phishing server

http://kraftongame.tk http://spin-material.cf http://winforyou.cf http://survivorgms.ml etc,etc,etc 144.126.135.60|100000000008762985524369821.tk|2022-01-14 22:01:55 144.126.135.60|100000000008762985524369822.tk|2022-01-14 21:31:59 144.126.135.60|100000000008762985524369823.tk|2022-01-14 21:31:55 144.126.135.60|100000000008762985524369824.tk|2022-01-14 21:31:58 144.126.135.60|100000000008762985524369825.tk|2022-01-14 21:31:46 144.126.135.60|100000000008762985524369826.tk|2022-01-14 21:51:11 144.126.135.60|100000000008762985524369827.tk|2022-01-14 21:51:15 144.126.135.60|100000000008762985524369828.tk|2022-01-14 22:51:15 144.126.135.60|100000000008762985524369829.tk|2022-01-14 21:51:34 144.126.135.60|100000000008762985524369830.tk|2022-01-14 21:51:19 144.126.135.60|1000000000347789523698541.tk|2022-01-14 10:53:08 144.126.135.60|1000000000347789523698542.tk|2022-01-14 10:53:34 144.126.135.60|1000000000347789523698543.tk|2022-01-14 09:38:45 144.126.135.60|1000000000347789523698544.tk|2022-01-14 10:52:49 144.126.135.60|1000000000347789523698545.tk|2022-01-14 10:38:09 144.126.135.60|1000000000347789523698546.tk|2022-01-14 10:53:34 144.126.135.60|1000000000347789523698547.tk|2022-01-14 09:37:48 144.126.135.60|1000000000347789523698548.tk|2022-01-14 10:52:57 144.126.135.60|1000000000347789523698549.tk|2022-01-14 09:42:45 144.126.135.60|1000000000347789523698550.tk|2022-01-14 10:53:04 144.126.135.60|1000000098745641644765451-ar.tk|2022-01-15 15:41:19 144.126.135.60|1000000098745641644765452-ar.tk|2022-01-15 15:41:18 144.126.135.60|1000000098745641644765453-ar.tk|2022-01-15 15:41:04 144.126.135.60|1000000098745641644765454-ar.tk|2022-01-15 15:41:18 144.126.135.60|1000000098745641644765455-ar.tk|2022-01-15 15:41:07… Читать далее phishing server

Опубликовано
В рубрике contabo.de

Socelars botnet controller @45.94.58.223

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 45.94.58.223 on port 80 (using HTTP POST): hXXp://www.uspzsx.com/Home/Index/djksye $ dig +short www.uspzsx.com 45.94.58.223 $ nslookup 45.94.58.223 vmi771097.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @45.94.58.223

Опубликовано
В рубрике contabo.de

Socelars botnet controller @178.18.250.204

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 178.18.250.204 on port 80 (using HTTP POST): hXXp://www.assassinsx.com/ $ dig +short www.assassinsx.com 178.18.250.204 $ nslookup 178.18.250.204 vmi707598.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @178.18.250.204

Опубликовано
В рубрике contabo.de

phishing server

hXXp://fixedwallserror.co/en/unlock/wallet/index-2.htm 94.250.202.201|accesssynchrozize.com|2021-10-31 01:16:00 94.250.202.201|api-smartcon.co|2022-01-02 14:46:01 94.250.202.201|api-walscon.co|2022-01-03 15:51:51 94.250.202.201|apismartfix.co|2021-12-23 18:07:02 94.250.202.201|apiwals-con.co|2022-01-03 15:16:41 94.250.202.201|apiwalsvalidate.live|2021-12-11 02:30:56 94.250.202.201|apiwalsvalidation.com|2021-12-17 23:06:06 94.250.202.201|assetsconsync.com|2021-10-28 14:19:45 94.250.202.201|assetsconvalidation.com|2021-10-23 22:15:37 94.250.202.201|assetssync.com|2021-10-26 02:40:59 94.250.202.201|assetssynchronize.com|2021-10-27 20:01:43 94.250.202.201|assetssyncvalidation.com|2021-10-24 02:20:42 94.250.202.201|authvawals.com|2021-12-22 23:56:27 94.250.202.201|auto-errorfix.co|2021-12-25 19:25:47 94.250.202.201|auto-errorsolution.co|2021-12-25 01:20:52 94.250.202.201|autoerror-con.co|2022-01-03 13:01:18 94.250.202.201|autoerror-fix.co|2021-12-24 09:46:32 94.250.202.201|autoerrorfix.co|2021-12-30 19:56:22 94.250.202.201|autoerrorfix.com|2022-01-02 11:55:52 94.250.202.201|autowalls-error.co|2021-12-31 10:46:01 94.250.202.201|classifiedsyn.com|2021-12-22 12:01:51 94.250.202.201|connection-errorfix.co|2021-12-29 07:21:16 94.250.202.201|connection-helpdesk.co|2021-12-29 07:56:09 94.250.202.201|cpanel.assetsconsync.com|2021-10-14 00:14:19 94.250.202.201|cpanel.helptova.live|2021-12-03 07:46:09 94.250.202.201|cpanel.linktova.live|2021-11-08 22:05:38 94.250.202.201|cpanel.walletprotectlive.com|2021-10-12 07:55:26… Читать далее phishing server

