RedLineStealer botnet controller @45.130.41.15

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 45.130.41.15 on port 443 TCP: $ telnet 45.130.41.15 443 Trying 45.130.41.15… Connected to 45.130.41.15. Escape character… Читать далее RedLineStealer botnet controller @45.130.41.15

Опубликовано
В рубрике beget.ru

Spam support service

We currently consider Beget LLC as «spam support service» according to Spamhaus SBL policy. Beget LLC is providing bulletproof domain registration services to botnet operators: 2021-07-16 — SBL525639 byxibafaytidrcd.ru fylmvtwbbovspsa.ru mkrqbaxubmarpxg.ru opmcqchasbyuvtt.ru qxagkkjpphdreyw.ru 2021-07-22 — SBL525639 qxagkkjpphdreyw.ru bflvmdsywsvquae.ru byxibafaytidrcd.ru opmcqchasbyuvtt.ru mkrqbaxubmarpxg.ru fylmvtwbbovspsa.ru zynger.ru 2021-08-21 — SBL525639 ifsfpvttfjsetms.ru ikkfbfildrujmal.ru iloydveaouuvhds.ru dokvyafdvdaxqfd.ru eyhqwldorupvwdi.ru 2021-09-09 — SBL531777 kiipxvoqiqnyuuq.ru… Читать далее Spam support service

Опубликовано
В рубрике beget.ru

Spam support service

We currently consider Beget LLC as «spam support service» according to Spamhaus SBL policy. Beget LLC is providing bulletproof domain registration services to botnet operators and rejects abuse reports send by Spamhaus and 3rd parties: ================================== <support@beget.com>: host mx1.beget.com[5.101.158.68] said: 550-Message discarded as high-probability spam. Contact support@beget.ru ( 550 1mTIPl-0005Sw-6a ) (in reply to end… Читать далее Spam support service

Опубликовано
В рубрике beget.ru

Spam support service

We currently consider Beget LLC as «spam support service» according to Spamhaus SBL policy. Beget LLC is providing bulletproof domain registration services to botnet operators and rejects abuse reports send by Spamhaus and 3rd parties: ================================== <support@beget.com>: host mx1.beget.com[5.101.158.68] said: 550-Message discarded as high-probability spam. Contact support@beget.ru ( 550 1mTIPl-0005Sw-6a ) (in reply to end… Читать далее Spam support service

Опубликовано
В рубрике beget.ru

Spamvertised website

Received: from s8.werteo.ru (werteo.ru [77.223.99.155]) Date: Wed, 18 Nov 2020 11:4x:xx +0000 From: Aleksandr <info@s8.werteo.ru> Subject: Предложение Website operated by SEO spammer: mayboroda.pro. 557 IN A 87.236.21.151 maiboroda.pro. 562 IN A 92.53.96.212 https://vk.com/prodvizheniyesaytov Поисковое продвижение сайта SEO Email: zakaz@aseom.ru Skype: mayboroda_aleks

Опубликовано
В рубрике beget.ru

Hosting fraud and/or phishing domains

Domains discovered by Spamhaus DBL system: avito-arendarf.ru avito-deliverytrack.ru azimutpayments.com boxberry-deliverytrack.ru capitall-msk.online copyrighthelp-about.ml dhl-dostavka.ru dostavista-deliverytrack.ru pochta-deliverytrack.ru ponyexpress-dostavka.ru yandex-nakladnaya.ru spisanie-dolgov-bankrotstvo-samara.ru rukredit-evropa-bank-lk.ru yandex-transit.ru

Опубликовано
В рубрике beget.ru

Carding fraud site/forum: track2.shop

http://dumps.biz >>> https://track2.shop/ track2.shop. 599 IN A 185.50.25.33 dumps.biz. 299 IN A 104.31.85.67 dumps.biz. 299 IN A 104.31.84.67 dumps.biz. 299 IN A 172.67.208.70 ___________________ Was: ;; ANSWER SECTION: track2.shop. 599 IN CNAME url.dnspod.com. url.dnspod.com. 599 IN A 129.226.103.153 url.dnspod.com. 599 IN A 129.226.102.30 track2.shop. 599 IN A 91.189.114.6 ___________________ Was: track2.shop. 599 IN A 95.211.217.209… Читать далее Carding fraud site/forum: track2.shop

Опубликовано
В рубрике beget.ru

Emotet malware distribution @87.236.16.62 [compromise website]

The host at this IP address is hosting a website that have been compromised by threat actors to distribute Emotet (aka Heodo) malware. The following URL is hosting a webshell that is being accessed by the threat actors programmatically to place malware on the website: URL: http://adres-ug.ru/jkob.php Host: adres-ug.ru IP address: 87.236.16.62 Hostname: ssl.orion.beget.com

Опубликовано
В рубрике beget.ru

Emotet malware distribution @87.236.16.62 [compromise website]

The host at this IP address is hosting a website that have been compromised by threat actors to distribute Emotet (aka Heodo) malware. The following URL is hosting a webshell that is being accessed by the threat actors programmatically to place malware on the website: URL: http://climatch.ru/ktixa.php Host: climatch.ru IP address: 87.236.16.62 Hostname: ssl.orion.beget.com

Опубликовано
В рубрике beget.ru