The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 104.21.16.10 on port 80 (using HTTP POST): hXXp://gridnetworks.xyz/five/fre.php $ dig +short gridnetworks.xyz 104.21.16.10
Рубрика: cloudflare.com
spam support (domains)
Domain used in ID theft operation. rockblue.art 172.67.133.96, 104.21.5.117
spam support (domains)
Domain used in ID theft operation. rockblue.art 172.67.133.96, 104.21.5.117
Loki botnet controller @172.67.158.42
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 172.67.158.42 on port 80 (using HTTP POST): hXXp://peakledz.xyz//five/fre.php $ dig +short peakledz.xyz 172.67.158.42
OskiStealer botnet controller @172.67.181.62
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. OskiStealer botnet controller located at 172.67.181.62 on port 80 (using HTTP POST): hXXp://secureconnection.xyz/7.jpg $ dig +short secureconnection.xyz 172.67.181.62 Referencing malware binaries (MD5 hash): ad7d92bbc2ff5804551b86b319de9e0d — AV detection:… Читать далее OskiStealer botnet controller @172.67.181.62
RedLineStealer botnet controller @172.67.213.114
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 172.67.213.114 on port 443 TCP: $ telnet 172.67.213.114 443 Trying 172.67.213.114… Connected to 172.67.213.114. Escape character… Читать далее RedLineStealer botnet controller @172.67.213.114
Loki botnet controller @104.21.78.45
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 104.21.78.45 on port 80 (using HTTP POST): hXXp://bobreplace.xyz/five/fre.php $ dig +short bobreplace.xyz 104.21.78.45 Referencing malware binaries (MD5 hash): 898badd240f8d99c109b1c8647eaa1f1 — AV detection:… Читать далее Loki botnet controller @104.21.78.45
Loki botnet controller @104.21.8.250
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 104.21.8.250 on port 80 (using HTTP POST): hXXp://peakledz.xyz//five/fre.php $ dig +short peakledz.xyz 104.21.8.250
RaccoonStealer botnet controller @104.21.62.135
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. RaccoonStealer botnet controller located at 104.21.62.135 on port 80 (using HTTP GET): hXXp://teleliver.top/rino115sipsip $ dig +short teleliver.top 104.21.62.135 Referencing malware binaries (MD5 hash): 473f71050681fc3f442d9ec340ba3207 — AV detection:… Читать далее RaccoonStealer botnet controller @104.21.62.135
RaccoonStealer botnet controller @172.67.136.46
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. RaccoonStealer botnet controller located at 172.67.136.46 on port 80 (using HTTP GET): http://teleliver.top/rino115sipsip http://livetelive.top/rino115sipsip http://teleger.top/rino115sipsip http://telestrong.top/rino115sipsip http://tgrampro.top/rino115sipsip http://teleghost.top/rino115sipsip http://teleroom.top/rino115sipsip http://telemir.top/rino115sipsip http://teletelo.top/rino115sipsip