http://kraftongame.tk http://spin-material.cf http://winforyou.cf http://survivorgms.ml etc,etc,etc 144.126.135.60|100000000008762985524369821.tk|2022-01-14 22:01:55 144.126.135.60|100000000008762985524369822.tk|2022-01-14 21:31:59 144.126.135.60|100000000008762985524369823.tk|2022-01-14 21:31:55 144.126.135.60|100000000008762985524369824.tk|2022-01-14 21:31:58 144.126.135.60|100000000008762985524369825.tk|2022-01-14 21:31:46 144.126.135.60|100000000008762985524369826.tk|2022-01-14 21:51:11 144.126.135.60|100000000008762985524369827.tk|2022-01-14 21:51:15 144.126.135.60|100000000008762985524369828.tk|2022-01-14 22:51:15 144.126.135.60|100000000008762985524369829.tk|2022-01-14 21:51:34 144.126.135.60|100000000008762985524369830.tk|2022-01-14 21:51:19 144.126.135.60|1000000000347789523698541.tk|2022-01-14 10:53:08 144.126.135.60|1000000000347789523698542.tk|2022-01-14 10:53:34 144.126.135.60|1000000000347789523698543.tk|2022-01-14 09:38:45 144.126.135.60|1000000000347789523698544.tk|2022-01-14 10:52:49 144.126.135.60|1000000000347789523698545.tk|2022-01-14 10:38:09 144.126.135.60|1000000000347789523698546.tk|2022-01-14 10:53:34 144.126.135.60|1000000000347789523698547.tk|2022-01-14 09:37:48 144.126.135.60|1000000000347789523698548.tk|2022-01-14 10:52:57 144.126.135.60|1000000000347789523698549.tk|2022-01-14 09:42:45 144.126.135.60|1000000000347789523698550.tk|2022-01-14 10:53:04 144.126.135.60|1000000098745641644765451-ar.tk|2022-01-15 15:41:19 144.126.135.60|1000000098745641644765452-ar.tk|2022-01-15 15:41:18 144.126.135.60|1000000098745641644765453-ar.tk|2022-01-15 15:41:04 144.126.135.60|1000000098745641644765454-ar.tk|2022-01-15 15:41:18 144.126.135.60|1000000098745641644765455-ar.tk|2022-01-15 15:41:07… Читать далее phishing server
Рубрика: contabo.de
Socelars botnet controller @45.94.58.223
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 45.94.58.223 on port 80 (using HTTP POST): hXXp://www.uspzsx.com/Home/Index/djksye $ dig +short www.uspzsx.com 45.94.58.223 $ nslookup 45.94.58.223 vmi771097.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @45.94.58.223
Socelars botnet controller @178.18.250.204
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 178.18.250.204 on port 80 (using HTTP POST): hXXp://www.assassinsx.com/ $ dig +short www.assassinsx.com 178.18.250.204 $ nslookup 178.18.250.204 vmi707598.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @178.18.250.204
phishing server
hXXp://fixedwallserror.co/en/unlock/wallet/index-2.htm 94.250.202.201|accesssynchrozize.com|2021-10-31 01:16:00 94.250.202.201|api-smartcon.co|2022-01-02 14:46:01 94.250.202.201|api-walscon.co|2022-01-03 15:51:51 94.250.202.201|apismartfix.co|2021-12-23 18:07:02 94.250.202.201|apiwals-con.co|2022-01-03 15:16:41 94.250.202.201|apiwalsvalidate.live|2021-12-11 02:30:56 94.250.202.201|apiwalsvalidation.com|2021-12-17 23:06:06 94.250.202.201|assetsconsync.com|2021-10-28 14:19:45 94.250.202.201|assetsconvalidation.com|2021-10-23 22:15:37 94.250.202.201|assetssync.com|2021-10-26 02:40:59 94.250.202.201|assetssynchronize.com|2021-10-27 20:01:43 94.250.202.201|assetssyncvalidation.com|2021-10-24 02:20:42 94.250.202.201|authvawals.com|2021-12-22 23:56:27 94.250.202.201|auto-errorfix.co|2021-12-25 