME url.dnspod.com. url.dnspod.com. 599 IN A 129.226.103.153 url.dnspod.com. 599 IN A 129.226.102.30 track2.shop. 599 IN A 91.189.114.6 ___________________ Was: track2.shop. 599 IN A 95.211.217.209… Читать далее Carding fraud site/forum: track2.shop
Emotet malware distribution @87.236.16.62 [compromise website]
The host at this IP address is hosting a website that have been compromised by threat actors to distribute Emotet (aka Heodo) malware. The following URL is hosting a webshell that is being accessed by the threat actors programmatically to place malware on the website: URL: http://adres-ug.ru/jkob.php Host: adres-ug.ru IP address: 87.236.16.62 Hostname: ssl.orion.beget.com
Emotet malware distribution @87.236.16.62 [compromise website]
The host at this IP address is hosting a website that have been compromised by threat actors to distribute Emotet (aka Heodo) malware. The following URL is hosting a webshell that is being accessed by the threat actors programmatically to place malware on the website: URL: http://climatch.ru/ktixa.php Host: climatch.ru IP address: 87.236.16.62 Hostname: ssl.orion.beget.com