RedLineStealer botnet controller @172.67.130.64

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 172.67.130.64 on port 443 TCP: $ telnet 172.67.130.64 443 Trying 172.67.130.64… Connected to 172.67.130.64. Escape character… Читать далее RedLineStealer botnet controller @172.67.130.64

Loki botnet controller @172.67.205.83

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 172.67.205.83 on port 80 (using HTTP POST): hXXp://74f26d34ffff049368a6cff8812f86ee.ml/BN22/fre.php $ dig +short 74f26d34ffff049368a6cff8812f86ee.ml 172.67.205.83 Other malicious domain names hosted on this IP address:… Читать далее Loki botnet controller @172.67.205.83

RaccoonStealer botnet controller @104.21.17.146

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. RaccoonStealer botnet controller located at 104.21.17.146 on port 80 (using HTTP GET): hXXp://teletop.top/stevuitreen $ dig +short teletop.top 104.21.17.146 Referencing malware binaries (MD5 hash): 0bea974fca09703496dcca41ce759790 — AV detection:… Читать далее RaccoonStealer botnet controller @104.21.17.146

Spamvertised domain hosting

Received: from loop.xtivant.digital ([2.58.148.100]) by [] (8.14.7/8.14.7) with ESMTP id [] for []; Sat, 2 Oct 2021 12:[]:[] -0400 Authentication-Results: [] DKIM-Signature: [] DomainKey-Signature: [] Mime-Version: 1.0 Content-Type: multipart/alternative; boundary=»[]» Date: Sat, 2 Oct 2021 18:[]:[] +0200 From: «Ernest Craig» <selfdefense@xtivant.digital> Reply-To: «Ernest Craig» <selfdefense@xtivant.digital> Subject: «I Was In Hell» Serial Robber Terrified After Entering… Читать далее Spamvertised domain hosting

RaccoonStealer botnet controller @172.67.176.216

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. RaccoonStealer botnet controller located at 172.67.176.216 on port 80 (using HTTP GET): hXXp://teletop.top/papatikmikr0 $ dig +short teletop.top 172.67.176.216 Referencing malware binaries (MD5 hash): 32df2eb9a83b1a97096aa403b6e5ce3f — AV detection:… Читать далее RaccoonStealer botnet controller @172.67.176.216

Loki botnet controller @172.67.219.120

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Loki botnet controller located at 172.67.219.120 on port 80 (using HTTP POST): hXXp://ir8.xyz/LC/w2/fre.php $ dig +short ir8.xyz 172.67.219.120

List Seller (apollo.io)

Cloudflare hosts the list sales website www.apollo.io. Spamhaus considers sales of lists that contain email addresses to be spam support, since there is no legitimate use for this data. WEB SITE (http://www.apollo.io) Data-driven revenue growth Prospect from 200M business contacts and 10M companies, find verified emails and direct dials, and give your existing sales tools… Читать далее List Seller (apollo.io)

List Seller (apollo.io)

Cloudflare hosts the list sales website www.apollo.io. Spamhaus considers sales of lists that contain email addresses to be spam support, since there is no legitimate use for this data. WEB SITE (http://www.apollo.io) Data-driven revenue growth Prospect from 200M business contacts and 10M companies, find verified emails and direct dials, and give your existing sales tools… Читать далее List Seller (apollo.io)

List Seller (apollo.io)

Cloudflare hosts the list sales website www.apollo.io. Spamhaus considers sales of lists that contain email addresses to be spam support, since there is no legitimate use for this data. WEB SITE (http://www.apollo.io) Data-driven revenue growth Prospect from 200M business contacts and 10M companies, find verified emails and direct dials, and give your existing sales tools… Читать далее List Seller (apollo.io)

List Seller (apollo.io)

Cloudflare hosts the list sales website www.apollo.io. Spamhaus considers sales of lists that contain email addresses to be spam support, since there is no legitimate use for this data. WEB SITE (http://www.apollo.io) Data-driven revenue growth Prospect from 200M business contacts and 10M companies, find verified emails and direct dials, and give your existing sales tools… Читать далее List Seller (apollo.io)