19:25:47 94.250.202.201|auto-errorsolution.co|2021-12-25 01:20:52 94.250.202.201|autoerror-con.co|2022-01-03 13:01:18 94.250.202.201|autoerror-fix.co|2021-12-24 09:46:32 94.250.202.201|autoerrorfix.co|2021-12-30 19:56:22 94.250.202.201|autoerrorfix.com|2022-01-02 11:55:52 94.250.202.201|autowalls-error.co|2021-12-31 10:46:01 94.250.202.201|classifiedsyn.com|2021-12-22 12:01:51 94.250.202.201|connection-errorfix.co|2021-12-29 07:21:16 94.250.202.201|connection-helpdesk.co|2021-12-29 07:56:09 94.250.202.201|cpanel.assetsconsync.com|2021-10-14 00:14:19 94.250.202.201|cpanel.helptova.live|2021-12-03 07:46:09 94.250.202.201|cpanel.linktova.live|2021-11-08 22:05:38 94.250.202.201|cpanel.walletprotectlive.com|2021-10-12 07:55:26… Читать далее phishing server
AsyncRAT botnet controller @144.126.129.113
The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 144.126.129.113 on port 54809 TCP: $ telnet 144.126.129.113 54809 Trying 144.126.129.113… Connected to 144.126.129.113. Escape character… Читать далее AsyncRAT botnet controller @144.126.129.113
phishing server
185.207.251.73|becuvsqnsecuritieshotline.org|2021-12-07 19:20:55 185.207.251.73|5sco.online|2021-12-06 20:06:23 185.207.251.73|navyfederalservices.online|2021-12-07 00:30:51 185.207.251.73|pq0.org|2021-12-07 02:41:10 185.207.251.73|securedbecuwebforbecualerts.info|2021-12-06 02:15:44 185.207.251.73|securedhuntington1authorizedsecuredidentification.net|2021-12-07 01:30:27 185.207.251.73|securedhuntingtonauthorizedsecuredidentification.info|2021-12-07 00:21:08 185.207.251.73|securedwebforbecualerts.info|2021-12-02 21:36:01
Malware botnet controller @207.244.237.176
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 207.244.237.176 on port 80 (using HTTP GET): hXXp://ccf9ba3695b15b4f0787e6290e0f63allcomejroo839jxi13.xyz/API/Clipper/hr627gzk.php $ dig +short ccf9ba3695b15b4f0787e6290e0f63allcomejroo839jxi13.xyz 207.244.237.176 $ nslookup 207.244.237.176 us.bomj.top Referencing malware binaries (MD5 hash):… Читать далее Malware botnet controller @207.244.237.176
top200.live / myopenaccess.live / scholarlyopenaccessjournals.com / opastonline.com (OPast Publishing Group)
11/29/2021: The owner of the doamins and IP addresses used in this spam run has moved hosting for their main domain from GoDaddy to Contabo. This was done without resolving the spam issue, so Spamhaus is listing the new hosting IP address to protect users and make Contabo aware of this entity’s record. $ host… Читать далее top200.live / myopenaccess.live / scholarlyopenaccessjournals.com / opastonline.com (OPast Publishing Group)
Socelars botnet controller @178.18.250.204
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 178.18.250.204 on port 80 (using HTTP POST): hXXp://www.hhgenice.top/ $ dig +short www.hhgenice.top 178.18.250.204 $ nslookup 178.18.250.204 vmi707598.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @178.18.250.204
Socelars botnet controller @185.209.229.184
The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 185.209.229.184 on port 80 (using HTTP GET): hXXp://www.kittyschwartz.com/ $ dig +short www.kittyschwartz.com 185.209.229.184 $ nslookup 185.209.229.184 vmi718271.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @185.209.229.184