Опубликовано
В рубрике contabo.de

AsyncRAT botnet controller @144.126.129.113

The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 144.126.129.113 on port 54809 TCP: $ telnet 144.126.129.113 54809 Trying 144.126.129.113… Connected to 144.126.129.113. Escape character… Читать далее AsyncRAT botnet controller @144.126.129.113

Опубликовано
В рубрике contabo.de

phishing server

185.207.251.73|becuvsqnsecuritieshotline.org|2021-12-07 19:20:55 185.207.251.73|5sco.online|2021-12-06 20:06:23 185.207.251.73|navyfederalservices.online|2021-12-07 00:30:51 185.207.251.73|pq0.org|2021-12-07 02:41:10 185.207.251.73|securedbecuwebforbecualerts.info|2021-12-06 02:15:44 185.207.251.73|securedhuntington1authorizedsecuredidentification.net|2021-12-07 01:30:27 185.207.251.73|securedhuntingtonauthorizedsecuredidentification.info|2021-12-07 00:21:08 185.207.251.73|securedwebforbecualerts.info|2021-12-02 21:36:01

Опубликовано
В рубрике contabo.de

Malware botnet controller @207.244.237.176

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Malware botnet controller located at 207.244.237.176 on port 80 (using HTTP GET): hXXp://ccf9ba3695b15b4f0787e6290e0f63allcomejroo839jxi13.xyz/API/Clipper/hr627gzk.php $ dig +short ccf9ba3695b15b4f0787e6290e0f63allcomejroo839jxi13.xyz 207.244.237.176 $ nslookup 207.244.237.176 us.bomj.top Referencing malware binaries (MD5 hash):… Читать далее Malware botnet controller @207.244.237.176

Опубликовано
В рубрике contabo.de

top200.live / myopenaccess.live / scholarlyopenaccessjournals.com / opastonline.com (OPast Publishing Group)

11/29/2021: The owner of the doamins and IP addresses used in this spam run has moved hosting for their main domain from GoDaddy to Contabo. This was done without resolving the spam issue, so Spamhaus is listing the new hosting IP address to protect users and make Contabo aware of this entity’s record. $ host… Читать далее top200.live / myopenaccess.live / scholarlyopenaccessjournals.com / opastonline.com (OPast Publishing Group)

Опубликовано
В рубрике contabo.de

Socelars botnet controller @178.18.250.204

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 178.18.250.204 on port 80 (using HTTP POST): hXXp://www.hhgenice.top/ $ dig +short www.hhgenice.top 178.18.250.204 $ nslookup 178.18.250.204 vmi707598.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @178.18.250.204

Опубликовано
В рубрике contabo.de

Socelars botnet controller @185.209.229.184

The host at this IP address is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse. Socelars botnet controller located at 185.209.229.184 on port 80 (using HTTP GET): hXXp://www.kittyschwartz.com/ $ dig +short www.kittyschwartz.com 185.209.229.184 $ nslookup 185.209.229.184 vmi718271.contaboserver.net Referencing malware binaries (MD5 hash):… Читать далее Socelars botnet controller @185.209.229.184

Опубликовано
В рубрике contabo.de